Advertisement
Guest User

Untitled

a guest
Jul 6th, 2017
531
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 406.24 KB | None | 0 0
  1. root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
  2. Sun Dec 19 02:07:51 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
  3. Sun Dec 19 02:07:51 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4. Sun Dec 19 02:07:51 2010 WARNING: file 'cert.dat' is group or others accessible
  5. Sun Dec 19 02:07:51 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
  6. Sun Dec 19 02:07:51 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  7. Sun Dec 19 02:07:51 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  8. Sun Dec 19 02:07:51 2010 Local Options hash (VER=V4): 'bf6006bf'
  9. Sun Dec 19 02:07:51 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  10. Sun Dec 19 02:07:51 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
  11. Sun Dec 19 02:07:52 2010 TCP connection established with [AF_INET]188.65.74.98:54111
  12. Sun Dec 19 02:07:52 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  13. Sun Dec 19 02:07:52 2010 TCPv4_CLIENT link local: [undef]
  14. Sun Dec 19 02:07:52 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
  15. Sun Dec 19 02:07:52 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=77172359 63eac6bc
  16. Sun Dec 19 02:07:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  17. Sun Dec 19 02:07:54 2010 VERIFY OK: nsCertType=SERVER
  18. Sun Dec 19 02:07:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  19. Sun Dec 19 02:07:59 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  20. Sun Dec 19 02:07:59 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  21. Sun Dec 19 02:07:59 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  22. Sun Dec 19 02:07:59 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  23. Sun Dec 19 02:07:59 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  24. Sun Dec 19 02:07:59 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
  25. Sun Dec 19 02:08:01 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  26. Sun Dec 19 02:08:01 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  27. Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: timers and/or timeouts modified
  28. Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: --socket-flags option modified
  29. Sun Dec 19 02:08:01 2010 Socket flags: TCP_NODELAY=1 succeeded
  30. Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: --ifconfig/up options modified
  31. Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: route options modified
  32. Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: route-related options modified
  33. Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  34. Sun Dec 19 02:08:01 2010 ROUTE default_gateway=192.168.2.1
  35. Sun Dec 19 02:08:01 2010 TUN/TAP device tun0 opened
  36. Sun Dec 19 02:08:01 2010 TUN/TAP TX queue length set to 100
  37. Sun Dec 19 02:08:01 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
  38. Sun Dec 19 02:08:03 2010 /sbin/route add -net 188.65.74.98 netmask 255.255.255.255 gw 192.168.2.1
  39. Sun Dec 19 02:08:03 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  40. Sun Dec 19 02:08:03 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  41. Sun Dec 19 02:08:03 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
  42. Sun Dec 19 02:08:03 2010 Initialization Sequence Completed
  43. Sun Dec 19 02:23:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  44. Sun Dec 19 02:23:00 2010 VERIFY OK: nsCertType=SERVER
  45. Sun Dec 19 02:23:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  46. Sun Dec 19 02:23:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  47. Sun Dec 19 02:23:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  48. Sun Dec 19 02:23:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  49. Sun Dec 19 02:23:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  50. Sun Dec 19 02:23:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  51. Sun Dec 19 02:38:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  52. Sun Dec 19 02:38:04 2010 VERIFY OK: nsCertType=SERVER
  53. Sun Dec 19 02:38:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  54. Sun Dec 19 02:38:07 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  55. Sun Dec 19 02:38:07 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  56. Sun Dec 19 02:38:07 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  57. Sun Dec 19 02:38:07 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  58. Sun Dec 19 02:38:07 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  59. Sun Dec 19 02:53:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  60. Sun Dec 19 02:53:09 2010 VERIFY OK: nsCertType=SERVER
  61. Sun Dec 19 02:53:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  62. Sun Dec 19 02:53:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  63. Sun Dec 19 02:53:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  64. Sun Dec 19 02:53:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  65. Sun Dec 19 02:53:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  66. Sun Dec 19 02:53:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  67. Sun Dec 19 03:08:12 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  68. Sun Dec 19 03:08:12 2010 VERIFY OK: nsCertType=SERVER
  69. Sun Dec 19 03:08:12 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  70. Sun Dec 19 03:08:14 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  71. Sun Dec 19 03:08:14 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  72. Sun Dec 19 03:08:14 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  73. Sun Dec 19 03:08:14 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  74. Sun Dec 19 03:08:14 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  75. ^CSun Dec 19 03:18:23 2010 event_wait : Interrupted system call (code=4)
  76. Sun Dec 19 03:18:23 2010 TCP/UDP: Closing socket
  77. Sun Dec 19 03:18:23 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
  78. Sun Dec 19 03:18:23 2010 /sbin/route del -net 188.65.74.98 netmask 255.255.255.255
  79. Sun Dec 19 03:18:23 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  80. Sun Dec 19 03:18:23 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  81. Sun Dec 19 03:18:23 2010 Closing TUN/TAP interface
  82. Sun Dec 19 03:18:23 2010 /sbin/ifconfig tun0 0.0.0.0
  83. Sun Dec 19 03:18:23 2010 SIGINT[hard,] received, process exiting
  84. root@mybox:/etc/openvpn# nano /etc/resolv.conf
  85. root@mybox:/etc/openvpn# nano /etc/resolv.conf
  86. root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
  87. Sun Dec 19 16:47:13 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
  88. Sun Dec 19 16:47:13 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  89. Sun Dec 19 16:47:13 2010 WARNING: file 'cert.dat' is group or others accessible
  90. Sun Dec 19 16:47:13 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
  91. Sun Dec 19 16:47:14 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  92. Sun Dec 19 16:47:14 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  93. Sun Dec 19 16:47:14 2010 Local Options hash (VER=V4): 'bf6006bf'
  94. Sun Dec 19 16:47:14 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  95. Sun Dec 19 16:47:14 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
  96. Sun Dec 19 16:47:15 2010 TCP connection established with [AF_INET]188.65.74.98:54111
  97. Sun Dec 19 16:47:15 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  98. Sun Dec 19 16:47:15 2010 TCPv4_CLIENT link local: [undef]
  99. Sun Dec 19 16:47:15 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
  100. Sun Dec 19 16:47:15 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=47e1ff25 d3046d0a
  101. Sun Dec 19 16:47:17 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  102. Sun Dec 19 16:47:17 2010 VERIFY OK: nsCertType=SERVER
  103. Sun Dec 19 16:47:17 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  104. Sun Dec 19 16:47:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  105. Sun Dec 19 16:47:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  106. Sun Dec 19 16:47:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  107. Sun Dec 19 16:47:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  108. Sun Dec 19 16:47:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  109. Sun Dec 19 16:47:22 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
  110. Sun Dec 19 16:47:24 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  111. Sun Dec 19 16:47:24 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  112. Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: timers and/or timeouts modified
  113. Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: --socket-flags option modified
  114. Sun Dec 19 16:47:24 2010 Socket flags: TCP_NODELAY=1 succeeded
  115. Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: --ifconfig/up options modified
  116. Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: route options modified
  117. Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: route-related options modified
  118. Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  119. Sun Dec 19 16:47:24 2010 ROUTE default_gateway=192.168.2.1
  120. Sun Dec 19 16:47:24 2010 TUN/TAP device tun0 opened
  121. Sun Dec 19 16:47:24 2010 TUN/TAP TX queue length set to 100
  122. Sun Dec 19 16:47:24 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
  123. Sun Dec 19 16:47:26 2010 /sbin/route add -net 188.65.74.98 netmask 255.255.255.255 gw 192.168.2.1
  124. Sun Dec 19 16:47:26 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  125. Sun Dec 19 16:47:26 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  126. Sun Dec 19 16:47:26 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
  127. Sun Dec 19 16:47:26 2010 Initialization Sequence Completed
  128. Sun Dec 19 17:02:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  129. Sun Dec 19 17:02:23 2010 VERIFY OK: nsCertType=SERVER
  130. Sun Dec 19 17:02:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  131. Sun Dec 19 17:02:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  132. Sun Dec 19 17:02:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  133. Sun Dec 19 17:02:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  134. Sun Dec 19 17:02:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  135. Sun Dec 19 17:02:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  136. Sun Dec 19 17:17:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  137. Sun Dec 19 17:17:28 2010 VERIFY OK: nsCertType=SERVER
  138. Sun Dec 19 17:17:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  139. Sun Dec 19 17:17:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  140. Sun Dec 19 17:17:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  141. Sun Dec 19 17:17:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  142. Sun Dec 19 17:17:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  143. Sun Dec 19 17:17:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  144. Sun Dec 19 17:32:32 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  145. Sun Dec 19 17:32:32 2010 VERIFY OK: nsCertType=SERVER
  146. Sun Dec 19 17:32:32 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  147. Sun Dec 19 17:32:35 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  148. Sun Dec 19 17:32:35 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  149. Sun Dec 19 17:32:35 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  150. Sun Dec 19 17:32:35 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  151. Sun Dec 19 17:32:35 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  152. Sun Dec 19 17:47:36 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  153. Sun Dec 19 17:47:36 2010 VERIFY OK: nsCertType=SERVER
  154. Sun Dec 19 17:47:36 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  155. Sun Dec 19 17:47:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  156. Sun Dec 19 17:47:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  157. Sun Dec 19 17:47:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  158. Sun Dec 19 17:47:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  159. Sun Dec 19 17:47:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  160. Sun Dec 19 18:02:40 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  161. Sun Dec 19 18:02:40 2010 VERIFY OK: nsCertType=SERVER
  162. Sun Dec 19 18:02:40 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  163. Sun Dec 19 18:02:44 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  164. Sun Dec 19 18:02:44 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  165. Sun Dec 19 18:02:44 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  166. Sun Dec 19 18:02:44 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  167. Sun Dec 19 18:02:44 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  168. Sun Dec 19 18:17:50 2010 [server] Inactivity timeout (--ping-restart), restarting
  169. Sun Dec 19 18:17:50 2010 TCP/UDP: Closing socket
  170. Sun Dec 19 18:17:50 2010 SIGUSR1[soft,ping-restart] received, process restarting
  171. Sun Dec 19 18:17:50 2010 Restart pause, 5 second(s)
  172. Sun Dec 19 18:17:55 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  173. Sun Dec 19 18:17:55 2010 Re-using SSL/TLS context
  174. Sun Dec 19 18:17:55 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  175. Sun Dec 19 18:17:55 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  176. Sun Dec 19 18:17:55 2010 Local Options hash (VER=V4): 'bf6006bf'
  177. Sun Dec 19 18:17:55 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  178. Sun Dec 19 18:17:55 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
  179. Sun Dec 19 18:17:56 2010 TCP connection established with [AF_INET]188.65.74.98:54111
  180. Sun Dec 19 18:17:56 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  181. Sun Dec 19 18:17:56 2010 Socket flags: TCP_NODELAY=1 succeeded
  182. Sun Dec 19 18:17:56 2010 TCPv4_CLIENT link local: [undef]
  183. Sun Dec 19 18:17:56 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
  184. Sun Dec 19 18:17:56 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=d720ad12 e0daf36e
  185. Sun Dec 19 18:17:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  186. Sun Dec 19 18:17:57 2010 VERIFY OK: nsCertType=SERVER
  187. Sun Dec 19 18:17:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  188. Sun Dec 19 18:18:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  189. Sun Dec 19 18:18:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  190. Sun Dec 19 18:18:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  191. Sun Dec 19 18:18:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  192. Sun Dec 19 18:18:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  193. Sun Dec 19 18:18:02 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
  194. Sun Dec 19 18:18:04 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  195. Sun Dec 19 18:18:04 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  196. Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: timers and/or timeouts modified
  197. Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: --socket-flags option modified
  198. Sun Dec 19 18:18:04 2010 Socket flags: TCP_NODELAY=1 succeeded
  199. Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: --ifconfig/up options modified
  200. Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: route options modified
  201. Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: route-related options modified
  202. Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  203. Sun Dec 19 18:18:04 2010 Preserving previous TUN/TAP instance: tun0
  204. Sun Dec 19 18:18:04 2010 Initialization Sequence Completed
  205. Sun Dec 19 18:33:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  206. Sun Dec 19 18:33:03 2010 VERIFY OK: nsCertType=SERVER
  207. Sun Dec 19 18:33:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  208. Sun Dec 19 18:33:06 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  209. Sun Dec 19 18:33:06 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  210. Sun Dec 19 18:33:06 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  211. Sun Dec 19 18:33:06 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  212. Sun Dec 19 18:33:06 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  213. Sun Dec 19 18:48:08 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  214. Sun Dec 19 18:48:08 2010 VERIFY OK: nsCertType=SERVER
  215. Sun Dec 19 18:48:08 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  216. Sun Dec 19 18:48:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  217. Sun Dec 19 18:48:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  218. Sun Dec 19 18:48:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  219. Sun Dec 19 18:48:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  220. Sun Dec 19 18:48:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  221. Sun Dec 19 19:03:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  222. Sun Dec 19 19:03:14 2010 VERIFY OK: nsCertType=SERVER
  223. Sun Dec 19 19:03:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  224. Sun Dec 19 19:03:17 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  225. Sun Dec 19 19:03:17 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  226. Sun Dec 19 19:03:17 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  227. Sun Dec 19 19:03:17 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  228. Sun Dec 19 19:03:17 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  229. Sun Dec 19 19:18:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  230. Sun Dec 19 19:18:19 2010 VERIFY OK: nsCertType=SERVER
  231. Sun Dec 19 19:18:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  232. Sun Dec 19 19:18:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  233. Sun Dec 19 19:18:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  234. Sun Dec 19 19:18:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  235. Sun Dec 19 19:18:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  236. Sun Dec 19 19:18:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  237. Sun Dec 19 19:33:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  238. Sun Dec 19 19:33:25 2010 VERIFY OK: nsCertType=SERVER
  239. Sun Dec 19 19:33:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  240. Sun Dec 19 19:33:28 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  241. Sun Dec 19 19:33:28 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  242. Sun Dec 19 19:33:28 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  243. Sun Dec 19 19:33:28 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  244. Sun Dec 19 19:33:28 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  245. Sun Dec 19 19:48:29 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  246. Sun Dec 19 19:48:29 2010 VERIFY OK: nsCertType=SERVER
  247. Sun Dec 19 19:48:29 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  248. Sun Dec 19 19:48:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  249. Sun Dec 19 19:48:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  250. Sun Dec 19 19:48:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  251. Sun Dec 19 19:48:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  252. Sun Dec 19 19:48:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  253. Sun Dec 19 20:03:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  254. Sun Dec 19 20:03:35 2010 VERIFY OK: nsCertType=SERVER
  255. Sun Dec 19 20:03:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  256. Sun Dec 19 20:03:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  257. Sun Dec 19 20:03:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  258. Sun Dec 19 20:03:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  259. Sun Dec 19 20:03:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  260. Sun Dec 19 20:03:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  261. Sun Dec 19 20:18:41 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  262. Sun Dec 19 20:18:41 2010 VERIFY OK: nsCertType=SERVER
  263. Sun Dec 19 20:18:41 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  264. Sun Dec 19 20:18:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  265. Sun Dec 19 20:18:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  266. Sun Dec 19 20:18:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  267. Sun Dec 19 20:18:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  268. Sun Dec 19 20:18:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  269. Sun Dec 19 20:33:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  270. Sun Dec 19 20:33:45 2010 VERIFY OK: nsCertType=SERVER
  271. Sun Dec 19 20:33:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  272. Sun Dec 19 20:33:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  273. Sun Dec 19 20:33:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  274. Sun Dec 19 20:33:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  275. Sun Dec 19 20:33:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  276. Sun Dec 19 20:33:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  277. Sun Dec 19 20:48:51 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  278. Sun Dec 19 20:48:51 2010 VERIFY OK: nsCertType=SERVER
  279. Sun Dec 19 20:48:51 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  280. Sun Dec 19 20:48:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  281. Sun Dec 19 20:48:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  282. Sun Dec 19 20:48:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  283. Sun Dec 19 20:48:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  284. Sun Dec 19 20:48:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  285. Sun Dec 19 21:03:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  286. Sun Dec 19 21:03:57 2010 VERIFY OK: nsCertType=SERVER
  287. Sun Dec 19 21:03:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  288. Sun Dec 19 21:04:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  289. Sun Dec 19 21:04:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  290. Sun Dec 19 21:04:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  291. Sun Dec 19 21:04:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  292. Sun Dec 19 21:04:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  293. Sun Dec 19 21:19:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  294. Sun Dec 19 21:19:04 2010 VERIFY OK: nsCertType=SERVER
  295. Sun Dec 19 21:19:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  296. Sun Dec 19 21:19:07 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  297. Sun Dec 19 21:19:07 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  298. Sun Dec 19 21:19:07 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  299. Sun Dec 19 21:19:07 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  300. Sun Dec 19 21:19:07 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  301. Sun Dec 19 21:34:08 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  302. Sun Dec 19 21:34:08 2010 VERIFY OK: nsCertType=SERVER
  303. Sun Dec 19 21:34:08 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  304. Sun Dec 19 21:34:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  305. Sun Dec 19 21:34:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  306. Sun Dec 19 21:34:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  307. Sun Dec 19 21:34:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  308. Sun Dec 19 21:34:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  309. Sun Dec 19 21:49:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  310. Sun Dec 19 21:49:13 2010 VERIFY OK: nsCertType=SERVER
  311. Sun Dec 19 21:49:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  312. Sun Dec 19 21:49:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  313. Sun Dec 19 21:49:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  314. Sun Dec 19 21:49:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  315. Sun Dec 19 21:49:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  316. Sun Dec 19 21:49:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  317. Sun Dec 19 22:04:18 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  318. Sun Dec 19 22:04:18 2010 VERIFY OK: nsCertType=SERVER
  319. Sun Dec 19 22:04:18 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  320. Sun Dec 19 22:04:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  321. Sun Dec 19 22:04:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  322. Sun Dec 19 22:04:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  323. Sun Dec 19 22:04:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  324. Sun Dec 19 22:04:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  325. Sun Dec 19 22:19:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  326. Sun Dec 19 22:19:21 2010 VERIFY OK: nsCertType=SERVER
  327. Sun Dec 19 22:19:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  328. Sun Dec 19 22:19:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  329. Sun Dec 19 22:19:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  330. Sun Dec 19 22:19:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  331. Sun Dec 19 22:19:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  332. Sun Dec 19 22:19:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  333. Sun Dec 19 22:34:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  334. Sun Dec 19 22:34:25 2010 VERIFY OK: nsCertType=SERVER
  335. Sun Dec 19 22:34:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  336. Sun Dec 19 22:34:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  337. Sun Dec 19 22:34:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  338. Sun Dec 19 22:34:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  339. Sun Dec 19 22:34:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  340. Sun Dec 19 22:34:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  341. Sun Dec 19 22:49:29 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  342. Sun Dec 19 22:49:29 2010 VERIFY OK: nsCertType=SERVER
  343. Sun Dec 19 22:49:29 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  344. Sun Dec 19 22:49:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  345. Sun Dec 19 22:49:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  346. Sun Dec 19 22:49:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  347. Sun Dec 19 22:49:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  348. Sun Dec 19 22:49:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  349. Sun Dec 19 23:04:33 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  350. Sun Dec 19 23:04:33 2010 VERIFY OK: nsCertType=SERVER
  351. Sun Dec 19 23:04:33 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  352. Sun Dec 19 23:04:35 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  353. Sun Dec 19 23:04:35 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  354. Sun Dec 19 23:04:35 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  355. Sun Dec 19 23:04:35 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  356. Sun Dec 19 23:04:35 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  357. Sun Dec 19 23:19:37 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  358. Sun Dec 19 23:19:37 2010 VERIFY OK: nsCertType=SERVER
  359. Sun Dec 19 23:19:37 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  360. Sun Dec 19 23:19:40 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  361. Sun Dec 19 23:19:40 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  362. Sun Dec 19 23:19:40 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  363. Sun Dec 19 23:19:40 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  364. Sun Dec 19 23:19:40 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  365. Sun Dec 19 23:34:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  366. Sun Dec 19 23:34:43 2010 VERIFY OK: nsCertType=SERVER
  367. Sun Dec 19 23:34:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  368. Sun Dec 19 23:34:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  369. Sun Dec 19 23:34:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  370. Sun Dec 19 23:34:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  371. Sun Dec 19 23:34:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  372. Sun Dec 19 23:34:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  373. Sun Dec 19 23:49:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  374. Sun Dec 19 23:49:47 2010 VERIFY OK: nsCertType=SERVER
  375. Sun Dec 19 23:49:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  376. Sun Dec 19 23:49:50 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  377. Sun Dec 19 23:49:50 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  378. Sun Dec 19 23:49:50 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  379. Sun Dec 19 23:49:50 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  380. Sun Dec 19 23:49:50 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  381. Mon Dec 20 00:04:51 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  382. Mon Dec 20 00:04:51 2010 VERIFY OK: nsCertType=SERVER
  383. Mon Dec 20 00:04:51 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  384. Mon Dec 20 00:04:54 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  385. Mon Dec 20 00:04:54 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  386. Mon Dec 20 00:04:54 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  387. Mon Dec 20 00:04:54 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  388. Mon Dec 20 00:04:54 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  389. Mon Dec 20 00:19:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  390. Mon Dec 20 00:19:54 2010 VERIFY OK: nsCertType=SERVER
  391. Mon Dec 20 00:19:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  392. Mon Dec 20 00:19:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  393. Mon Dec 20 00:19:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  394. Mon Dec 20 00:19:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  395. Mon Dec 20 00:19:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  396. Mon Dec 20 00:19:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  397. Mon Dec 20 00:34:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  398. Mon Dec 20 00:34:57 2010 VERIFY OK: nsCertType=SERVER
  399. Mon Dec 20 00:34:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  400. Mon Dec 20 00:35:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  401. Mon Dec 20 00:35:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  402. Mon Dec 20 00:35:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  403. Mon Dec 20 00:35:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  404. Mon Dec 20 00:35:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  405. Mon Dec 20 00:50:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  406. Mon Dec 20 00:50:00 2010 VERIFY OK: nsCertType=SERVER
  407. Mon Dec 20 00:50:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  408. Mon Dec 20 00:50:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  409. Mon Dec 20 00:50:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  410. Mon Dec 20 00:50:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  411. Mon Dec 20 00:50:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  412. Mon Dec 20 00:50:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  413. Mon Dec 20 01:05:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  414. Mon Dec 20 01:05:03 2010 VERIFY OK: nsCertType=SERVER
  415. Mon Dec 20 01:05:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  416. Mon Dec 20 01:05:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  417. Mon Dec 20 01:05:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  418. Mon Dec 20 01:05:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  419. Mon Dec 20 01:05:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  420. Mon Dec 20 01:05:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  421. Mon Dec 20 01:20:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  422. Mon Dec 20 01:20:07 2010 VERIFY OK: nsCertType=SERVER
  423. Mon Dec 20 01:20:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  424. Mon Dec 20 01:20:10 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  425. Mon Dec 20 01:20:10 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  426. Mon Dec 20 01:20:10 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  427. Mon Dec 20 01:20:10 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  428. Mon Dec 20 01:20:10 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  429. Mon Dec 20 01:35:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  430. Mon Dec 20 01:35:10 2010 VERIFY OK: nsCertType=SERVER
  431. Mon Dec 20 01:35:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  432. Mon Dec 20 01:35:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  433. Mon Dec 20 01:35:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  434. Mon Dec 20 01:35:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  435. Mon Dec 20 01:35:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  436. Mon Dec 20 01:35:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  437. Mon Dec 20 01:50:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  438. Mon Dec 20 01:50:14 2010 VERIFY OK: nsCertType=SERVER
  439. Mon Dec 20 01:50:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  440. Mon Dec 20 01:50:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  441. Mon Dec 20 01:50:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  442. Mon Dec 20 01:50:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  443. Mon Dec 20 01:50:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  444. Mon Dec 20 01:50:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  445. Mon Dec 20 02:05:17 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  446. Mon Dec 20 02:05:17 2010 VERIFY OK: nsCertType=SERVER
  447. Mon Dec 20 02:05:17 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  448. Mon Dec 20 02:05:19 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  449. Mon Dec 20 02:05:19 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  450. Mon Dec 20 02:05:19 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  451. Mon Dec 20 02:05:19 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  452. Mon Dec 20 02:05:19 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  453. Mon Dec 20 02:20:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  454. Mon Dec 20 02:20:21 2010 VERIFY OK: nsCertType=SERVER
  455. Mon Dec 20 02:20:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  456. Mon Dec 20 02:20:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  457. Mon Dec 20 02:20:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  458. Mon Dec 20 02:20:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  459. Mon Dec 20 02:20:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  460. Mon Dec 20 02:20:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  461. Mon Dec 20 02:35:24 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  462. Mon Dec 20 02:35:24 2010 VERIFY OK: nsCertType=SERVER
  463. Mon Dec 20 02:35:24 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  464. Mon Dec 20 02:35:26 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  465. Mon Dec 20 02:35:26 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  466. Mon Dec 20 02:35:26 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  467. Mon Dec 20 02:35:26 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  468. Mon Dec 20 02:35:26 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  469. Mon Dec 20 02:50:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  470. Mon Dec 20 02:50:28 2010 VERIFY OK: nsCertType=SERVER
  471. Mon Dec 20 02:50:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  472. Mon Dec 20 02:50:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  473. Mon Dec 20 02:50:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  474. Mon Dec 20 02:50:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  475. Mon Dec 20 02:50:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  476. Mon Dec 20 02:50:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  477. Mon Dec 20 03:05:32 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  478. Mon Dec 20 03:05:32 2010 VERIFY OK: nsCertType=SERVER
  479. Mon Dec 20 03:05:32 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  480. Mon Dec 20 03:05:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  481. Mon Dec 20 03:05:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  482. Mon Dec 20 03:05:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  483. Mon Dec 20 03:05:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  484. Mon Dec 20 03:05:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  485. Mon Dec 20 03:20:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  486. Mon Dec 20 03:20:35 2010 VERIFY OK: nsCertType=SERVER
  487. Mon Dec 20 03:20:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  488. Mon Dec 20 03:20:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  489. Mon Dec 20 03:20:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  490. Mon Dec 20 03:20:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  491. Mon Dec 20 03:20:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  492. Mon Dec 20 03:20:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  493. Mon Dec 20 03:35:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  494. Mon Dec 20 03:35:39 2010 VERIFY OK: nsCertType=SERVER
  495. Mon Dec 20 03:35:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  496. Mon Dec 20 03:35:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  497. Mon Dec 20 03:35:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  498. Mon Dec 20 03:35:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  499. Mon Dec 20 03:35:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  500. Mon Dec 20 03:35:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  501. Mon Dec 20 03:50:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  502. Mon Dec 20 03:50:42 2010 VERIFY OK: nsCertType=SERVER
  503. Mon Dec 20 03:50:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  504. Mon Dec 20 03:50:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  505. Mon Dec 20 03:50:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  506. Mon Dec 20 03:50:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  507. Mon Dec 20 03:50:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  508. Mon Dec 20 03:50:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  509. Mon Dec 20 04:05:46 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  510. Mon Dec 20 04:05:46 2010 VERIFY OK: nsCertType=SERVER
  511. Mon Dec 20 04:05:46 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  512. Mon Dec 20 04:05:48 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  513. Mon Dec 20 04:05:48 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  514. Mon Dec 20 04:05:48 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  515. Mon Dec 20 04:05:48 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  516. Mon Dec 20 04:05:48 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  517. Mon Dec 20 04:20:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  518. Mon Dec 20 04:20:49 2010 VERIFY OK: nsCertType=SERVER
  519. Mon Dec 20 04:20:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  520. Mon Dec 20 04:20:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  521. Mon Dec 20 04:20:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  522. Mon Dec 20 04:20:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  523. Mon Dec 20 04:20:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  524. Mon Dec 20 04:20:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  525. Mon Dec 20 04:35:52 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  526. Mon Dec 20 04:35:52 2010 VERIFY OK: nsCertType=SERVER
  527. Mon Dec 20 04:35:52 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  528. Mon Dec 20 04:35:54 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  529. Mon Dec 20 04:35:54 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  530. Mon Dec 20 04:35:54 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  531. Mon Dec 20 04:35:54 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  532. Mon Dec 20 04:35:54 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  533. Mon Dec 20 04:50:55 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  534. Mon Dec 20 04:50:55 2010 VERIFY OK: nsCertType=SERVER
  535. Mon Dec 20 04:50:55 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  536. Mon Dec 20 04:50:58 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  537. Mon Dec 20 04:50:58 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  538. Mon Dec 20 04:50:58 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  539. Mon Dec 20 04:50:58 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  540. Mon Dec 20 04:50:58 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  541. Mon Dec 20 05:05:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  542. Mon Dec 20 05:05:58 2010 VERIFY OK: nsCertType=SERVER
  543. Mon Dec 20 05:05:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  544. Mon Dec 20 05:06:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  545. Mon Dec 20 05:06:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  546. Mon Dec 20 05:06:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  547. Mon Dec 20 05:06:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  548. Mon Dec 20 05:06:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  549. Mon Dec 20 05:21:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  550. Mon Dec 20 05:21:02 2010 VERIFY OK: nsCertType=SERVER
  551. Mon Dec 20 05:21:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  552. Mon Dec 20 05:21:04 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  553. Mon Dec 20 05:21:04 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  554. Mon Dec 20 05:21:04 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  555. Mon Dec 20 05:21:04 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  556. Mon Dec 20 05:21:04 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  557. Mon Dec 20 05:36:05 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  558. Mon Dec 20 05:36:05 2010 VERIFY OK: nsCertType=SERVER
  559. Mon Dec 20 05:36:05 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  560. Mon Dec 20 05:36:08 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  561. Mon Dec 20 05:36:08 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  562. Mon Dec 20 05:36:08 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  563. Mon Dec 20 05:36:08 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  564. Mon Dec 20 05:36:08 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  565. Mon Dec 20 05:51:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  566. Mon Dec 20 05:51:09 2010 VERIFY OK: nsCertType=SERVER
  567. Mon Dec 20 05:51:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  568. Mon Dec 20 05:51:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  569. Mon Dec 20 05:51:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  570. Mon Dec 20 05:51:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  571. Mon Dec 20 05:51:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  572. Mon Dec 20 05:51:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  573. Mon Dec 20 06:06:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  574. Mon Dec 20 06:06:13 2010 VERIFY OK: nsCertType=SERVER
  575. Mon Dec 20 06:06:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  576. Mon Dec 20 06:06:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  577. Mon Dec 20 06:06:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  578. Mon Dec 20 06:06:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  579. Mon Dec 20 06:06:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  580. Mon Dec 20 06:06:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  581. Mon Dec 20 06:21:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  582. Mon Dec 20 06:21:16 2010 VERIFY OK: nsCertType=SERVER
  583. Mon Dec 20 06:21:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  584. Mon Dec 20 06:21:19 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  585. Mon Dec 20 06:21:19 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  586. Mon Dec 20 06:21:19 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  587. Mon Dec 20 06:21:19 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  588. Mon Dec 20 06:21:19 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  589. Mon Dec 20 06:36:20 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  590. Mon Dec 20 06:36:20 2010 VERIFY OK: nsCertType=SERVER
  591. Mon Dec 20 06:36:20 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  592. Mon Dec 20 06:36:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  593. Mon Dec 20 06:36:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  594. Mon Dec 20 06:36:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  595. Mon Dec 20 06:36:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  596. Mon Dec 20 06:36:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  597. Mon Dec 20 06:51:24 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  598. Mon Dec 20 06:51:24 2010 VERIFY OK: nsCertType=SERVER
  599. Mon Dec 20 06:51:24 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  600. Mon Dec 20 06:51:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  601. Mon Dec 20 06:51:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  602. Mon Dec 20 06:51:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  603. Mon Dec 20 06:51:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  604. Mon Dec 20 06:51:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  605. Mon Dec 20 07:06:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  606. Mon Dec 20 07:06:28 2010 VERIFY OK: nsCertType=SERVER
  607. Mon Dec 20 07:06:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  608. Mon Dec 20 07:06:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  609. Mon Dec 20 07:06:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  610. Mon Dec 20 07:06:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  611. Mon Dec 20 07:06:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  612. Mon Dec 20 07:06:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  613. Mon Dec 20 07:21:31 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  614. Mon Dec 20 07:21:31 2010 VERIFY OK: nsCertType=SERVER
  615. Mon Dec 20 07:21:31 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  616. Mon Dec 20 07:21:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  617. Mon Dec 20 07:21:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  618. Mon Dec 20 07:21:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  619. Mon Dec 20 07:21:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  620. Mon Dec 20 07:21:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  621. Mon Dec 20 07:36:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  622. Mon Dec 20 07:36:35 2010 VERIFY OK: nsCertType=SERVER
  623. Mon Dec 20 07:36:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  624. Mon Dec 20 07:36:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  625. Mon Dec 20 07:36:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  626. Mon Dec 20 07:36:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  627. Mon Dec 20 07:36:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  628. Mon Dec 20 07:36:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  629. Mon Dec 20 07:51:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  630. Mon Dec 20 07:51:39 2010 VERIFY OK: nsCertType=SERVER
  631. Mon Dec 20 07:51:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  632. Mon Dec 20 07:51:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  633. Mon Dec 20 07:51:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  634. Mon Dec 20 07:51:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  635. Mon Dec 20 07:51:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  636. Mon Dec 20 07:51:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  637. Mon Dec 20 08:06:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  638. Mon Dec 20 08:06:43 2010 VERIFY OK: nsCertType=SERVER
  639. Mon Dec 20 08:06:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  640. Mon Dec 20 08:06:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  641. Mon Dec 20 08:06:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  642. Mon Dec 20 08:06:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  643. Mon Dec 20 08:06:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  644. Mon Dec 20 08:06:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  645. Mon Dec 20 08:21:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  646. Mon Dec 20 08:21:47 2010 VERIFY OK: nsCertType=SERVER
  647. Mon Dec 20 08:21:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  648. Mon Dec 20 08:21:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  649. Mon Dec 20 08:21:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  650. Mon Dec 20 08:21:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  651. Mon Dec 20 08:21:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  652. Mon Dec 20 08:21:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  653. Mon Dec 20 08:36:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  654. Mon Dec 20 08:36:50 2010 VERIFY OK: nsCertType=SERVER
  655. Mon Dec 20 08:36:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  656. Mon Dec 20 08:36:52 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  657. Mon Dec 20 08:36:52 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  658. Mon Dec 20 08:36:52 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  659. Mon Dec 20 08:36:52 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  660. Mon Dec 20 08:36:52 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  661. Mon Dec 20 08:51:53 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  662. Mon Dec 20 08:51:53 2010 VERIFY OK: nsCertType=SERVER
  663. Mon Dec 20 08:51:53 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  664. Mon Dec 20 08:51:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  665. Mon Dec 20 08:51:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  666. Mon Dec 20 08:51:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  667. Mon Dec 20 08:51:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  668. Mon Dec 20 08:51:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  669. Mon Dec 20 09:06:56 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  670. Mon Dec 20 09:06:56 2010 VERIFY OK: nsCertType=SERVER
  671. Mon Dec 20 09:06:56 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  672. Mon Dec 20 09:06:58 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  673. Mon Dec 20 09:06:58 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  674. Mon Dec 20 09:06:58 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  675. Mon Dec 20 09:06:58 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  676. Mon Dec 20 09:06:58 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  677. Mon Dec 20 09:22:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  678. Mon Dec 20 09:22:00 2010 VERIFY OK: nsCertType=SERVER
  679. Mon Dec 20 09:22:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  680. Mon Dec 20 09:22:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  681. Mon Dec 20 09:22:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  682. Mon Dec 20 09:22:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  683. Mon Dec 20 09:22:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  684. Mon Dec 20 09:22:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  685. Mon Dec 20 09:37:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  686. Mon Dec 20 09:37:03 2010 VERIFY OK: nsCertType=SERVER
  687. Mon Dec 20 09:37:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  688. Mon Dec 20 09:37:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  689. Mon Dec 20 09:37:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  690. Mon Dec 20 09:37:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  691. Mon Dec 20 09:37:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  692. Mon Dec 20 09:37:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  693. Mon Dec 20 09:52:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  694. Mon Dec 20 09:52:06 2010 VERIFY OK: nsCertType=SERVER
  695. Mon Dec 20 09:52:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  696. Mon Dec 20 09:52:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  697. Mon Dec 20 09:52:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  698. Mon Dec 20 09:52:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  699. Mon Dec 20 09:52:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  700. Mon Dec 20 09:52:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  701. Mon Dec 20 10:07:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  702. Mon Dec 20 10:07:10 2010 VERIFY OK: nsCertType=SERVER
  703. Mon Dec 20 10:07:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  704. Mon Dec 20 10:07:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  705. Mon Dec 20 10:07:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  706. Mon Dec 20 10:07:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  707. Mon Dec 20 10:07:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  708. Mon Dec 20 10:07:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  709. Mon Dec 20 10:22:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  710. Mon Dec 20 10:22:13 2010 VERIFY OK: nsCertType=SERVER
  711. Mon Dec 20 10:22:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  712. Mon Dec 20 10:22:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  713. Mon Dec 20 10:22:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  714. Mon Dec 20 10:22:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  715. Mon Dec 20 10:22:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  716. Mon Dec 20 10:22:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  717. Mon Dec 20 10:37:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  718. Mon Dec 20 10:37:16 2010 VERIFY OK: nsCertType=SERVER
  719. Mon Dec 20 10:37:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  720. Mon Dec 20 10:37:19 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  721. Mon Dec 20 10:37:19 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  722. Mon Dec 20 10:37:19 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  723. Mon Dec 20 10:37:19 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  724. Mon Dec 20 10:37:19 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  725. Mon Dec 20 10:52:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  726. Mon Dec 20 10:52:19 2010 VERIFY OK: nsCertType=SERVER
  727. Mon Dec 20 10:52:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  728. Mon Dec 20 10:52:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  729. Mon Dec 20 10:52:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  730. Mon Dec 20 10:52:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  731. Mon Dec 20 10:52:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  732. Mon Dec 20 10:52:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  733. Mon Dec 20 11:07:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  734. Mon Dec 20 11:07:23 2010 VERIFY OK: nsCertType=SERVER
  735. Mon Dec 20 11:07:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  736. Mon Dec 20 11:07:25 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  737. Mon Dec 20 11:07:25 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  738. Mon Dec 20 11:07:25 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  739. Mon Dec 20 11:07:25 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  740. Mon Dec 20 11:07:25 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  741. Mon Dec 20 11:22:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  742. Mon Dec 20 11:22:21 2010 VERIFY OK: nsCertType=SERVER
  743. Mon Dec 20 11:22:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  744. Mon Dec 20 11:22:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  745. Mon Dec 20 11:22:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  746. Mon Dec 20 11:22:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  747. Mon Dec 20 11:22:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  748. Mon Dec 20 11:22:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  749. Mon Dec 20 11:37:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  750. Mon Dec 20 11:37:25 2010 VERIFY OK: nsCertType=SERVER
  751. Mon Dec 20 11:37:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  752. Mon Dec 20 11:37:28 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  753. Mon Dec 20 11:37:28 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  754. Mon Dec 20 11:37:28 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  755. Mon Dec 20 11:37:28 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  756. Mon Dec 20 11:37:28 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  757. Mon Dec 20 11:52:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  758. Mon Dec 20 11:52:28 2010 VERIFY OK: nsCertType=SERVER
  759. Mon Dec 20 11:52:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  760. Mon Dec 20 11:52:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  761. Mon Dec 20 11:52:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  762. Mon Dec 20 11:52:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  763. Mon Dec 20 11:52:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  764. Mon Dec 20 11:52:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  765. Mon Dec 20 12:07:31 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  766. Mon Dec 20 12:07:31 2010 VERIFY OK: nsCertType=SERVER
  767. Mon Dec 20 12:07:31 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  768. Mon Dec 20 12:07:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  769. Mon Dec 20 12:07:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  770. Mon Dec 20 12:07:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  771. Mon Dec 20 12:07:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  772. Mon Dec 20 12:07:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  773. Mon Dec 20 12:22:34 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  774. Mon Dec 20 12:22:34 2010 VERIFY OK: nsCertType=SERVER
  775. Mon Dec 20 12:22:34 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  776. Mon Dec 20 12:22:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  777. Mon Dec 20 12:22:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  778. Mon Dec 20 12:22:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  779. Mon Dec 20 12:22:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  780. Mon Dec 20 12:22:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  781. Mon Dec 20 12:37:38 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  782. Mon Dec 20 12:37:38 2010 VERIFY OK: nsCertType=SERVER
  783. Mon Dec 20 12:37:38 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  784. Mon Dec 20 12:37:40 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  785. Mon Dec 20 12:37:40 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  786. Mon Dec 20 12:37:40 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  787. Mon Dec 20 12:37:40 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  788. Mon Dec 20 12:37:40 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  789. Mon Dec 20 12:52:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  790. Mon Dec 20 12:52:42 2010 VERIFY OK: nsCertType=SERVER
  791. Mon Dec 20 12:52:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  792. Mon Dec 20 12:52:44 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  793. Mon Dec 20 12:52:44 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  794. Mon Dec 20 12:52:44 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  795. Mon Dec 20 12:52:44 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  796. Mon Dec 20 12:52:44 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  797. Mon Dec 20 13:07:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  798. Mon Dec 20 13:07:45 2010 VERIFY OK: nsCertType=SERVER
  799. Mon Dec 20 13:07:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  800. Mon Dec 20 13:07:48 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  801. Mon Dec 20 13:07:48 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  802. Mon Dec 20 13:07:48 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  803. Mon Dec 20 13:07:48 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  804. Mon Dec 20 13:07:48 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  805. Mon Dec 20 13:22:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  806. Mon Dec 20 13:22:49 2010 VERIFY OK: nsCertType=SERVER
  807. Mon Dec 20 13:22:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  808. Mon Dec 20 13:22:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  809. Mon Dec 20 13:22:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  810. Mon Dec 20 13:22:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  811. Mon Dec 20 13:22:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  812. Mon Dec 20 13:22:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  813. Mon Dec 20 13:37:53 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  814. Mon Dec 20 13:37:53 2010 VERIFY OK: nsCertType=SERVER
  815. Mon Dec 20 13:37:53 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  816. Mon Dec 20 13:37:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  817. Mon Dec 20 13:37:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  818. Mon Dec 20 13:37:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  819. Mon Dec 20 13:37:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  820. Mon Dec 20 13:37:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  821. Mon Dec 20 13:53:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  822. Mon Dec 20 13:53:00 2010 VERIFY OK: nsCertType=SERVER
  823. Mon Dec 20 13:53:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  824. Mon Dec 20 13:53:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  825. Mon Dec 20 13:53:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  826. Mon Dec 20 13:53:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  827. Mon Dec 20 13:53:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  828. Mon Dec 20 13:53:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  829. Mon Dec 20 14:08:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  830. Mon Dec 20 14:08:06 2010 VERIFY OK: nsCertType=SERVER
  831. Mon Dec 20 14:08:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  832. Mon Dec 20 14:08:08 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  833. Mon Dec 20 14:08:08 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  834. Mon Dec 20 14:08:08 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  835. Mon Dec 20 14:08:08 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  836. Mon Dec 20 14:08:08 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  837. Mon Dec 20 14:23:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  838. Mon Dec 20 14:23:09 2010 VERIFY OK: nsCertType=SERVER
  839. Mon Dec 20 14:23:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  840. Mon Dec 20 14:23:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  841. Mon Dec 20 14:23:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  842. Mon Dec 20 14:23:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  843. Mon Dec 20 14:23:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  844. Mon Dec 20 14:23:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  845. Mon Dec 20 14:38:12 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  846. Mon Dec 20 14:38:12 2010 VERIFY OK: nsCertType=SERVER
  847. Mon Dec 20 14:38:12 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  848. Mon Dec 20 14:38:14 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  849. Mon Dec 20 14:38:14 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  850. Mon Dec 20 14:38:14 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  851. Mon Dec 20 14:38:14 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  852. Mon Dec 20 14:38:14 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  853. Mon Dec 20 14:53:15 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  854. Mon Dec 20 14:53:15 2010 VERIFY OK: nsCertType=SERVER
  855. Mon Dec 20 14:53:15 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  856. Mon Dec 20 14:53:17 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  857. Mon Dec 20 14:53:17 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  858. Mon Dec 20 14:53:17 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  859. Mon Dec 20 14:53:17 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  860. Mon Dec 20 14:53:17 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  861. Mon Dec 20 15:08:18 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  862. Mon Dec 20 15:08:18 2010 VERIFY OK: nsCertType=SERVER
  863. Mon Dec 20 15:08:18 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  864. Mon Dec 20 15:08:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  865. Mon Dec 20 15:08:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  866. Mon Dec 20 15:08:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  867. Mon Dec 20 15:08:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  868. Mon Dec 20 15:08:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  869. ^CMon Dec 20 15:14:00 2010 event_wait : Interrupted system call (code=4)
  870. Mon Dec 20 15:14:00 2010 TCP/UDP: Closing socket
  871. Mon Dec 20 15:14:00 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
  872. Mon Dec 20 15:14:00 2010 /sbin/route del -net 188.65.74.98 netmask 255.255.255.255
  873. Mon Dec 20 15:14:00 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  874. Mon Dec 20 15:14:00 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  875. Mon Dec 20 15:14:00 2010 Closing TUN/TAP interface
  876. Mon Dec 20 15:14:00 2010 /sbin/ifconfig tun0 0.0.0.0
  877. Mon Dec 20 15:14:00 2010 SIGINT[hard,] received, process exiting
  878. root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
  879. Mon Dec 20 15:14:02 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
  880. Mon Dec 20 15:14:02 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  881. Mon Dec 20 15:14:02 2010 WARNING: file 'cert.dat' is group or others accessible
  882. Mon Dec 20 15:14:02 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
  883. Mon Dec 20 15:14:02 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  884. Mon Dec 20 15:14:02 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  885. Mon Dec 20 15:14:02 2010 Local Options hash (VER=V4): 'bf6006bf'
  886. Mon Dec 20 15:14:02 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  887. Mon Dec 20 15:14:02 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  888. Mon Dec 20 15:14:03 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  889. Mon Dec 20 15:14:03 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  890. Mon Dec 20 15:14:03 2010 TCPv4_CLIENT link local: [undef]
  891. Mon Dec 20 15:14:03 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  892. Mon Dec 20 15:14:03 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=84378c0c f34aa8b1
  893. Mon Dec 20 15:14:05 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  894. Mon Dec 20 15:14:05 2010 VERIFY OK: nsCertType=SERVER
  895. Mon Dec 20 15:14:05 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  896. Mon Dec 20 15:14:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  897. Mon Dec 20 15:14:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  898. Mon Dec 20 15:14:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  899. Mon Dec 20 15:14:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  900. Mon Dec 20 15:14:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  901. Mon Dec 20 15:14:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  902. Mon Dec 20 15:14:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  903. Mon Dec 20 15:14:11 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  904. Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: timers and/or timeouts modified
  905. Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: --socket-flags option modified
  906. Mon Dec 20 15:14:11 2010 Socket flags: TCP_NODELAY=1 succeeded
  907. Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: --ifconfig/up options modified
  908. Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: route options modified
  909. Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: route-related options modified
  910. Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  911. Mon Dec 20 15:14:11 2010 ROUTE default_gateway=192.168.2.1
  912. Mon Dec 20 15:14:11 2010 TUN/TAP device tun0 opened
  913. Mon Dec 20 15:14:11 2010 TUN/TAP TX queue length set to 100
  914. Mon Dec 20 15:14:11 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
  915. Mon Dec 20 15:14:13 2010 /sbin/route add -net 93.190.142.152 netmask 255.255.255.255 gw 192.168.2.1
  916. Mon Dec 20 15:14:13 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  917. Mon Dec 20 15:14:13 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  918. Mon Dec 20 15:14:13 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
  919. Mon Dec 20 15:14:13 2010 Initialization Sequence Completed
  920. Mon Dec 20 15:29:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  921. Mon Dec 20 15:29:10 2010 VERIFY OK: nsCertType=SERVER
  922. Mon Dec 20 15:29:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  923. Mon Dec 20 15:29:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  924. Mon Dec 20 15:29:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  925. Mon Dec 20 15:29:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  926. Mon Dec 20 15:29:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  927. Mon Dec 20 15:29:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  928. Mon Dec 20 15:44:12 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  929. Mon Dec 20 15:44:12 2010 VERIFY OK: nsCertType=SERVER
  930. Mon Dec 20 15:44:12 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  931. Mon Dec 20 15:44:14 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  932. Mon Dec 20 15:44:14 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  933. Mon Dec 20 15:44:14 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  934. Mon Dec 20 15:44:14 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  935. Mon Dec 20 15:44:14 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  936. Mon Dec 20 15:59:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  937. Mon Dec 20 15:59:16 2010 VERIFY OK: nsCertType=SERVER
  938. Mon Dec 20 15:59:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  939. Mon Dec 20 15:59:18 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  940. Mon Dec 20 15:59:18 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  941. Mon Dec 20 15:59:18 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  942. Mon Dec 20 15:59:18 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  943. Mon Dec 20 15:59:18 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  944. Mon Dec 20 16:14:18 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  945. Mon Dec 20 16:14:18 2010 VERIFY OK: nsCertType=SERVER
  946. Mon Dec 20 16:14:18 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  947. Mon Dec 20 16:14:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  948. Mon Dec 20 16:14:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  949. Mon Dec 20 16:14:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  950. Mon Dec 20 16:14:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  951. Mon Dec 20 16:14:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  952. Mon Dec 20 16:29:22 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  953. Mon Dec 20 16:29:22 2010 VERIFY OK: nsCertType=SERVER
  954. Mon Dec 20 16:29:22 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  955. Mon Dec 20 16:29:24 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  956. Mon Dec 20 16:29:24 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  957. Mon Dec 20 16:29:24 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  958. Mon Dec 20 16:29:24 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  959. Mon Dec 20 16:29:24 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  960. Mon Dec 20 16:44:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  961. Mon Dec 20 16:44:25 2010 VERIFY OK: nsCertType=SERVER
  962. Mon Dec 20 16:44:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  963. Mon Dec 20 16:44:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  964. Mon Dec 20 16:44:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  965. Mon Dec 20 16:44:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  966. Mon Dec 20 16:44:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  967. Mon Dec 20 16:44:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  968. Mon Dec 20 16:59:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  969. Mon Dec 20 16:59:28 2010 VERIFY OK: nsCertType=SERVER
  970. Mon Dec 20 16:59:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  971. Mon Dec 20 16:59:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  972. Mon Dec 20 16:59:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  973. Mon Dec 20 16:59:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  974. Mon Dec 20 16:59:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  975. Mon Dec 20 16:59:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  976. Mon Dec 20 17:14:31 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  977. Mon Dec 20 17:14:31 2010 VERIFY OK: nsCertType=SERVER
  978. Mon Dec 20 17:14:31 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  979. Mon Dec 20 17:14:33 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  980. Mon Dec 20 17:14:33 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  981. Mon Dec 20 17:14:33 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  982. Mon Dec 20 17:14:33 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  983. Mon Dec 20 17:14:33 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  984. Mon Dec 20 17:29:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  985. Mon Dec 20 17:29:35 2010 VERIFY OK: nsCertType=SERVER
  986. Mon Dec 20 17:29:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  987. Mon Dec 20 17:29:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  988. Mon Dec 20 17:29:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  989. Mon Dec 20 17:29:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  990. Mon Dec 20 17:29:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  991. Mon Dec 20 17:29:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  992. Mon Dec 20 17:44:37 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  993. Mon Dec 20 17:44:37 2010 VERIFY OK: nsCertType=SERVER
  994. Mon Dec 20 17:44:37 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  995. Mon Dec 20 17:44:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  996. Mon Dec 20 17:44:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  997. Mon Dec 20 17:44:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  998. Mon Dec 20 17:44:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  999. Mon Dec 20 17:44:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1000. Mon Dec 20 17:59:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1001. Mon Dec 20 17:59:39 2010 VERIFY OK: nsCertType=SERVER
  1002. Mon Dec 20 17:59:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1003. Mon Dec 20 17:59:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1004. Mon Dec 20 17:59:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1005. Mon Dec 20 17:59:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1006. Mon Dec 20 17:59:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1007. Mon Dec 20 17:59:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1008.  
  1009. ^CMon Dec 20 18:10:38 2010 event_wait : Interrupted system call (code=4)
  1010. Mon Dec 20 18:10:38 2010 TCP/UDP: Closing socket
  1011. Mon Dec 20 18:10:38 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
  1012. Mon Dec 20 18:10:38 2010 /sbin/route del -net 93.190.142.152 netmask 255.255.255.255
  1013. Mon Dec 20 18:10:38 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  1014. Mon Dec 20 18:10:38 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  1015. Mon Dec 20 18:10:38 2010 Closing TUN/TAP interface
  1016. Mon Dec 20 18:10:38 2010 /sbin/ifconfig tun0 0.0.0.0
  1017. Mon Dec 20 18:10:39 2010 SIGINT[hard,] received, process exiting
  1018. root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
  1019. Mon Dec 20 18:10:39 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
  1020. Mon Dec 20 18:10:39 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1021. Mon Dec 20 18:10:39 2010 WARNING: file 'cert.dat' is group or others accessible
  1022. Mon Dec 20 18:10:39 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
  1023. Mon Dec 20 18:10:39 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1024. Mon Dec 20 18:10:39 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1025. Mon Dec 20 18:10:39 2010 Local Options hash (VER=V4): 'bf6006bf'
  1026. Mon Dec 20 18:10:39 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1027. Mon Dec 20 18:10:39 2010 Attempting to establish TCP connection with [AF_INET]95.143.192.190:54111 [nonblock]
  1028. Mon Dec 20 18:10:49 2010 TCP: connect to [AF_INET]95.143.192.190:54111 failed, will try again in 5 seconds: Connection timed out
  1029. Mon Dec 20 18:10:49 2010 SIGUSR1[soft,init_instance] received, process restarting
  1030. Mon Dec 20 18:10:49 2010 Restart pause, 5 second(s)
  1031. Mon Dec 20 18:10:54 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1032. Mon Dec 20 18:10:54 2010 Re-using SSL/TLS context
  1033. Mon Dec 20 18:10:54 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1034. Mon Dec 20 18:10:54 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1035. Mon Dec 20 18:10:54 2010 Local Options hash (VER=V4): 'bf6006bf'
  1036. Mon Dec 20 18:10:54 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1037. Mon Dec 20 18:10:54 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
  1038. Mon Dec 20 18:10:55 2010 TCP connection established with [AF_INET]188.65.74.98:54111
  1039. Mon Dec 20 18:10:55 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1040. Mon Dec 20 18:10:55 2010 TCPv4_CLIENT link local: [undef]
  1041. Mon Dec 20 18:10:55 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
  1042. Mon Dec 20 18:10:55 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=ce82a98f fba1c929
  1043. Mon Dec 20 18:10:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1044. Mon Dec 20 18:10:57 2010 VERIFY OK: nsCertType=SERVER
  1045. Mon Dec 20 18:10:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1046. Mon Dec 20 18:11:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1047. Mon Dec 20 18:11:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1048. Mon Dec 20 18:11:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1049. Mon Dec 20 18:11:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1050. Mon Dec 20 18:11:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1051. Mon Dec 20 18:11:02 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
  1052. Mon Dec 20 18:11:04 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1053. Mon Dec 20 18:11:04 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1054. Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1055. Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: --socket-flags option modified
  1056. Mon Dec 20 18:11:04 2010 Socket flags: TCP_NODELAY=1 succeeded
  1057. Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1058. Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: route options modified
  1059. Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: route-related options modified
  1060. Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1061. Mon Dec 20 18:11:04 2010 ROUTE default_gateway=192.168.2.1
  1062. Mon Dec 20 18:11:04 2010 TUN/TAP device tun0 opened
  1063. Mon Dec 20 18:11:04 2010 TUN/TAP TX queue length set to 100
  1064. Mon Dec 20 18:11:04 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
  1065. Mon Dec 20 18:11:07 2010 /sbin/route add -net 188.65.74.98 netmask 255.255.255.255 gw 192.168.2.1
  1066. Mon Dec 20 18:11:07 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  1067. Mon Dec 20 18:11:07 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  1068. Mon Dec 20 18:11:07 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
  1069. Mon Dec 20 18:11:07 2010 Initialization Sequence Completed
  1070. ^CMon Dec 20 18:12:44 2010 event_wait : Interrupted system call (code=4)
  1071. Mon Dec 20 18:12:44 2010 TCP/UDP: Closing socket
  1072. Mon Dec 20 18:12:44 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
  1073. Mon Dec 20 18:12:44 2010 /sbin/route del -net 188.65.74.98 netmask 255.255.255.255
  1074. Mon Dec 20 18:12:44 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  1075. Mon Dec 20 18:12:44 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  1076. Mon Dec 20 18:12:44 2010 Closing TUN/TAP interface
  1077. Mon Dec 20 18:12:44 2010 /sbin/ifconfig tun0 0.0.0.0
  1078. Mon Dec 20 18:12:44 2010 SIGINT[hard,] received, process exiting
  1079. root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
  1080. Mon Dec 20 18:12:46 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
  1081. Mon Dec 20 18:12:46 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1082. Mon Dec 20 18:12:46 2010 WARNING: file 'cert.dat' is group or others accessible
  1083. Mon Dec 20 18:12:46 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
  1084. Mon Dec 20 18:12:47 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1085. Mon Dec 20 18:12:47 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1086. Mon Dec 20 18:12:47 2010 Local Options hash (VER=V4): 'bf6006bf'
  1087. Mon Dec 20 18:12:47 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1088. Mon Dec 20 18:12:47 2010 Attempting to establish TCP connection with [AF_INET]95.143.192.190:54111 [nonblock]
  1089. Mon Dec 20 18:12:48 2010 TCP connection established with [AF_INET]95.143.192.190:54111
  1090. Mon Dec 20 18:12:48 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1091. Mon Dec 20 18:12:48 2010 TCPv4_CLIENT link local: [undef]
  1092. Mon Dec 20 18:12:48 2010 TCPv4_CLIENT link remote: [AF_INET]95.143.192.190:54111
  1093. Mon Dec 20 18:12:48 2010 TLS: Initial packet from [AF_INET]95.143.192.190:54111, sid=0e0cbb11 8ef59c80
  1094. Mon Dec 20 18:12:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1095. Mon Dec 20 18:12:49 2010 VERIFY OK: nsCertType=SERVER
  1096. Mon Dec 20 18:12:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1097. Mon Dec 20 18:12:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1098. Mon Dec 20 18:12:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1099. Mon Dec 20 18:12:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1100. Mon Dec 20 18:12:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1101. Mon Dec 20 18:12:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1102. Mon Dec 20 18:12:53 2010 [server] Peer Connection Initiated with [AF_INET]95.143.192.190:54111
  1103. Mon Dec 20 18:12:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1104. Mon Dec 20 18:12:56 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1105. Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1106. Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: --socket-flags option modified
  1107. Mon Dec 20 18:12:56 2010 Socket flags: TCP_NODELAY=1 succeeded
  1108. Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1109. Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: route options modified
  1110. Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: route-related options modified
  1111. Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1112. Mon Dec 20 18:12:56 2010 ROUTE default_gateway=192.168.2.1
  1113. Mon Dec 20 18:12:56 2010 TUN/TAP device tun0 opened
  1114. Mon Dec 20 18:12:56 2010 TUN/TAP TX queue length set to 100
  1115. Mon Dec 20 18:12:56 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
  1116. Mon Dec 20 18:12:59 2010 /sbin/route add -net 95.143.192.190 netmask 255.255.255.255 gw 192.168.2.1
  1117. Mon Dec 20 18:12:59 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  1118. Mon Dec 20 18:12:59 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  1119. Mon Dec 20 18:12:59 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
  1120. Mon Dec 20 18:12:59 2010 Initialization Sequence Completed
  1121. Mon Dec 20 18:27:55 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1122. Mon Dec 20 18:27:55 2010 VERIFY OK: nsCertType=SERVER
  1123. Mon Dec 20 18:27:55 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1124. Mon Dec 20 18:27:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1125. Mon Dec 20 18:27:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1126. Mon Dec 20 18:27:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1127. Mon Dec 20 18:27:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1128. Mon Dec 20 18:27:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1129. Mon Dec 20 18:42:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1130. Mon Dec 20 18:42:58 2010 VERIFY OK: nsCertType=SERVER
  1131. Mon Dec 20 18:42:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1132. Mon Dec 20 18:43:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1133. Mon Dec 20 18:43:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1134. Mon Dec 20 18:43:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1135. Mon Dec 20 18:43:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1136. Mon Dec 20 18:43:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1137. Mon Dec 20 18:58:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1138. Mon Dec 20 18:58:02 2010 VERIFY OK: nsCertType=SERVER
  1139. Mon Dec 20 18:58:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1140. Mon Dec 20 18:58:04 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1141. Mon Dec 20 18:58:04 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1142. Mon Dec 20 18:58:04 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1143. Mon Dec 20 18:58:04 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1144. Mon Dec 20 18:58:04 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1145. Mon Dec 20 19:13:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1146. Mon Dec 20 19:13:06 2010 VERIFY OK: nsCertType=SERVER
  1147. Mon Dec 20 19:13:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1148. Mon Dec 20 19:13:08 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1149. Mon Dec 20 19:13:08 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1150. Mon Dec 20 19:13:08 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1151. Mon Dec 20 19:13:08 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1152. Mon Dec 20 19:13:08 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1153. Mon Dec 20 19:28:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1154. Mon Dec 20 19:28:10 2010 VERIFY OK: nsCertType=SERVER
  1155. Mon Dec 20 19:28:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1156. Mon Dec 20 19:28:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1157. Mon Dec 20 19:28:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1158. Mon Dec 20 19:28:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1159. Mon Dec 20 19:28:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1160. Mon Dec 20 19:28:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1161. Mon Dec 20 19:43:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1162. Mon Dec 20 19:43:13 2010 VERIFY OK: nsCertType=SERVER
  1163. Mon Dec 20 19:43:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1164. Mon Dec 20 19:43:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1165. Mon Dec 20 19:43:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1166. Mon Dec 20 19:43:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1167. Mon Dec 20 19:43:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1168. Mon Dec 20 19:43:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1169. Mon Dec 20 19:58:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1170. Mon Dec 20 19:58:16 2010 VERIFY OK: nsCertType=SERVER
  1171. Mon Dec 20 19:58:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1172. Mon Dec 20 19:58:18 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1173. Mon Dec 20 19:58:18 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1174. Mon Dec 20 19:58:18 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1175. Mon Dec 20 19:58:18 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1176. Mon Dec 20 19:58:18 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1177. ^CMon Dec 20 20:12:21 2010 event_wait : Interrupted system call (code=4)
  1178. Mon Dec 20 20:12:21 2010 TCP/UDP: Closing socket
  1179. Mon Dec 20 20:12:21 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
  1180. Mon Dec 20 20:12:21 2010 /sbin/route del -net 95.143.192.190 netmask 255.255.255.255
  1181. Mon Dec 20 20:12:21 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  1182. Mon Dec 20 20:12:21 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  1183. Mon Dec 20 20:12:21 2010 Closing TUN/TAP interface
  1184. Mon Dec 20 20:12:21 2010 /sbin/ifconfig tun0 0.0.0.0
  1185. Mon Dec 20 20:12:21 2010 SIGINT[hard,] received, process exiting
  1186. root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
  1187. Mon Dec 20 20:12:23 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
  1188. Mon Dec 20 20:12:23 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1189. Mon Dec 20 20:12:23 2010 WARNING: file 'cert.dat' is group or others accessible
  1190. Mon Dec 20 20:12:23 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
  1191. Mon Dec 20 20:12:24 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1192. Mon Dec 20 20:12:24 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1193. Mon Dec 20 20:12:24 2010 Local Options hash (VER=V4): 'bf6006bf'
  1194. Mon Dec 20 20:12:24 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1195. Mon Dec 20 20:12:24 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1196. Mon Dec 20 20:12:25 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1197. Mon Dec 20 20:12:25 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1198. Mon Dec 20 20:12:25 2010 TCPv4_CLIENT link local: [undef]
  1199. Mon Dec 20 20:12:25 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1200. Mon Dec 20 20:12:25 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=1da2d450 fc3456cc
  1201. Mon Dec 20 20:12:26 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1202. Mon Dec 20 20:12:26 2010 VERIFY OK: nsCertType=SERVER
  1203. Mon Dec 20 20:12:26 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1204. Mon Dec 20 20:12:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1205. Mon Dec 20 20:12:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1206. Mon Dec 20 20:12:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1207. Mon Dec 20 20:12:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1208. Mon Dec 20 20:12:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1209. Mon Dec 20 20:12:31 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1210. Mon Dec 20 20:12:33 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1211. Mon Dec 20 20:12:33 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1212. Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1213. Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: --socket-flags option modified
  1214. Mon Dec 20 20:12:33 2010 Socket flags: TCP_NODELAY=1 succeeded
  1215. Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1216. Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: route options modified
  1217. Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: route-related options modified
  1218. Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1219. Mon Dec 20 20:12:33 2010 ROUTE default_gateway=192.168.2.1
  1220. Mon Dec 20 20:12:33 2010 TUN/TAP device tun0 opened
  1221. Mon Dec 20 20:12:33 2010 TUN/TAP TX queue length set to 100
  1222. Mon Dec 20 20:12:33 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
  1223. Mon Dec 20 20:12:35 2010 /sbin/route add -net 93.190.142.152 netmask 255.255.255.255 gw 192.168.2.1
  1224. Mon Dec 20 20:12:35 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  1225. Mon Dec 20 20:12:35 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
  1226. Mon Dec 20 20:12:35 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
  1227. Mon Dec 20 20:12:35 2010 Initialization Sequence Completed
  1228. Mon Dec 20 20:21:32 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4150 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1229. Mon Dec 20 20:21:32 2010 Fatal decryption error (process_incoming_link), restarting
  1230. Mon Dec 20 20:21:32 2010 TCP/UDP: Closing socket
  1231. Mon Dec 20 20:21:32 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1232. Mon Dec 20 20:21:32 2010 Restart pause, 5 second(s)
  1233. Mon Dec 20 20:21:37 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1234. Mon Dec 20 20:21:37 2010 Re-using SSL/TLS context
  1235. Mon Dec 20 20:21:37 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1236. Mon Dec 20 20:21:37 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1237. Mon Dec 20 20:21:37 2010 Local Options hash (VER=V4): 'bf6006bf'
  1238. Mon Dec 20 20:21:37 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1239. Mon Dec 20 20:21:37 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1240. Mon Dec 20 20:21:41 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1241. Mon Dec 20 20:21:41 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1242. Mon Dec 20 20:21:41 2010 Socket flags: TCP_NODELAY=1 succeeded
  1243. Mon Dec 20 20:21:41 2010 TCPv4_CLIENT link local: [undef]
  1244. Mon Dec 20 20:21:41 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1245. Mon Dec 20 20:21:41 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=00768c72 d67c849b
  1246. Mon Dec 20 20:21:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1247. Mon Dec 20 20:21:42 2010 VERIFY OK: nsCertType=SERVER
  1248. Mon Dec 20 20:21:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1249. Mon Dec 20 20:21:46 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1250. Mon Dec 20 20:21:46 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1251. Mon Dec 20 20:21:46 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1252. Mon Dec 20 20:21:46 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1253. Mon Dec 20 20:21:46 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1254. Mon Dec 20 20:21:46 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1255. Mon Dec 20 20:21:48 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1256. Mon Dec 20 20:21:48 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1257. Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1258. Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: --socket-flags option modified
  1259. Mon Dec 20 20:21:48 2010 Socket flags: TCP_NODELAY=1 succeeded
  1260. Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1261. Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: route options modified
  1262. Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: route-related options modified
  1263. Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1264. Mon Dec 20 20:21:48 2010 Preserving previous TUN/TAP instance: tun0
  1265. Mon Dec 20 20:21:48 2010 Initialization Sequence Completed
  1266. Mon Dec 20 20:24:31 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1267. Mon Dec 20 20:24:31 2010 Fatal decryption error (process_incoming_link), restarting
  1268. Mon Dec 20 20:24:31 2010 TCP/UDP: Closing socket
  1269. Mon Dec 20 20:24:31 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1270. Mon Dec 20 20:24:31 2010 Restart pause, 5 second(s)
  1271. Mon Dec 20 20:24:36 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1272. Mon Dec 20 20:24:36 2010 Re-using SSL/TLS context
  1273. Mon Dec 20 20:24:36 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1274. Mon Dec 20 20:24:36 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1275. Mon Dec 20 20:24:36 2010 Local Options hash (VER=V4): 'bf6006bf'
  1276. Mon Dec 20 20:24:36 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1277. Mon Dec 20 20:24:36 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1278. Mon Dec 20 20:24:37 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1279. Mon Dec 20 20:24:37 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1280. Mon Dec 20 20:24:37 2010 Socket flags: TCP_NODELAY=1 succeeded
  1281. Mon Dec 20 20:24:37 2010 TCPv4_CLIENT link local: [undef]
  1282. Mon Dec 20 20:24:37 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1283. Mon Dec 20 20:24:38 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=30cc94fd a90f0e9f
  1284. Mon Dec 20 20:24:38 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1285. Mon Dec 20 20:24:38 2010 VERIFY OK: nsCertType=SERVER
  1286. Mon Dec 20 20:24:38 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1287. Mon Dec 20 20:24:42 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1288. Mon Dec 20 20:24:42 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1289. Mon Dec 20 20:24:42 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1290. Mon Dec 20 20:24:42 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1291. Mon Dec 20 20:24:42 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1292. Mon Dec 20 20:24:42 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1293. Mon Dec 20 20:24:44 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1294. Mon Dec 20 20:24:45 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1295. Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1296. Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: --socket-flags option modified
  1297. Mon Dec 20 20:24:45 2010 Socket flags: TCP_NODELAY=1 succeeded
  1298. Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1299. Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: route options modified
  1300. Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: route-related options modified
  1301. Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1302. Mon Dec 20 20:24:45 2010 Preserving previous TUN/TAP instance: tun0
  1303. Mon Dec 20 20:24:45 2010 Initialization Sequence Completed
  1304. Mon Dec 20 20:25:35 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1428 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1305. Mon Dec 20 20:25:35 2010 Fatal decryption error (process_incoming_link), restarting
  1306. Mon Dec 20 20:25:35 2010 TCP/UDP: Closing socket
  1307. Mon Dec 20 20:25:35 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1308. Mon Dec 20 20:25:35 2010 Restart pause, 5 second(s)
  1309. Mon Dec 20 20:25:40 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1310. Mon Dec 20 20:25:40 2010 Re-using SSL/TLS context
  1311. Mon Dec 20 20:25:40 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1312. Mon Dec 20 20:25:40 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1313. Mon Dec 20 20:25:40 2010 Local Options hash (VER=V4): 'bf6006bf'
  1314. Mon Dec 20 20:25:40 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1315. Mon Dec 20 20:25:40 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1316. Mon Dec 20 20:25:41 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1317. Mon Dec 20 20:25:41 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1318. Mon Dec 20 20:25:41 2010 Socket flags: TCP_NODELAY=1 succeeded
  1319. Mon Dec 20 20:25:41 2010 TCPv4_CLIENT link local: [undef]
  1320. Mon Dec 20 20:25:41 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1321. Mon Dec 20 20:25:41 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=2ad6ef9e 44f983c0
  1322. Mon Dec 20 20:25:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1323. Mon Dec 20 20:25:42 2010 VERIFY OK: nsCertType=SERVER
  1324. Mon Dec 20 20:25:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1325. Mon Dec 20 20:25:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1326. Mon Dec 20 20:25:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1327. Mon Dec 20 20:25:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1328. Mon Dec 20 20:25:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1329. Mon Dec 20 20:25:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1330. Mon Dec 20 20:25:45 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1331. Mon Dec 20 20:25:47 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1332. Mon Dec 20 20:25:48 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1333. Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1334. Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: --socket-flags option modified
  1335. Mon Dec 20 20:25:48 2010 Socket flags: TCP_NODELAY=1 succeeded
  1336. Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1337. Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: route options modified
  1338. Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: route-related options modified
  1339. Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1340. Mon Dec 20 20:25:48 2010 Preserving previous TUN/TAP instance: tun0
  1341. Mon Dec 20 20:25:48 2010 Initialization Sequence Completed
  1342. Mon Dec 20 20:26:14 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #749 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1343. Mon Dec 20 20:26:14 2010 Fatal decryption error (process_incoming_link), restarting
  1344. Mon Dec 20 20:26:14 2010 TCP/UDP: Closing socket
  1345. Mon Dec 20 20:26:14 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1346. Mon Dec 20 20:26:14 2010 Restart pause, 5 second(s)
  1347. Mon Dec 20 20:26:19 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1348. Mon Dec 20 20:26:19 2010 Re-using SSL/TLS context
  1349. Mon Dec 20 20:26:19 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1350. Mon Dec 20 20:26:19 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1351. Mon Dec 20 20:26:19 2010 Local Options hash (VER=V4): 'bf6006bf'
  1352. Mon Dec 20 20:26:19 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1353. Mon Dec 20 20:26:19 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1354. Mon Dec 20 20:26:20 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1355. Mon Dec 20 20:26:20 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1356. Mon Dec 20 20:26:20 2010 Socket flags: TCP_NODELAY=1 succeeded
  1357. Mon Dec 20 20:26:20 2010 TCPv4_CLIENT link local: [undef]
  1358. Mon Dec 20 20:26:20 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1359. Mon Dec 20 20:26:20 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9f7b1373 9f5a4a83
  1360. Mon Dec 20 20:26:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1361. Mon Dec 20 20:26:21 2010 VERIFY OK: nsCertType=SERVER
  1362. Mon Dec 20 20:26:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1363. Mon Dec 20 20:26:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1364. Mon Dec 20 20:26:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1365. Mon Dec 20 20:26:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1366. Mon Dec 20 20:26:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1367. Mon Dec 20 20:26:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1368. Mon Dec 20 20:26:23 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1369. Mon Dec 20 20:26:25 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1370. Mon Dec 20 20:26:25 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1371. Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1372. Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: --socket-flags option modified
  1373. Mon Dec 20 20:26:25 2010 Socket flags: TCP_NODELAY=1 succeeded
  1374. Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1375. Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: route options modified
  1376. Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: route-related options modified
  1377. Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1378. Mon Dec 20 20:26:25 2010 Preserving previous TUN/TAP instance: tun0
  1379. Mon Dec 20 20:26:25 2010 Initialization Sequence Completed
  1380. Mon Dec 20 20:26:54 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #741 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1381. Mon Dec 20 20:26:54 2010 Fatal decryption error (process_incoming_link), restarting
  1382. Mon Dec 20 20:26:54 2010 TCP/UDP: Closing socket
  1383. Mon Dec 20 20:26:54 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1384. Mon Dec 20 20:26:54 2010 Restart pause, 5 second(s)
  1385. Mon Dec 20 20:26:59 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1386. Mon Dec 20 20:26:59 2010 Re-using SSL/TLS context
  1387. Mon Dec 20 20:26:59 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1388. Mon Dec 20 20:26:59 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1389. Mon Dec 20 20:26:59 2010 Local Options hash (VER=V4): 'bf6006bf'
  1390. Mon Dec 20 20:26:59 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1391. Mon Dec 20 20:26:59 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1392. Mon Dec 20 20:27:00 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1393. Mon Dec 20 20:27:00 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1394. Mon Dec 20 20:27:00 2010 Socket flags: TCP_NODELAY=1 succeeded
  1395. Mon Dec 20 20:27:00 2010 TCPv4_CLIENT link local: [undef]
  1396. Mon Dec 20 20:27:00 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1397. Mon Dec 20 20:27:00 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=32733a54 c830041e
  1398. Mon Dec 20 20:27:01 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1399. Mon Dec 20 20:27:01 2010 VERIFY OK: nsCertType=SERVER
  1400. Mon Dec 20 20:27:01 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1401. Mon Dec 20 20:27:03 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1402. Mon Dec 20 20:27:03 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1403. Mon Dec 20 20:27:03 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1404. Mon Dec 20 20:27:03 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1405. Mon Dec 20 20:27:03 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1406. Mon Dec 20 20:27:03 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1407. Mon Dec 20 20:27:05 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1408. Mon Dec 20 20:27:06 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1409. Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1410. Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: --socket-flags option modified
  1411. Mon Dec 20 20:27:06 2010 Socket flags: TCP_NODELAY=1 succeeded
  1412. Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1413. Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: route options modified
  1414. Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: route-related options modified
  1415. Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1416. Mon Dec 20 20:27:06 2010 Preserving previous TUN/TAP instance: tun0
  1417. Mon Dec 20 20:27:06 2010 Initialization Sequence Completed
  1418. Mon Dec 20 20:27:21 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1596 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1419. Mon Dec 20 20:27:21 2010 Fatal decryption error (process_incoming_link), restarting
  1420. Mon Dec 20 20:27:21 2010 TCP/UDP: Closing socket
  1421. Mon Dec 20 20:27:21 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1422. Mon Dec 20 20:27:21 2010 Restart pause, 5 second(s)
  1423. Mon Dec 20 20:27:26 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1424. Mon Dec 20 20:27:26 2010 Re-using SSL/TLS context
  1425. Mon Dec 20 20:27:26 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1426. Mon Dec 20 20:27:26 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1427. Mon Dec 20 20:27:26 2010 Local Options hash (VER=V4): 'bf6006bf'
  1428. Mon Dec 20 20:27:26 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1429. Mon Dec 20 20:27:26 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1430. Mon Dec 20 20:27:27 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1431. Mon Dec 20 20:27:27 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1432. Mon Dec 20 20:27:27 2010 Socket flags: TCP_NODELAY=1 succeeded
  1433. Mon Dec 20 20:27:27 2010 TCPv4_CLIENT link local: [undef]
  1434. Mon Dec 20 20:27:27 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1435. Mon Dec 20 20:27:27 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=41241376 c661af2f
  1436. Mon Dec 20 20:27:27 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1437. Mon Dec 20 20:27:27 2010 VERIFY OK: nsCertType=SERVER
  1438. Mon Dec 20 20:27:27 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1439. Mon Dec 20 20:27:29 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1440. Mon Dec 20 20:27:29 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1441. Mon Dec 20 20:27:29 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1442. Mon Dec 20 20:27:29 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1443. Mon Dec 20 20:27:29 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1444. Mon Dec 20 20:27:29 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1445. Mon Dec 20 20:27:32 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1446. Mon Dec 20 20:27:32 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1447. Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1448. Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: --socket-flags option modified
  1449. Mon Dec 20 20:27:32 2010 Socket flags: TCP_NODELAY=1 succeeded
  1450. Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1451. Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: route options modified
  1452. Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: route-related options modified
  1453. Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1454. Mon Dec 20 20:27:32 2010 Preserving previous TUN/TAP instance: tun0
  1455. Mon Dec 20 20:27:32 2010 Initialization Sequence Completed
  1456. Mon Dec 20 20:27:57 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2712 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1457. Mon Dec 20 20:27:57 2010 Fatal decryption error (process_incoming_link), restarting
  1458. Mon Dec 20 20:27:57 2010 TCP/UDP: Closing socket
  1459. Mon Dec 20 20:27:57 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1460. Mon Dec 20 20:27:57 2010 Restart pause, 5 second(s)
  1461. Mon Dec 20 20:28:02 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1462. Mon Dec 20 20:28:02 2010 Re-using SSL/TLS context
  1463. Mon Dec 20 20:28:02 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1464. Mon Dec 20 20:28:02 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1465. Mon Dec 20 20:28:02 2010 Local Options hash (VER=V4): 'bf6006bf'
  1466. Mon Dec 20 20:28:02 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1467. Mon Dec 20 20:28:02 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1468. Mon Dec 20 20:28:03 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1469. Mon Dec 20 20:28:03 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1470. Mon Dec 20 20:28:03 2010 Socket flags: TCP_NODELAY=1 succeeded
  1471. Mon Dec 20 20:28:03 2010 TCPv4_CLIENT link local: [undef]
  1472. Mon Dec 20 20:28:03 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1473. Mon Dec 20 20:28:03 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=19ceb5de a6a8301c
  1474. Mon Dec 20 20:28:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1475. Mon Dec 20 20:28:04 2010 VERIFY OK: nsCertType=SERVER
  1476. Mon Dec 20 20:28:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1477. Mon Dec 20 20:28:06 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1478. Mon Dec 20 20:28:06 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1479. Mon Dec 20 20:28:06 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1480. Mon Dec 20 20:28:06 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1481. Mon Dec 20 20:28:06 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1482. Mon Dec 20 20:28:06 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1483. Mon Dec 20 20:28:08 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1484. Mon Dec 20 20:28:08 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1485. Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1486. Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: --socket-flags option modified
  1487. Mon Dec 20 20:28:08 2010 Socket flags: TCP_NODELAY=1 succeeded
  1488. Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1489. Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: route options modified
  1490. Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: route-related options modified
  1491. Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1492. Mon Dec 20 20:28:08 2010 Preserving previous TUN/TAP instance: tun0
  1493. Mon Dec 20 20:28:08 2010 Initialization Sequence Completed
  1494. Mon Dec 20 20:28:20 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #643 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1495. Mon Dec 20 20:28:20 2010 Fatal decryption error (process_incoming_link), restarting
  1496. Mon Dec 20 20:28:20 2010 TCP/UDP: Closing socket
  1497. Mon Dec 20 20:28:20 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1498. Mon Dec 20 20:28:20 2010 Restart pause, 5 second(s)
  1499. Mon Dec 20 20:28:25 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1500. Mon Dec 20 20:28:25 2010 Re-using SSL/TLS context
  1501. Mon Dec 20 20:28:25 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1502. Mon Dec 20 20:28:25 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1503. Mon Dec 20 20:28:25 2010 Local Options hash (VER=V4): 'bf6006bf'
  1504. Mon Dec 20 20:28:25 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1505. Mon Dec 20 20:28:25 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1506. Mon Dec 20 20:28:26 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1507. Mon Dec 20 20:28:26 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1508. Mon Dec 20 20:28:26 2010 Socket flags: TCP_NODELAY=1 succeeded
  1509. Mon Dec 20 20:28:26 2010 TCPv4_CLIENT link local: [undef]
  1510. Mon Dec 20 20:28:26 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1511. Mon Dec 20 20:28:26 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=89950036 b1c00a93
  1512. Mon Dec 20 20:28:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1513. Mon Dec 20 20:28:28 2010 VERIFY OK: nsCertType=SERVER
  1514. Mon Dec 20 20:28:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1515. Mon Dec 20 20:28:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1516. Mon Dec 20 20:28:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1517. Mon Dec 20 20:28:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1518. Mon Dec 20 20:28:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1519. Mon Dec 20 20:28:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1520. Mon Dec 20 20:28:30 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1521. Mon Dec 20 20:28:32 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1522. Mon Dec 20 20:28:32 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1523. Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1524. Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: --socket-flags option modified
  1525. Mon Dec 20 20:28:32 2010 Socket flags: TCP_NODELAY=1 succeeded
  1526. Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1527. Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: route options modified
  1528. Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: route-related options modified
  1529. Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1530. Mon Dec 20 20:28:32 2010 Preserving previous TUN/TAP instance: tun0
  1531. Mon Dec 20 20:28:32 2010 Initialization Sequence Completed
  1532. Mon Dec 20 20:29:08 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1673 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1533. Mon Dec 20 20:29:08 2010 Fatal decryption error (process_incoming_link), restarting
  1534. Mon Dec 20 20:29:08 2010 TCP/UDP: Closing socket
  1535. Mon Dec 20 20:29:08 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1536. Mon Dec 20 20:29:08 2010 Restart pause, 5 second(s)
  1537. Mon Dec 20 20:29:13 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1538. Mon Dec 20 20:29:13 2010 Re-using SSL/TLS context
  1539. Mon Dec 20 20:29:13 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1540. Mon Dec 20 20:29:13 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1541. Mon Dec 20 20:29:13 2010 Local Options hash (VER=V4): 'bf6006bf'
  1542. Mon Dec 20 20:29:13 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1543. Mon Dec 20 20:29:13 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1544. Mon Dec 20 20:29:17 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1545. Mon Dec 20 20:29:17 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1546. Mon Dec 20 20:29:17 2010 Socket flags: TCP_NODELAY=1 succeeded
  1547. Mon Dec 20 20:29:17 2010 TCPv4_CLIENT link local: [undef]
  1548. Mon Dec 20 20:29:17 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1549. Mon Dec 20 20:29:17 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=76c60739 1f6ed605
  1550. Mon Dec 20 20:29:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1551. Mon Dec 20 20:29:19 2010 VERIFY OK: nsCertType=SERVER
  1552. Mon Dec 20 20:29:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1553. Mon Dec 20 20:29:21 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1554. Mon Dec 20 20:29:21 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1555. Mon Dec 20 20:29:21 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1556. Mon Dec 20 20:29:21 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1557. Mon Dec 20 20:29:21 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1558. Mon Dec 20 20:29:21 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1559. Mon Dec 20 20:29:23 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1560. Mon Dec 20 20:29:23 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1561. Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1562. Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: --socket-flags option modified
  1563. Mon Dec 20 20:29:23 2010 Socket flags: TCP_NODELAY=1 succeeded
  1564. Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1565. Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: route options modified
  1566. Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: route-related options modified
  1567. Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1568. Mon Dec 20 20:29:23 2010 Preserving previous TUN/TAP instance: tun0
  1569. Mon Dec 20 20:29:23 2010 Initialization Sequence Completed
  1570. Mon Dec 20 20:29:39 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1571. Mon Dec 20 20:29:39 2010 Fatal decryption error (process_incoming_link), restarting
  1572. Mon Dec 20 20:29:39 2010 TCP/UDP: Closing socket
  1573. Mon Dec 20 20:29:39 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1574. Mon Dec 20 20:29:39 2010 Restart pause, 5 second(s)
  1575. Mon Dec 20 20:29:44 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1576. Mon Dec 20 20:29:44 2010 Re-using SSL/TLS context
  1577. Mon Dec 20 20:29:44 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1578. Mon Dec 20 20:29:44 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1579. Mon Dec 20 20:29:44 2010 Local Options hash (VER=V4): 'bf6006bf'
  1580. Mon Dec 20 20:29:44 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1581. Mon Dec 20 20:29:44 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1582. Mon Dec 20 20:29:45 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1583. Mon Dec 20 20:29:45 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1584. Mon Dec 20 20:29:45 2010 Socket flags: TCP_NODELAY=1 succeeded
  1585. Mon Dec 20 20:29:45 2010 TCPv4_CLIENT link local: [undef]
  1586. Mon Dec 20 20:29:45 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1587. Mon Dec 20 20:29:46 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=73ef5d5f a859cd8e
  1588. Mon Dec 20 20:29:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1589. Mon Dec 20 20:29:47 2010 VERIFY OK: nsCertType=SERVER
  1590. Mon Dec 20 20:29:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1591. Mon Dec 20 20:29:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1592. Mon Dec 20 20:29:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1593. Mon Dec 20 20:29:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1594. Mon Dec 20 20:29:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1595. Mon Dec 20 20:29:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1596. Mon Dec 20 20:29:49 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1597. Mon Dec 20 20:29:51 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1598. Mon Dec 20 20:29:51 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1599. Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1600. Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: --socket-flags option modified
  1601. Mon Dec 20 20:29:51 2010 Socket flags: TCP_NODELAY=1 succeeded
  1602. Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1603. Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: route options modified
  1604. Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: route-related options modified
  1605. Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1606. Mon Dec 20 20:29:51 2010 Preserving previous TUN/TAP instance: tun0
  1607. Mon Dec 20 20:29:51 2010 Initialization Sequence Completed
  1608. Mon Dec 20 20:30:02 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #619 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1609. Mon Dec 20 20:30:02 2010 Fatal decryption error (process_incoming_link), restarting
  1610. Mon Dec 20 20:30:02 2010 TCP/UDP: Closing socket
  1611. Mon Dec 20 20:30:02 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1612. Mon Dec 20 20:30:02 2010 Restart pause, 5 second(s)
  1613. Mon Dec 20 20:30:07 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1614. Mon Dec 20 20:30:07 2010 Re-using SSL/TLS context
  1615. Mon Dec 20 20:30:07 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1616. Mon Dec 20 20:30:07 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1617. Mon Dec 20 20:30:07 2010 Local Options hash (VER=V4): 'bf6006bf'
  1618. Mon Dec 20 20:30:07 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1619. Mon Dec 20 20:30:07 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1620. Mon Dec 20 20:30:08 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1621. Mon Dec 20 20:30:08 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1622. Mon Dec 20 20:30:08 2010 Socket flags: TCP_NODELAY=1 succeeded
  1623. Mon Dec 20 20:30:08 2010 TCPv4_CLIENT link local: [undef]
  1624. Mon Dec 20 20:30:08 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1625. Mon Dec 20 20:30:08 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=4fd59fe4 7b74a9dd
  1626. Mon Dec 20 20:30:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1627. Mon Dec 20 20:30:09 2010 VERIFY OK: nsCertType=SERVER
  1628. Mon Dec 20 20:30:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1629. Mon Dec 20 20:30:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1630. Mon Dec 20 20:30:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1631. Mon Dec 20 20:30:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1632. Mon Dec 20 20:30:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1633. Mon Dec 20 20:30:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1634. Mon Dec 20 20:30:12 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1635. Mon Dec 20 20:30:14 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1636. Mon Dec 20 20:30:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1637. Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1638. Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: --socket-flags option modified
  1639. Mon Dec 20 20:30:14 2010 Socket flags: TCP_NODELAY=1 succeeded
  1640. Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1641. Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: route options modified
  1642. Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: route-related options modified
  1643. Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1644. Mon Dec 20 20:30:14 2010 Preserving previous TUN/TAP instance: tun0
  1645. Mon Dec 20 20:30:14 2010 Initialization Sequence Completed
  1646. Mon Dec 20 20:30:47 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1316 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1647. Mon Dec 20 20:30:47 2010 Fatal decryption error (process_incoming_link), restarting
  1648. Mon Dec 20 20:30:47 2010 TCP/UDP: Closing socket
  1649. Mon Dec 20 20:30:47 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1650. Mon Dec 20 20:30:47 2010 Restart pause, 5 second(s)
  1651. Mon Dec 20 20:30:52 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1652. Mon Dec 20 20:30:52 2010 Re-using SSL/TLS context
  1653. Mon Dec 20 20:30:52 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1654. Mon Dec 20 20:30:52 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1655. Mon Dec 20 20:30:52 2010 Local Options hash (VER=V4): 'bf6006bf'
  1656. Mon Dec 20 20:30:52 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1657. Mon Dec 20 20:30:52 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1658. Mon Dec 20 20:30:53 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1659. Mon Dec 20 20:30:53 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1660. Mon Dec 20 20:30:53 2010 Socket flags: TCP_NODELAY=1 succeeded
  1661. Mon Dec 20 20:30:53 2010 TCPv4_CLIENT link local: [undef]
  1662. Mon Dec 20 20:30:53 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1663. Mon Dec 20 20:30:53 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=79271e16 6b84d383
  1664. Mon Dec 20 20:30:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1665. Mon Dec 20 20:30:54 2010 VERIFY OK: nsCertType=SERVER
  1666. Mon Dec 20 20:30:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1667. Mon Dec 20 20:30:56 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1668. Mon Dec 20 20:30:56 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1669. Mon Dec 20 20:30:56 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1670. Mon Dec 20 20:30:56 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1671. Mon Dec 20 20:30:56 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1672. Mon Dec 20 20:30:56 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1673. Mon Dec 20 20:30:58 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1674. Mon Dec 20 20:30:58 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1675. Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1676. Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: --socket-flags option modified
  1677. Mon Dec 20 20:30:58 2010 Socket flags: TCP_NODELAY=1 succeeded
  1678. Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1679. Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: route options modified
  1680. Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: route-related options modified
  1681. Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1682. Mon Dec 20 20:30:58 2010 Preserving previous TUN/TAP instance: tun0
  1683. Mon Dec 20 20:30:58 2010 Initialization Sequence Completed
  1684. Mon Dec 20 20:31:08 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2030 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1685. Mon Dec 20 20:31:08 2010 Fatal decryption error (process_incoming_link), restarting
  1686. Mon Dec 20 20:31:08 2010 TCP/UDP: Closing socket
  1687. Mon Dec 20 20:31:08 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1688. Mon Dec 20 20:31:08 2010 Restart pause, 5 second(s)
  1689. Mon Dec 20 20:31:13 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1690. Mon Dec 20 20:31:13 2010 Re-using SSL/TLS context
  1691. Mon Dec 20 20:31:13 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1692. Mon Dec 20 20:31:13 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1693. Mon Dec 20 20:31:13 2010 Local Options hash (VER=V4): 'bf6006bf'
  1694. Mon Dec 20 20:31:13 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1695. Mon Dec 20 20:31:13 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1696. Mon Dec 20 20:31:14 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1697. Mon Dec 20 20:31:14 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1698. Mon Dec 20 20:31:14 2010 Socket flags: TCP_NODELAY=1 succeeded
  1699. Mon Dec 20 20:31:14 2010 TCPv4_CLIENT link local: [undef]
  1700. Mon Dec 20 20:31:14 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1701. Mon Dec 20 20:31:14 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9d340735 9597006c
  1702. Mon Dec 20 20:31:15 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1703. Mon Dec 20 20:31:15 2010 VERIFY OK: nsCertType=SERVER
  1704. Mon Dec 20 20:31:15 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1705. Mon Dec 20 20:31:18 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1706. Mon Dec 20 20:31:18 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1707. Mon Dec 20 20:31:18 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1708. Mon Dec 20 20:31:18 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1709. Mon Dec 20 20:31:18 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1710. Mon Dec 20 20:31:18 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1711. Mon Dec 20 20:31:20 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1712. Mon Dec 20 20:31:20 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1713. Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1714. Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: --socket-flags option modified
  1715. Mon Dec 20 20:31:20 2010 Socket flags: TCP_NODELAY=1 succeeded
  1716. Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1717. Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: route options modified
  1718. Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: route-related options modified
  1719. Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1720. Mon Dec 20 20:31:20 2010 Preserving previous TUN/TAP instance: tun0
  1721. Mon Dec 20 20:31:20 2010 Initialization Sequence Completed
  1722. Mon Dec 20 20:31:46 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1463 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1723. Mon Dec 20 20:31:46 2010 Fatal decryption error (process_incoming_link), restarting
  1724. Mon Dec 20 20:31:46 2010 TCP/UDP: Closing socket
  1725. Mon Dec 20 20:31:46 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1726. Mon Dec 20 20:31:46 2010 Restart pause, 5 second(s)
  1727. Mon Dec 20 20:31:51 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1728. Mon Dec 20 20:31:51 2010 Re-using SSL/TLS context
  1729. Mon Dec 20 20:31:51 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1730. Mon Dec 20 20:31:51 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1731. Mon Dec 20 20:31:51 2010 Local Options hash (VER=V4): 'bf6006bf'
  1732. Mon Dec 20 20:31:51 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1733. Mon Dec 20 20:31:51 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1734. Mon Dec 20 20:31:52 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1735. Mon Dec 20 20:31:52 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1736. Mon Dec 20 20:31:52 2010 Socket flags: TCP_NODELAY=1 succeeded
  1737. Mon Dec 20 20:31:52 2010 TCPv4_CLIENT link local: [undef]
  1738. Mon Dec 20 20:31:52 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1739. Mon Dec 20 20:31:53 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=7eb43599 23beea53
  1740. Mon Dec 20 20:31:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1741. Mon Dec 20 20:31:54 2010 VERIFY OK: nsCertType=SERVER
  1742. Mon Dec 20 20:31:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1743. Mon Dec 20 20:31:56 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1744. Mon Dec 20 20:31:56 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1745. Mon Dec 20 20:31:56 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1746. Mon Dec 20 20:31:56 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1747. Mon Dec 20 20:31:56 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1748. Mon Dec 20 20:31:56 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1749. Mon Dec 20 20:31:58 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1750. Mon Dec 20 20:31:59 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1751. Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1752. Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: --socket-flags option modified
  1753. Mon Dec 20 20:31:59 2010 Socket flags: TCP_NODELAY=1 succeeded
  1754. Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1755. Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: route options modified
  1756. Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: route-related options modified
  1757. Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1758. Mon Dec 20 20:31:59 2010 Preserving previous TUN/TAP instance: tun0
  1759. Mon Dec 20 20:31:59 2010 Initialization Sequence Completed
  1760. Mon Dec 20 20:32:32 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1195 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1761. Mon Dec 20 20:32:32 2010 Fatal decryption error (process_incoming_link), restarting
  1762. Mon Dec 20 20:32:32 2010 TCP/UDP: Closing socket
  1763. Mon Dec 20 20:32:32 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1764. Mon Dec 20 20:32:32 2010 Restart pause, 5 second(s)
  1765. Mon Dec 20 20:32:37 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1766. Mon Dec 20 20:32:37 2010 Re-using SSL/TLS context
  1767. Mon Dec 20 20:32:37 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1768. Mon Dec 20 20:32:37 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1769. Mon Dec 20 20:32:37 2010 Local Options hash (VER=V4): 'bf6006bf'
  1770. Mon Dec 20 20:32:37 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1771. Mon Dec 20 20:32:37 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1772. Mon Dec 20 20:32:38 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1773. Mon Dec 20 20:32:38 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1774. Mon Dec 20 20:32:38 2010 Socket flags: TCP_NODELAY=1 succeeded
  1775. Mon Dec 20 20:32:38 2010 TCPv4_CLIENT link local: [undef]
  1776. Mon Dec 20 20:32:38 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1777. Mon Dec 20 20:32:38 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=eb4bfc62 93d35100
  1778. Mon Dec 20 20:32:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1779. Mon Dec 20 20:32:39 2010 VERIFY OK: nsCertType=SERVER
  1780. Mon Dec 20 20:32:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1781. Mon Dec 20 20:32:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1782. Mon Dec 20 20:32:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1783. Mon Dec 20 20:32:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1784. Mon Dec 20 20:32:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1785. Mon Dec 20 20:32:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1786. Mon Dec 20 20:32:41 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1787. Mon Dec 20 20:32:43 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1788. Mon Dec 20 20:32:43 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1789. Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1790. Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: --socket-flags option modified
  1791. Mon Dec 20 20:32:43 2010 Socket flags: TCP_NODELAY=1 succeeded
  1792. Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1793. Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: route options modified
  1794. Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: route-related options modified
  1795. Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1796. Mon Dec 20 20:32:43 2010 Preserving previous TUN/TAP instance: tun0
  1797. Mon Dec 20 20:32:43 2010 Initialization Sequence Completed
  1798. Mon Dec 20 20:32:55 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1968 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1799. Mon Dec 20 20:32:55 2010 Fatal decryption error (process_incoming_link), restarting
  1800. Mon Dec 20 20:32:55 2010 TCP/UDP: Closing socket
  1801. Mon Dec 20 20:32:55 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1802. Mon Dec 20 20:32:55 2010 Restart pause, 5 second(s)
  1803. Mon Dec 20 20:33:00 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1804. Mon Dec 20 20:33:00 2010 Re-using SSL/TLS context
  1805. Mon Dec 20 20:33:00 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1806. Mon Dec 20 20:33:00 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1807. Mon Dec 20 20:33:00 2010 Local Options hash (VER=V4): 'bf6006bf'
  1808. Mon Dec 20 20:33:00 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1809. Mon Dec 20 20:33:00 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1810. Mon Dec 20 20:33:01 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1811. Mon Dec 20 20:33:01 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1812. Mon Dec 20 20:33:01 2010 Socket flags: TCP_NODELAY=1 succeeded
  1813. Mon Dec 20 20:33:01 2010 TCPv4_CLIENT link local: [undef]
  1814. Mon Dec 20 20:33:01 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1815. Mon Dec 20 20:33:02 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=47947869 5bbac972
  1816. Mon Dec 20 20:33:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1817. Mon Dec 20 20:33:03 2010 VERIFY OK: nsCertType=SERVER
  1818. Mon Dec 20 20:33:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1819. Mon Dec 20 20:33:06 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1820. Mon Dec 20 20:33:06 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1821. Mon Dec 20 20:33:06 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1822. Mon Dec 20 20:33:06 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1823. Mon Dec 20 20:33:06 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1824. Mon Dec 20 20:33:06 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1825. Mon Dec 20 20:33:08 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1826. Mon Dec 20 20:33:09 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1827. Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1828. Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: --socket-flags option modified
  1829. Mon Dec 20 20:33:09 2010 Socket flags: TCP_NODELAY=1 succeeded
  1830. Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1831. Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: route options modified
  1832. Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: route-related options modified
  1833. Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1834. Mon Dec 20 20:33:09 2010 Preserving previous TUN/TAP instance: tun0
  1835. Mon Dec 20 20:33:09 2010 Initialization Sequence Completed
  1836. Mon Dec 20 20:33:38 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1134 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1837. Mon Dec 20 20:33:38 2010 Fatal decryption error (process_incoming_link), restarting
  1838. Mon Dec 20 20:33:38 2010 TCP/UDP: Closing socket
  1839. Mon Dec 20 20:33:38 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1840. Mon Dec 20 20:33:38 2010 Restart pause, 5 second(s)
  1841. Mon Dec 20 20:33:43 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1842. Mon Dec 20 20:33:43 2010 Re-using SSL/TLS context
  1843. Mon Dec 20 20:33:43 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1844. Mon Dec 20 20:33:43 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1845. Mon Dec 20 20:33:43 2010 Local Options hash (VER=V4): 'bf6006bf'
  1846. Mon Dec 20 20:33:43 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1847. Mon Dec 20 20:33:43 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1848. Mon Dec 20 20:33:44 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1849. Mon Dec 20 20:33:44 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1850. Mon Dec 20 20:33:44 2010 Socket flags: TCP_NODELAY=1 succeeded
  1851. Mon Dec 20 20:33:44 2010 TCPv4_CLIENT link local: [undef]
  1852. Mon Dec 20 20:33:44 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1853. Mon Dec 20 20:33:45 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9ff1566a e6ab24a3
  1854. Mon Dec 20 20:33:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1855. Mon Dec 20 20:33:45 2010 VERIFY OK: nsCertType=SERVER
  1856. Mon Dec 20 20:33:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1857. Mon Dec 20 20:33:48 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1858. Mon Dec 20 20:33:48 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1859. Mon Dec 20 20:33:48 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1860. Mon Dec 20 20:33:48 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1861. Mon Dec 20 20:33:48 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1862. Mon Dec 20 20:33:48 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1863. Mon Dec 20 20:33:50 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1864. Mon Dec 20 20:33:50 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1865. Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1866. Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: --socket-flags option modified
  1867. Mon Dec 20 20:33:50 2010 Socket flags: TCP_NODELAY=1 succeeded
  1868. Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1869. Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: route options modified
  1870. Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: route-related options modified
  1871. Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1872. Mon Dec 20 20:33:50 2010 Preserving previous TUN/TAP instance: tun0
  1873. Mon Dec 20 20:33:50 2010 Initialization Sequence Completed
  1874. Mon Dec 20 20:34:20 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1194 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1875. Mon Dec 20 20:34:20 2010 Fatal decryption error (process_incoming_link), restarting
  1876. Mon Dec 20 20:34:20 2010 TCP/UDP: Closing socket
  1877. Mon Dec 20 20:34:20 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1878. Mon Dec 20 20:34:20 2010 Restart pause, 5 second(s)
  1879. Mon Dec 20 20:34:25 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1880. Mon Dec 20 20:34:25 2010 Re-using SSL/TLS context
  1881. Mon Dec 20 20:34:25 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1882. Mon Dec 20 20:34:25 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1883. Mon Dec 20 20:34:25 2010 Local Options hash (VER=V4): 'bf6006bf'
  1884. Mon Dec 20 20:34:25 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1885. Mon Dec 20 20:34:25 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1886. Mon Dec 20 20:34:26 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1887. Mon Dec 20 20:34:26 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1888. Mon Dec 20 20:34:26 2010 Socket flags: TCP_NODELAY=1 succeeded
  1889. Mon Dec 20 20:34:26 2010 TCPv4_CLIENT link local: [undef]
  1890. Mon Dec 20 20:34:26 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1891. Mon Dec 20 20:34:26 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d2d70bff 8718a9f9
  1892. Mon Dec 20 20:34:27 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1893. Mon Dec 20 20:34:27 2010 VERIFY OK: nsCertType=SERVER
  1894. Mon Dec 20 20:34:27 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1895. Mon Dec 20 20:34:29 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1896. Mon Dec 20 20:34:29 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1897. Mon Dec 20 20:34:29 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1898. Mon Dec 20 20:34:29 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1899. Mon Dec 20 20:34:29 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1900. Mon Dec 20 20:34:29 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1901. Mon Dec 20 20:34:31 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1902. Mon Dec 20 20:34:31 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1903. Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1904. Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: --socket-flags option modified
  1905. Mon Dec 20 20:34:31 2010 Socket flags: TCP_NODELAY=1 succeeded
  1906. Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1907. Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: route options modified
  1908. Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: route-related options modified
  1909. Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1910. Mon Dec 20 20:34:31 2010 Preserving previous TUN/TAP instance: tun0
  1911. Mon Dec 20 20:34:31 2010 Initialization Sequence Completed
  1912. Mon Dec 20 20:35:07 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1530 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1913. Mon Dec 20 20:35:07 2010 Fatal decryption error (process_incoming_link), restarting
  1914. Mon Dec 20 20:35:07 2010 TCP/UDP: Closing socket
  1915. Mon Dec 20 20:35:07 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1916. Mon Dec 20 20:35:07 2010 Restart pause, 5 second(s)
  1917. Mon Dec 20 20:35:12 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1918. Mon Dec 20 20:35:12 2010 Re-using SSL/TLS context
  1919. Mon Dec 20 20:35:12 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1920. Mon Dec 20 20:35:12 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1921. Mon Dec 20 20:35:12 2010 Local Options hash (VER=V4): 'bf6006bf'
  1922. Mon Dec 20 20:35:12 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1923. Mon Dec 20 20:35:12 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1924. Mon Dec 20 20:35:13 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1925. Mon Dec 20 20:35:13 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1926. Mon Dec 20 20:35:13 2010 Socket flags: TCP_NODELAY=1 succeeded
  1927. Mon Dec 20 20:35:13 2010 TCPv4_CLIENT link local: [undef]
  1928. Mon Dec 20 20:35:13 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1929. Mon Dec 20 20:35:13 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=32a08eec bdaa2b8d
  1930. Mon Dec 20 20:35:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1931. Mon Dec 20 20:35:14 2010 VERIFY OK: nsCertType=SERVER
  1932. Mon Dec 20 20:35:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1933. Mon Dec 20 20:35:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1934. Mon Dec 20 20:35:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1935. Mon Dec 20 20:35:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1936. Mon Dec 20 20:35:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1937. Mon Dec 20 20:35:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1938. Mon Dec 20 20:35:16 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1939. Mon Dec 20 20:35:18 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1940. Mon Dec 20 20:35:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1941. Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1942. Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: --socket-flags option modified
  1943. Mon Dec 20 20:35:18 2010 Socket flags: TCP_NODELAY=1 succeeded
  1944. Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1945. Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: route options modified
  1946. Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: route-related options modified
  1947. Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1948. Mon Dec 20 20:35:18 2010 Preserving previous TUN/TAP instance: tun0
  1949. Mon Dec 20 20:35:18 2010 Initialization Sequence Completed
  1950. Mon Dec 20 20:37:14 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2618 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1951. Mon Dec 20 20:37:14 2010 Fatal decryption error (process_incoming_link), restarting
  1952. Mon Dec 20 20:37:14 2010 TCP/UDP: Closing socket
  1953. Mon Dec 20 20:37:14 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1954. Mon Dec 20 20:37:14 2010 Restart pause, 5 second(s)
  1955. Mon Dec 20 20:37:19 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1956. Mon Dec 20 20:37:19 2010 Re-using SSL/TLS context
  1957. Mon Dec 20 20:37:19 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1958. Mon Dec 20 20:37:19 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1959. Mon Dec 20 20:37:19 2010 Local Options hash (VER=V4): 'bf6006bf'
  1960. Mon Dec 20 20:37:19 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1961. Mon Dec 20 20:37:19 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  1962. Mon Dec 20 20:37:20 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  1963. Mon Dec 20 20:37:20 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  1964. Mon Dec 20 20:37:20 2010 Socket flags: TCP_NODELAY=1 succeeded
  1965. Mon Dec 20 20:37:20 2010 TCPv4_CLIENT link local: [undef]
  1966. Mon Dec 20 20:37:20 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  1967. Mon Dec 20 20:37:20 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=bd0aa79b c86fcdef
  1968. Mon Dec 20 20:37:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  1969. Mon Dec 20 20:37:21 2010 VERIFY OK: nsCertType=SERVER
  1970. Mon Dec 20 20:37:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  1971. Mon Dec 20 20:37:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1972. Mon Dec 20 20:37:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1973. Mon Dec 20 20:37:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  1974. Mon Dec 20 20:37:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  1975. Mon Dec 20 20:37:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  1976. Mon Dec 20 20:37:23 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  1977. Mon Dec 20 20:37:25 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  1978. Mon Dec 20 20:37:25 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  1979. Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: timers and/or timeouts modified
  1980. Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: --socket-flags option modified
  1981. Mon Dec 20 20:37:25 2010 Socket flags: TCP_NODELAY=1 succeeded
  1982. Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: --ifconfig/up options modified
  1983. Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: route options modified
  1984. Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: route-related options modified
  1985. Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  1986. Mon Dec 20 20:37:25 2010 Preserving previous TUN/TAP instance: tun0
  1987. Mon Dec 20 20:37:25 2010 Initialization Sequence Completed
  1988. Mon Dec 20 20:37:42 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1770 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  1989. Mon Dec 20 20:37:42 2010 Fatal decryption error (process_incoming_link), restarting
  1990. Mon Dec 20 20:37:42 2010 TCP/UDP: Closing socket
  1991. Mon Dec 20 20:37:42 2010 SIGUSR1[soft,decryption-error] received, process restarting
  1992. Mon Dec 20 20:37:42 2010 Restart pause, 5 second(s)
  1993. Mon Dec 20 20:37:47 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  1994. Mon Dec 20 20:37:47 2010 Re-using SSL/TLS context
  1995. Mon Dec 20 20:37:47 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  1996. Mon Dec 20 20:37:47 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  1997. Mon Dec 20 20:37:47 2010 Local Options hash (VER=V4): 'bf6006bf'
  1998. Mon Dec 20 20:37:47 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  1999. Mon Dec 20 20:37:47 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2000. Mon Dec 20 20:37:48 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2001. Mon Dec 20 20:37:48 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2002. Mon Dec 20 20:37:48 2010 Socket flags: TCP_NODELAY=1 succeeded
  2003. Mon Dec 20 20:37:48 2010 TCPv4_CLIENT link local: [undef]
  2004. Mon Dec 20 20:37:48 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2005. Mon Dec 20 20:37:48 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=0ee31ce4 c43b8987
  2006. Mon Dec 20 20:37:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2007. Mon Dec 20 20:37:49 2010 VERIFY OK: nsCertType=SERVER
  2008. Mon Dec 20 20:37:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2009. Mon Dec 20 20:37:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2010. Mon Dec 20 20:37:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2011. Mon Dec 20 20:37:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2012. Mon Dec 20 20:37:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2013. Mon Dec 20 20:37:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2014. Mon Dec 20 20:37:51 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2015. Mon Dec 20 20:37:53 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2016. Mon Dec 20 20:37:53 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2017. Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2018. Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: --socket-flags option modified
  2019. Mon Dec 20 20:37:53 2010 Socket flags: TCP_NODELAY=1 succeeded
  2020. Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2021. Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: route options modified
  2022. Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: route-related options modified
  2023. Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2024. Mon Dec 20 20:37:53 2010 Preserving previous TUN/TAP instance: tun0
  2025. Mon Dec 20 20:37:53 2010 Initialization Sequence Completed
  2026. Mon Dec 20 20:38:22 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1440 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2027. Mon Dec 20 20:38:22 2010 Fatal decryption error (process_incoming_link), restarting
  2028. Mon Dec 20 20:38:22 2010 TCP/UDP: Closing socket
  2029. Mon Dec 20 20:38:22 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2030. Mon Dec 20 20:38:22 2010 Restart pause, 5 second(s)
  2031. Mon Dec 20 20:38:27 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2032. Mon Dec 20 20:38:27 2010 Re-using SSL/TLS context
  2033. Mon Dec 20 20:38:27 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2034. Mon Dec 20 20:38:27 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2035. Mon Dec 20 20:38:27 2010 Local Options hash (VER=V4): 'bf6006bf'
  2036. Mon Dec 20 20:38:27 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2037. Mon Dec 20 20:38:27 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2038. Mon Dec 20 20:38:28 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2039. Mon Dec 20 20:38:28 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2040. Mon Dec 20 20:38:28 2010 Socket flags: TCP_NODELAY=1 succeeded
  2041. Mon Dec 20 20:38:28 2010 TCPv4_CLIENT link local: [undef]
  2042. Mon Dec 20 20:38:28 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2043. Mon Dec 20 20:38:28 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=7b7d534f 679e384d
  2044. Mon Dec 20 20:38:29 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2045. Mon Dec 20 20:38:29 2010 VERIFY OK: nsCertType=SERVER
  2046. Mon Dec 20 20:38:29 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2047. Mon Dec 20 20:38:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2048. Mon Dec 20 20:38:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2049. Mon Dec 20 20:38:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2050. Mon Dec 20 20:38:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2051. Mon Dec 20 20:38:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2052. Mon Dec 20 20:38:31 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2053. Mon Dec 20 20:38:33 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2054. Mon Dec 20 20:38:33 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2055. Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2056. Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: --socket-flags option modified
  2057. Mon Dec 20 20:38:33 2010 Socket flags: TCP_NODELAY=1 succeeded
  2058. Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2059. Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: route options modified
  2060. Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: route-related options modified
  2061. Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2062. Mon Dec 20 20:38:33 2010 Preserving previous TUN/TAP instance: tun0
  2063. Mon Dec 20 20:38:33 2010 Initialization Sequence Completed
  2064. Mon Dec 20 20:38:55 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1366 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2065. Mon Dec 20 20:38:55 2010 Fatal decryption error (process_incoming_link), restarting
  2066. Mon Dec 20 20:38:55 2010 TCP/UDP: Closing socket
  2067. Mon Dec 20 20:38:55 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2068. Mon Dec 20 20:38:55 2010 Restart pause, 5 second(s)
  2069. Mon Dec 20 20:39:00 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2070. Mon Dec 20 20:39:00 2010 Re-using SSL/TLS context
  2071. Mon Dec 20 20:39:00 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2072. Mon Dec 20 20:39:00 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2073. Mon Dec 20 20:39:00 2010 Local Options hash (VER=V4): 'bf6006bf'
  2074. Mon Dec 20 20:39:00 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2075. Mon Dec 20 20:39:00 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2076. Mon Dec 20 20:39:01 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2077. Mon Dec 20 20:39:01 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2078. Mon Dec 20 20:39:01 2010 Socket flags: TCP_NODELAY=1 succeeded
  2079. Mon Dec 20 20:39:01 2010 TCPv4_CLIENT link local: [undef]
  2080. Mon Dec 20 20:39:01 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2081. Mon Dec 20 20:39:01 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=f3e709d9 93858607
  2082. Mon Dec 20 20:39:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2083. Mon Dec 20 20:39:02 2010 VERIFY OK: nsCertType=SERVER
  2084. Mon Dec 20 20:39:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2085. Mon Dec 20 20:39:04 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2086. Mon Dec 20 20:39:04 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2087. Mon Dec 20 20:39:04 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2088. Mon Dec 20 20:39:04 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2089. Mon Dec 20 20:39:04 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2090. Mon Dec 20 20:39:04 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2091. Mon Dec 20 20:39:07 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2092. Mon Dec 20 20:39:07 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2093. Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2094. Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: --socket-flags option modified
  2095. Mon Dec 20 20:39:07 2010 Socket flags: TCP_NODELAY=1 succeeded
  2096. Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2097. Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: route options modified
  2098. Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: route-related options modified
  2099. Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2100. Mon Dec 20 20:39:07 2010 Preserving previous TUN/TAP instance: tun0
  2101. Mon Dec 20 20:39:07 2010 Initialization Sequence Completed
  2102. Mon Dec 20 20:39:41 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4052 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2103. Mon Dec 20 20:39:41 2010 Fatal decryption error (process_incoming_link), restarting
  2104. Mon Dec 20 20:39:41 2010 TCP/UDP: Closing socket
  2105. Mon Dec 20 20:39:41 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2106. Mon Dec 20 20:39:41 2010 Restart pause, 5 second(s)
  2107. Mon Dec 20 20:39:46 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2108. Mon Dec 20 20:39:46 2010 Re-using SSL/TLS context
  2109. Mon Dec 20 20:39:46 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2110. Mon Dec 20 20:39:46 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2111. Mon Dec 20 20:39:46 2010 Local Options hash (VER=V4): 'bf6006bf'
  2112. Mon Dec 20 20:39:46 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2113. Mon Dec 20 20:39:46 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2114. Mon Dec 20 20:39:47 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2115. Mon Dec 20 20:39:47 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2116. Mon Dec 20 20:39:47 2010 Socket flags: TCP_NODELAY=1 succeeded
  2117. Mon Dec 20 20:39:47 2010 TCPv4_CLIENT link local: [undef]
  2118. Mon Dec 20 20:39:47 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2119. Mon Dec 20 20:39:47 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c491dcc1 af286578
  2120. Mon Dec 20 20:39:48 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2121. Mon Dec 20 20:39:48 2010 VERIFY OK: nsCertType=SERVER
  2122. Mon Dec 20 20:39:48 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2123. Mon Dec 20 20:39:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2124. Mon Dec 20 20:39:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2125. Mon Dec 20 20:39:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2126. Mon Dec 20 20:39:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2127. Mon Dec 20 20:39:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2128. Mon Dec 20 20:39:51 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2129. Mon Dec 20 20:39:53 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2130. Mon Dec 20 20:39:53 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2131. Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2132. Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: --socket-flags option modified
  2133. Mon Dec 20 20:39:53 2010 Socket flags: TCP_NODELAY=1 succeeded
  2134. Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2135. Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: route options modified
  2136. Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: route-related options modified
  2137. Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2138. Mon Dec 20 20:39:53 2010 Preserving previous TUN/TAP instance: tun0
  2139. Mon Dec 20 20:39:53 2010 Initialization Sequence Completed
  2140. Mon Dec 20 20:40:07 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #905 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2141. Mon Dec 20 20:40:07 2010 Fatal decryption error (process_incoming_link), restarting
  2142. Mon Dec 20 20:40:07 2010 TCP/UDP: Closing socket
  2143. Mon Dec 20 20:40:07 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2144. Mon Dec 20 20:40:07 2010 Restart pause, 5 second(s)
  2145. Mon Dec 20 20:40:12 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2146. Mon Dec 20 20:40:12 2010 Re-using SSL/TLS context
  2147. Mon Dec 20 20:40:12 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2148. Mon Dec 20 20:40:12 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2149. Mon Dec 20 20:40:12 2010 Local Options hash (VER=V4): 'bf6006bf'
  2150. Mon Dec 20 20:40:12 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2151. Mon Dec 20 20:40:12 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2152. Mon Dec 20 20:40:13 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2153. Mon Dec 20 20:40:13 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2154. Mon Dec 20 20:40:13 2010 Socket flags: TCP_NODELAY=1 succeeded
  2155. Mon Dec 20 20:40:13 2010 TCPv4_CLIENT link local: [undef]
  2156. Mon Dec 20 20:40:13 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2157. Mon Dec 20 20:40:13 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=ca0d2197 6d78c5f5
  2158. Mon Dec 20 20:40:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2159. Mon Dec 20 20:40:14 2010 VERIFY OK: nsCertType=SERVER
  2160. Mon Dec 20 20:40:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2161. Mon Dec 20 20:40:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2162. Mon Dec 20 20:40:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2163. Mon Dec 20 20:40:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2164. Mon Dec 20 20:40:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2165. Mon Dec 20 20:40:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2166. Mon Dec 20 20:40:16 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2167. Mon Dec 20 20:40:18 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2168. Mon Dec 20 20:40:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2169. Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2170. Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: --socket-flags option modified
  2171. Mon Dec 20 20:40:18 2010 Socket flags: TCP_NODELAY=1 succeeded
  2172. Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2173. Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: route options modified
  2174. Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: route-related options modified
  2175. Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2176. Mon Dec 20 20:40:18 2010 Preserving previous TUN/TAP instance: tun0
  2177. Mon Dec 20 20:40:18 2010 Initialization Sequence Completed
  2178. Mon Dec 20 20:40:30 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #738 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2179. Mon Dec 20 20:40:30 2010 Fatal decryption error (process_incoming_link), restarting
  2180. Mon Dec 20 20:40:30 2010 TCP/UDP: Closing socket
  2181. Mon Dec 20 20:40:30 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2182. Mon Dec 20 20:40:30 2010 Restart pause, 5 second(s)
  2183. Mon Dec 20 20:40:35 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2184. Mon Dec 20 20:40:35 2010 Re-using SSL/TLS context
  2185. Mon Dec 20 20:40:35 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2186. Mon Dec 20 20:40:35 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2187. Mon Dec 20 20:40:35 2010 Local Options hash (VER=V4): 'bf6006bf'
  2188. Mon Dec 20 20:40:35 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2189. Mon Dec 20 20:40:35 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2190. Mon Dec 20 20:40:36 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2191. Mon Dec 20 20:40:36 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2192. Mon Dec 20 20:40:36 2010 Socket flags: TCP_NODELAY=1 succeeded
  2193. Mon Dec 20 20:40:36 2010 TCPv4_CLIENT link local: [undef]
  2194. Mon Dec 20 20:40:36 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2195. Mon Dec 20 20:40:36 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=2054d2b9 fcaf555e
  2196. Mon Dec 20 20:40:37 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2197. Mon Dec 20 20:40:37 2010 VERIFY OK: nsCertType=SERVER
  2198. Mon Dec 20 20:40:37 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2199. Mon Dec 20 20:40:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2200. Mon Dec 20 20:40:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2201. Mon Dec 20 20:40:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2202. Mon Dec 20 20:40:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2203. Mon Dec 20 20:40:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2204. Mon Dec 20 20:40:39 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2205. Mon Dec 20 20:40:41 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2206. Mon Dec 20 20:40:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2207. Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2208. Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: --socket-flags option modified
  2209. Mon Dec 20 20:40:41 2010 Socket flags: TCP_NODELAY=1 succeeded
  2210. Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2211. Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: route options modified
  2212. Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: route-related options modified
  2213. Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2214. Mon Dec 20 20:40:41 2010 Preserving previous TUN/TAP instance: tun0
  2215. Mon Dec 20 20:40:41 2010 Initialization Sequence Completed
  2216. Mon Dec 20 20:41:07 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1226 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2217. Mon Dec 20 20:41:07 2010 Fatal decryption error (process_incoming_link), restarting
  2218. Mon Dec 20 20:41:07 2010 TCP/UDP: Closing socket
  2219. Mon Dec 20 20:41:07 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2220. Mon Dec 20 20:41:07 2010 Restart pause, 5 second(s)
  2221. Mon Dec 20 20:41:12 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2222. Mon Dec 20 20:41:12 2010 Re-using SSL/TLS context
  2223. Mon Dec 20 20:41:12 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2224. Mon Dec 20 20:41:12 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2225. Mon Dec 20 20:41:12 2010 Local Options hash (VER=V4): 'bf6006bf'
  2226. Mon Dec 20 20:41:12 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2227. Mon Dec 20 20:41:12 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2228. Mon Dec 20 20:41:13 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2229. Mon Dec 20 20:41:13 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2230. Mon Dec 20 20:41:13 2010 Socket flags: TCP_NODELAY=1 succeeded
  2231. Mon Dec 20 20:41:13 2010 TCPv4_CLIENT link local: [undef]
  2232. Mon Dec 20 20:41:13 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2233. Mon Dec 20 20:41:13 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c75a34cb 9147597a
  2234. Mon Dec 20 20:41:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2235. Mon Dec 20 20:41:14 2010 VERIFY OK: nsCertType=SERVER
  2236. Mon Dec 20 20:41:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2237. Mon Dec 20 20:41:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2238. Mon Dec 20 20:41:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2239. Mon Dec 20 20:41:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2240. Mon Dec 20 20:41:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2241. Mon Dec 20 20:41:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2242. Mon Dec 20 20:41:16 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2243. Mon Dec 20 20:41:18 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2244. Mon Dec 20 20:41:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2245. Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2246. Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: --socket-flags option modified
  2247. Mon Dec 20 20:41:18 2010 Socket flags: TCP_NODELAY=1 succeeded
  2248. Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2249. Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: route options modified
  2250. Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: route-related options modified
  2251. Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2252. Mon Dec 20 20:41:18 2010 Preserving previous TUN/TAP instance: tun0
  2253. Mon Dec 20 20:41:18 2010 Initialization Sequence Completed
  2254. Mon Dec 20 20:41:36 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #884 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2255. Mon Dec 20 20:41:36 2010 Fatal decryption error (process_incoming_link), restarting
  2256. Mon Dec 20 20:41:36 2010 TCP/UDP: Closing socket
  2257. Mon Dec 20 20:41:36 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2258. Mon Dec 20 20:41:36 2010 Restart pause, 5 second(s)
  2259. Mon Dec 20 20:41:41 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2260. Mon Dec 20 20:41:41 2010 Re-using SSL/TLS context
  2261. Mon Dec 20 20:41:41 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2262. Mon Dec 20 20:41:41 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2263. Mon Dec 20 20:41:41 2010 Local Options hash (VER=V4): 'bf6006bf'
  2264. Mon Dec 20 20:41:41 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2265. Mon Dec 20 20:41:41 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2266. Mon Dec 20 20:41:42 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2267. Mon Dec 20 20:41:42 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2268. Mon Dec 20 20:41:42 2010 Socket flags: TCP_NODELAY=1 succeeded
  2269. Mon Dec 20 20:41:42 2010 TCPv4_CLIENT link local: [undef]
  2270. Mon Dec 20 20:41:42 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2271. Mon Dec 20 20:41:42 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=79879338 c4180514
  2272. Mon Dec 20 20:41:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2273. Mon Dec 20 20:41:43 2010 VERIFY OK: nsCertType=SERVER
  2274. Mon Dec 20 20:41:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2275. Mon Dec 20 20:41:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2276. Mon Dec 20 20:41:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2277. Mon Dec 20 20:41:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2278. Mon Dec 20 20:41:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2279. Mon Dec 20 20:41:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2280. Mon Dec 20 20:41:45 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2281. Mon Dec 20 20:41:47 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2282. Mon Dec 20 20:41:47 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2283. Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2284. Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: --socket-flags option modified
  2285. Mon Dec 20 20:41:47 2010 Socket flags: TCP_NODELAY=1 succeeded
  2286. Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2287. Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: route options modified
  2288. Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: route-related options modified
  2289. Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2290. Mon Dec 20 20:41:47 2010 Preserving previous TUN/TAP instance: tun0
  2291. Mon Dec 20 20:41:47 2010 Initialization Sequence Completed
  2292. Mon Dec 20 20:42:00 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1230 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2293. Mon Dec 20 20:42:00 2010 Fatal decryption error (process_incoming_link), restarting
  2294. Mon Dec 20 20:42:00 2010 TCP/UDP: Closing socket
  2295. Mon Dec 20 20:42:00 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2296. Mon Dec 20 20:42:00 2010 Restart pause, 5 second(s)
  2297. Mon Dec 20 20:42:05 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2298. Mon Dec 20 20:42:05 2010 Re-using SSL/TLS context
  2299. Mon Dec 20 20:42:05 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2300. Mon Dec 20 20:42:05 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2301. Mon Dec 20 20:42:05 2010 Local Options hash (VER=V4): 'bf6006bf'
  2302. Mon Dec 20 20:42:05 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2303. Mon Dec 20 20:42:05 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2304. Mon Dec 20 20:42:06 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2305. Mon Dec 20 20:42:06 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2306. Mon Dec 20 20:42:06 2010 Socket flags: TCP_NODELAY=1 succeeded
  2307. Mon Dec 20 20:42:06 2010 TCPv4_CLIENT link local: [undef]
  2308. Mon Dec 20 20:42:06 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2309. Mon Dec 20 20:42:06 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=58fe531b f7b4f8fb
  2310. Mon Dec 20 20:42:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2311. Mon Dec 20 20:42:07 2010 VERIFY OK: nsCertType=SERVER
  2312. Mon Dec 20 20:42:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2313. Mon Dec 20 20:42:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2314. Mon Dec 20 20:42:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2315. Mon Dec 20 20:42:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2316. Mon Dec 20 20:42:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2317. Mon Dec 20 20:42:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2318. Mon Dec 20 20:42:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2319. Mon Dec 20 20:42:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2320. Mon Dec 20 20:42:12 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2321. Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2322. Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: --socket-flags option modified
  2323. Mon Dec 20 20:42:12 2010 Socket flags: TCP_NODELAY=1 succeeded
  2324. Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2325. Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: route options modified
  2326. Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: route-related options modified
  2327. Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2328. Mon Dec 20 20:42:12 2010 Preserving previous TUN/TAP instance: tun0
  2329. Mon Dec 20 20:42:12 2010 Initialization Sequence Completed
  2330. Mon Dec 20 20:42:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1306 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2331. Mon Dec 20 20:42:51 2010 Fatal decryption error (process_incoming_link), restarting
  2332. Mon Dec 20 20:42:51 2010 TCP/UDP: Closing socket
  2333. Mon Dec 20 20:42:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2334. Mon Dec 20 20:42:51 2010 Restart pause, 5 second(s)
  2335. Mon Dec 20 20:42:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2336. Mon Dec 20 20:42:56 2010 Re-using SSL/TLS context
  2337. Mon Dec 20 20:42:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2338. Mon Dec 20 20:42:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2339. Mon Dec 20 20:42:56 2010 Local Options hash (VER=V4): 'bf6006bf'
  2340. Mon Dec 20 20:42:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2341. Mon Dec 20 20:42:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2342. Mon Dec 20 20:42:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2343. Mon Dec 20 20:42:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2344. Mon Dec 20 20:42:57 2010 Socket flags: TCP_NODELAY=1 succeeded
  2345. Mon Dec 20 20:42:57 2010 TCPv4_CLIENT link local: [undef]
  2346. Mon Dec 20 20:42:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2347. Mon Dec 20 20:42:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=809ca7c1 f1c12c11
  2348. Mon Dec 20 20:42:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2349. Mon Dec 20 20:42:58 2010 VERIFY OK: nsCertType=SERVER
  2350. Mon Dec 20 20:42:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2351. Mon Dec 20 20:43:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2352. Mon Dec 20 20:43:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2353. Mon Dec 20 20:43:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2354. Mon Dec 20 20:43:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2355. Mon Dec 20 20:43:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2356. Mon Dec 20 20:43:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2357. Mon Dec 20 20:43:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2358. Mon Dec 20 20:43:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2359. Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2360. Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: --socket-flags option modified
  2361. Mon Dec 20 20:43:03 2010 Socket flags: TCP_NODELAY=1 succeeded
  2362. Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2363. Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: route options modified
  2364. Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: route-related options modified
  2365. Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2366. Mon Dec 20 20:43:03 2010 Preserving previous TUN/TAP instance: tun0
  2367. Mon Dec 20 20:43:03 2010 Initialization Sequence Completed
  2368. Mon Dec 20 20:43:33 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1468 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2369. Mon Dec 20 20:43:33 2010 Fatal decryption error (process_incoming_link), restarting
  2370. Mon Dec 20 20:43:33 2010 TCP/UDP: Closing socket
  2371. Mon Dec 20 20:43:33 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2372. Mon Dec 20 20:43:33 2010 Restart pause, 5 second(s)
  2373. Mon Dec 20 20:43:38 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2374. Mon Dec 20 20:43:38 2010 Re-using SSL/TLS context
  2375. Mon Dec 20 20:43:38 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2376. Mon Dec 20 20:43:38 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2377. Mon Dec 20 20:43:38 2010 Local Options hash (VER=V4): 'bf6006bf'
  2378. Mon Dec 20 20:43:38 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2379. Mon Dec 20 20:43:38 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2380. Mon Dec 20 20:43:39 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2381. Mon Dec 20 20:43:39 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2382. Mon Dec 20 20:43:39 2010 Socket flags: TCP_NODELAY=1 succeeded
  2383. Mon Dec 20 20:43:39 2010 TCPv4_CLIENT link local: [undef]
  2384. Mon Dec 20 20:43:39 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2385. Mon Dec 20 20:43:40 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c13a3b33 faabcd06
  2386. Mon Dec 20 20:43:40 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2387. Mon Dec 20 20:43:40 2010 VERIFY OK: nsCertType=SERVER
  2388. Mon Dec 20 20:43:40 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2389. Mon Dec 20 20:43:42 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2390. Mon Dec 20 20:43:42 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2391. Mon Dec 20 20:43:42 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2392. Mon Dec 20 20:43:42 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2393. Mon Dec 20 20:43:42 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2394. Mon Dec 20 20:43:42 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2395. Mon Dec 20 20:43:44 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2396. Mon Dec 20 20:43:45 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2397. Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2398. Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: --socket-flags option modified
  2399. Mon Dec 20 20:43:45 2010 Socket flags: TCP_NODELAY=1 succeeded
  2400. Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2401. Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: route options modified
  2402. Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: route-related options modified
  2403. Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2404. Mon Dec 20 20:43:45 2010 Preserving previous TUN/TAP instance: tun0
  2405. Mon Dec 20 20:43:45 2010 Initialization Sequence Completed
  2406. Mon Dec 20 20:43:49 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #915 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2407. Mon Dec 20 20:43:49 2010 Fatal decryption error (process_incoming_link), restarting
  2408. Mon Dec 20 20:43:49 2010 TCP/UDP: Closing socket
  2409. Mon Dec 20 20:43:49 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2410. Mon Dec 20 20:43:49 2010 Restart pause, 5 second(s)
  2411. Mon Dec 20 20:43:54 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2412. Mon Dec 20 20:43:54 2010 Re-using SSL/TLS context
  2413. Mon Dec 20 20:43:54 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2414. Mon Dec 20 20:43:54 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2415. Mon Dec 20 20:43:54 2010 Local Options hash (VER=V4): 'bf6006bf'
  2416. Mon Dec 20 20:43:54 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2417. Mon Dec 20 20:43:54 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2418. Mon Dec 20 20:43:55 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2419. Mon Dec 20 20:43:55 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2420. Mon Dec 20 20:43:55 2010 Socket flags: TCP_NODELAY=1 succeeded
  2421. Mon Dec 20 20:43:55 2010 TCPv4_CLIENT link local: [undef]
  2422. Mon Dec 20 20:43:55 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2423. Mon Dec 20 20:43:55 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=daeedc2c aaa271f5
  2424. Mon Dec 20 20:43:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2425. Mon Dec 20 20:43:57 2010 VERIFY OK: nsCertType=SERVER
  2426. Mon Dec 20 20:43:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2427. Mon Dec 20 20:44:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2428. Mon Dec 20 20:44:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2429. Mon Dec 20 20:44:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2430. Mon Dec 20 20:44:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2431. Mon Dec 20 20:44:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2432. Mon Dec 20 20:44:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2433. Mon Dec 20 20:44:02 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2434. Mon Dec 20 20:44:02 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2435. Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2436. Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: --socket-flags option modified
  2437. Mon Dec 20 20:44:02 2010 Socket flags: TCP_NODELAY=1 succeeded
  2438. Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2439. Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: route options modified
  2440. Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: route-related options modified
  2441. Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2442. Mon Dec 20 20:44:02 2010 Preserving previous TUN/TAP instance: tun0
  2443. Mon Dec 20 20:44:02 2010 Initialization Sequence Completed
  2444. Mon Dec 20 20:44:29 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1307 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2445. Mon Dec 20 20:44:29 2010 Fatal decryption error (process_incoming_link), restarting
  2446. Mon Dec 20 20:44:29 2010 TCP/UDP: Closing socket
  2447. Mon Dec 20 20:44:29 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2448. Mon Dec 20 20:44:29 2010 Restart pause, 5 second(s)
  2449. Mon Dec 20 20:44:34 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2450. Mon Dec 20 20:44:34 2010 Re-using SSL/TLS context
  2451. Mon Dec 20 20:44:34 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2452. Mon Dec 20 20:44:34 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2453. Mon Dec 20 20:44:34 2010 Local Options hash (VER=V4): 'bf6006bf'
  2454. Mon Dec 20 20:44:34 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2455. Mon Dec 20 20:44:34 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2456. Mon Dec 20 20:44:35 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2457. Mon Dec 20 20:44:35 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2458. Mon Dec 20 20:44:35 2010 Socket flags: TCP_NODELAY=1 succeeded
  2459. Mon Dec 20 20:44:35 2010 TCPv4_CLIENT link local: [undef]
  2460. Mon Dec 20 20:44:35 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2461. Mon Dec 20 20:44:35 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=8c130620 56551a5f
  2462. Mon Dec 20 20:44:36 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2463. Mon Dec 20 20:44:36 2010 VERIFY OK: nsCertType=SERVER
  2464. Mon Dec 20 20:44:36 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2465. Mon Dec 20 20:44:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2466. Mon Dec 20 20:44:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2467. Mon Dec 20 20:44:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2468. Mon Dec 20 20:44:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2469. Mon Dec 20 20:44:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2470. Mon Dec 20 20:44:39 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2471. Mon Dec 20 20:44:41 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2472. Mon Dec 20 20:44:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2473. Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2474. Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: --socket-flags option modified
  2475. Mon Dec 20 20:44:41 2010 Socket flags: TCP_NODELAY=1 succeeded
  2476. Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2477. Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: route options modified
  2478. Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: route-related options modified
  2479. Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2480. Mon Dec 20 20:44:41 2010 Preserving previous TUN/TAP instance: tun0
  2481. Mon Dec 20 20:44:41 2010 Initialization Sequence Completed
  2482. Mon Dec 20 20:44:59 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2483. Mon Dec 20 20:44:59 2010 Fatal decryption error (process_incoming_link), restarting
  2484. Mon Dec 20 20:44:59 2010 TCP/UDP: Closing socket
  2485. Mon Dec 20 20:44:59 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2486. Mon Dec 20 20:44:59 2010 Restart pause, 5 second(s)
  2487. Mon Dec 20 20:45:04 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2488. Mon Dec 20 20:45:04 2010 Re-using SSL/TLS context
  2489. Mon Dec 20 20:45:04 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2490. Mon Dec 20 20:45:04 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2491. Mon Dec 20 20:45:04 2010 Local Options hash (VER=V4): 'bf6006bf'
  2492. Mon Dec 20 20:45:04 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2493. Mon Dec 20 20:45:04 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2494. Mon Dec 20 20:45:05 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2495. Mon Dec 20 20:45:05 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2496. Mon Dec 20 20:45:05 2010 Socket flags: TCP_NODELAY=1 succeeded
  2497. Mon Dec 20 20:45:05 2010 TCPv4_CLIENT link local: [undef]
  2498. Mon Dec 20 20:45:05 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2499. Mon Dec 20 20:45:05 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=10531ca9 15cc8feb
  2500. Mon Dec 20 20:45:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2501. Mon Dec 20 20:45:06 2010 VERIFY OK: nsCertType=SERVER
  2502. Mon Dec 20 20:45:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2503. Mon Dec 20 20:45:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2504. Mon Dec 20 20:45:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2505. Mon Dec 20 20:45:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2506. Mon Dec 20 20:45:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2507. Mon Dec 20 20:45:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2508. Mon Dec 20 20:45:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2509. Mon Dec 20 20:45:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2510. Mon Dec 20 20:45:11 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2511. Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2512. Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: --socket-flags option modified
  2513. Mon Dec 20 20:45:11 2010 Socket flags: TCP_NODELAY=1 succeeded
  2514. Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2515. Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: route options modified
  2516. Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: route-related options modified
  2517. Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2518. Mon Dec 20 20:45:11 2010 Preserving previous TUN/TAP instance: tun0
  2519. Mon Dec 20 20:45:11 2010 Initialization Sequence Completed
  2520. Mon Dec 20 20:45:39 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #915 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2521. Mon Dec 20 20:45:39 2010 Fatal decryption error (process_incoming_link), restarting
  2522. Mon Dec 20 20:45:39 2010 TCP/UDP: Closing socket
  2523. Mon Dec 20 20:45:39 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2524. Mon Dec 20 20:45:39 2010 Restart pause, 5 second(s)
  2525. Mon Dec 20 20:45:44 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2526. Mon Dec 20 20:45:44 2010 Re-using SSL/TLS context
  2527. Mon Dec 20 20:45:44 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2528. Mon Dec 20 20:45:44 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2529. Mon Dec 20 20:45:44 2010 Local Options hash (VER=V4): 'bf6006bf'
  2530. Mon Dec 20 20:45:44 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2531. Mon Dec 20 20:45:44 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2532. Mon Dec 20 20:45:45 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2533. Mon Dec 20 20:45:45 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2534. Mon Dec 20 20:45:45 2010 Socket flags: TCP_NODELAY=1 succeeded
  2535. Mon Dec 20 20:45:45 2010 TCPv4_CLIENT link local: [undef]
  2536. Mon Dec 20 20:45:45 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2537. Mon Dec 20 20:45:46 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=593b7b9f dedf18ed
  2538. Mon Dec 20 20:45:46 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2539. Mon Dec 20 20:45:46 2010 VERIFY OK: nsCertType=SERVER
  2540. Mon Dec 20 20:45:46 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2541. Mon Dec 20 20:45:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2542. Mon Dec 20 20:45:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2543. Mon Dec 20 20:45:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2544. Mon Dec 20 20:45:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2545. Mon Dec 20 20:45:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2546. Mon Dec 20 20:45:49 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2547. Mon Dec 20 20:45:52 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2548. Mon Dec 20 20:45:52 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2549. Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2550. Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: --socket-flags option modified
  2551. Mon Dec 20 20:45:52 2010 Socket flags: TCP_NODELAY=1 succeeded
  2552. Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2553. Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: route options modified
  2554. Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: route-related options modified
  2555. Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2556. Mon Dec 20 20:45:52 2010 Preserving previous TUN/TAP instance: tun0
  2557. Mon Dec 20 20:45:52 2010 Initialization Sequence Completed
  2558. Mon Dec 20 20:46:13 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #682 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2559. Mon Dec 20 20:46:13 2010 Fatal decryption error (process_incoming_link), restarting
  2560. Mon Dec 20 20:46:13 2010 TCP/UDP: Closing socket
  2561. Mon Dec 20 20:46:13 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2562. Mon Dec 20 20:46:13 2010 Restart pause, 5 second(s)
  2563. Mon Dec 20 20:46:18 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2564. Mon Dec 20 20:46:18 2010 Re-using SSL/TLS context
  2565. Mon Dec 20 20:46:18 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2566. Mon Dec 20 20:46:18 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2567. Mon Dec 20 20:46:18 2010 Local Options hash (VER=V4): 'bf6006bf'
  2568. Mon Dec 20 20:46:18 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2569. Mon Dec 20 20:46:18 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2570. Mon Dec 20 20:46:19 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2571. Mon Dec 20 20:46:19 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2572. Mon Dec 20 20:46:19 2010 Socket flags: TCP_NODELAY=1 succeeded
  2573. Mon Dec 20 20:46:19 2010 TCPv4_CLIENT link local: [undef]
  2574. Mon Dec 20 20:46:19 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2575. Mon Dec 20 20:46:19 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=ffd60c7f f34f9ab1
  2576. Mon Dec 20 20:46:20 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2577. Mon Dec 20 20:46:20 2010 VERIFY OK: nsCertType=SERVER
  2578. Mon Dec 20 20:46:20 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2579. Mon Dec 20 20:46:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2580. Mon Dec 20 20:46:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2581. Mon Dec 20 20:46:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2582. Mon Dec 20 20:46:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2583. Mon Dec 20 20:46:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2584. Mon Dec 20 20:46:22 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2585. Mon Dec 20 20:46:24 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2586. Mon Dec 20 20:46:24 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2587. Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2588. Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: --socket-flags option modified
  2589. Mon Dec 20 20:46:24 2010 Socket flags: TCP_NODELAY=1 succeeded
  2590. Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2591. Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: route options modified
  2592. Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: route-related options modified
  2593. Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2594. Mon Dec 20 20:46:24 2010 Preserving previous TUN/TAP instance: tun0
  2595. Mon Dec 20 20:46:24 2010 Initialization Sequence Completed
  2596. Mon Dec 20 20:46:33 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1562 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2597. Mon Dec 20 20:46:33 2010 Fatal decryption error (process_incoming_link), restarting
  2598. Mon Dec 20 20:46:33 2010 TCP/UDP: Closing socket
  2599. Mon Dec 20 20:46:33 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2600. Mon Dec 20 20:46:33 2010 Restart pause, 5 second(s)
  2601. Mon Dec 20 20:46:38 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2602. Mon Dec 20 20:46:38 2010 Re-using SSL/TLS context
  2603. Mon Dec 20 20:46:38 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2604. Mon Dec 20 20:46:38 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2605. Mon Dec 20 20:46:38 2010 Local Options hash (VER=V4): 'bf6006bf'
  2606. Mon Dec 20 20:46:38 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2607. Mon Dec 20 20:46:38 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2608. Mon Dec 20 20:46:39 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2609. Mon Dec 20 20:46:39 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2610. Mon Dec 20 20:46:39 2010 Socket flags: TCP_NODELAY=1 succeeded
  2611. Mon Dec 20 20:46:39 2010 TCPv4_CLIENT link local: [undef]
  2612. Mon Dec 20 20:46:39 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2613. Mon Dec 20 20:46:40 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=518b03a6 0b74c046
  2614. Mon Dec 20 20:46:41 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2615. Mon Dec 20 20:46:41 2010 VERIFY OK: nsCertType=SERVER
  2616. Mon Dec 20 20:46:41 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2617. Mon Dec 20 20:46:44 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2618. Mon Dec 20 20:46:44 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2619. Mon Dec 20 20:46:44 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2620. Mon Dec 20 20:46:44 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2621. Mon Dec 20 20:46:44 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2622. Mon Dec 20 20:46:44 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2623. Mon Dec 20 20:46:46 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2624. Mon Dec 20 20:46:46 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2625. Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2626. Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: --socket-flags option modified
  2627. Mon Dec 20 20:46:46 2010 Socket flags: TCP_NODELAY=1 succeeded
  2628. Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2629. Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: route options modified
  2630. Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: route-related options modified
  2631. Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2632. Mon Dec 20 20:46:46 2010 Preserving previous TUN/TAP instance: tun0
  2633. Mon Dec 20 20:46:46 2010 Initialization Sequence Completed
  2634. Mon Dec 20 20:47:19 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1569 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2635. Mon Dec 20 20:47:19 2010 Fatal decryption error (process_incoming_link), restarting
  2636. Mon Dec 20 20:47:19 2010 TCP/UDP: Closing socket
  2637. Mon Dec 20 20:47:19 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2638. Mon Dec 20 20:47:19 2010 Restart pause, 5 second(s)
  2639. Mon Dec 20 20:47:24 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2640. Mon Dec 20 20:47:24 2010 Re-using SSL/TLS context
  2641. Mon Dec 20 20:47:24 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2642. Mon Dec 20 20:47:24 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2643. Mon Dec 20 20:47:24 2010 Local Options hash (VER=V4): 'bf6006bf'
  2644. Mon Dec 20 20:47:24 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2645. Mon Dec 20 20:47:24 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2646. Mon Dec 20 20:47:25 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2647. Mon Dec 20 20:47:25 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2648. Mon Dec 20 20:47:25 2010 Socket flags: TCP_NODELAY=1 succeeded
  2649. Mon Dec 20 20:47:25 2010 TCPv4_CLIENT link local: [undef]
  2650. Mon Dec 20 20:47:25 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2651. Mon Dec 20 20:47:25 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=1e811778 d2845e92
  2652. Mon Dec 20 20:47:26 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2653. Mon Dec 20 20:47:26 2010 VERIFY OK: nsCertType=SERVER
  2654. Mon Dec 20 20:47:26 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2655. Mon Dec 20 20:47:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2656. Mon Dec 20 20:47:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2657. Mon Dec 20 20:47:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2658. Mon Dec 20 20:47:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2659. Mon Dec 20 20:47:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2660. Mon Dec 20 20:47:30 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2661. Mon Dec 20 20:47:32 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2662. Mon Dec 20 20:47:32 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2663. Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2664. Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: --socket-flags option modified
  2665. Mon Dec 20 20:47:32 2010 Socket flags: TCP_NODELAY=1 succeeded
  2666. Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2667. Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: route options modified
  2668. Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: route-related options modified
  2669. Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2670. Mon Dec 20 20:47:32 2010 Preserving previous TUN/TAP instance: tun0
  2671. Mon Dec 20 20:47:32 2010 Initialization Sequence Completed
  2672. Mon Dec 20 20:47:53 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #750 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2673. Mon Dec 20 20:47:53 2010 Fatal decryption error (process_incoming_link), restarting
  2674. Mon Dec 20 20:47:53 2010 TCP/UDP: Closing socket
  2675. Mon Dec 20 20:47:53 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2676. Mon Dec 20 20:47:53 2010 Restart pause, 5 second(s)
  2677. Mon Dec 20 20:47:58 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2678. Mon Dec 20 20:47:58 2010 Re-using SSL/TLS context
  2679. Mon Dec 20 20:47:58 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2680. Mon Dec 20 20:47:58 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2681. Mon Dec 20 20:47:58 2010 Local Options hash (VER=V4): 'bf6006bf'
  2682. Mon Dec 20 20:47:58 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2683. Mon Dec 20 20:47:58 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2684. Mon Dec 20 20:47:59 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2685. Mon Dec 20 20:47:59 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2686. Mon Dec 20 20:47:59 2010 Socket flags: TCP_NODELAY=1 succeeded
  2687. Mon Dec 20 20:47:59 2010 TCPv4_CLIENT link local: [undef]
  2688. Mon Dec 20 20:47:59 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2689. Mon Dec 20 20:47:59 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=b01e918a 77d47f6a
  2690. Mon Dec 20 20:48:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2691. Mon Dec 20 20:48:00 2010 VERIFY OK: nsCertType=SERVER
  2692. Mon Dec 20 20:48:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2693. Mon Dec 20 20:48:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2694. Mon Dec 20 20:48:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2695. Mon Dec 20 20:48:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2696. Mon Dec 20 20:48:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2697. Mon Dec 20 20:48:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2698. Mon Dec 20 20:48:02 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2699. Mon Dec 20 20:48:05 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2700. Mon Dec 20 20:48:05 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2701. Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2702. Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: --socket-flags option modified
  2703. Mon Dec 20 20:48:05 2010 Socket flags: TCP_NODELAY=1 succeeded
  2704. Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2705. Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: route options modified
  2706. Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: route-related options modified
  2707. Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2708. Mon Dec 20 20:48:05 2010 Preserving previous TUN/TAP instance: tun0
  2709. Mon Dec 20 20:48:05 2010 Initialization Sequence Completed
  2710. Mon Dec 20 20:49:01 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3007 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2711. Mon Dec 20 20:49:01 2010 Fatal decryption error (process_incoming_link), restarting
  2712. Mon Dec 20 20:49:01 2010 TCP/UDP: Closing socket
  2713. Mon Dec 20 20:49:01 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2714. Mon Dec 20 20:49:01 2010 Restart pause, 5 second(s)
  2715. Mon Dec 20 20:49:06 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2716. Mon Dec 20 20:49:06 2010 Re-using SSL/TLS context
  2717. Mon Dec 20 20:49:06 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2718. Mon Dec 20 20:49:06 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2719. Mon Dec 20 20:49:06 2010 Local Options hash (VER=V4): 'bf6006bf'
  2720. Mon Dec 20 20:49:06 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2721. Mon Dec 20 20:49:06 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2722. Mon Dec 20 20:49:07 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2723. Mon Dec 20 20:49:07 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2724. Mon Dec 20 20:49:07 2010 Socket flags: TCP_NODELAY=1 succeeded
  2725. Mon Dec 20 20:49:07 2010 TCPv4_CLIENT link local: [undef]
  2726. Mon Dec 20 20:49:07 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2727. Mon Dec 20 20:49:07 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=143b65d3 b907c44e
  2728. Mon Dec 20 20:49:08 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2729. Mon Dec 20 20:49:08 2010 VERIFY OK: nsCertType=SERVER
  2730. Mon Dec 20 20:49:08 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2731. Mon Dec 20 20:49:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2732. Mon Dec 20 20:49:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2733. Mon Dec 20 20:49:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2734. Mon Dec 20 20:49:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2735. Mon Dec 20 20:49:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2736. Mon Dec 20 20:49:11 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2737. Mon Dec 20 20:49:13 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2738. Mon Dec 20 20:49:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2739. Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2740. Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: --socket-flags option modified
  2741. Mon Dec 20 20:49:14 2010 Socket flags: TCP_NODELAY=1 succeeded
  2742. Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2743. Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: route options modified
  2744. Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: route-related options modified
  2745. Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2746. Mon Dec 20 20:49:14 2010 Preserving previous TUN/TAP instance: tun0
  2747. Mon Dec 20 20:49:14 2010 Initialization Sequence Completed
  2748. Mon Dec 20 20:49:44 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1184 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2749. Mon Dec 20 20:49:44 2010 Fatal decryption error (process_incoming_link), restarting
  2750. Mon Dec 20 20:49:44 2010 TCP/UDP: Closing socket
  2751. Mon Dec 20 20:49:44 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2752. Mon Dec 20 20:49:44 2010 Restart pause, 5 second(s)
  2753. Mon Dec 20 20:49:49 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2754. Mon Dec 20 20:49:49 2010 Re-using SSL/TLS context
  2755. Mon Dec 20 20:49:49 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2756. Mon Dec 20 20:49:49 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2757. Mon Dec 20 20:49:49 2010 Local Options hash (VER=V4): 'bf6006bf'
  2758. Mon Dec 20 20:49:49 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2759. Mon Dec 20 20:49:49 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2760. Mon Dec 20 20:49:50 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2761. Mon Dec 20 20:49:50 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2762. Mon Dec 20 20:49:50 2010 Socket flags: TCP_NODELAY=1 succeeded
  2763. Mon Dec 20 20:49:50 2010 TCPv4_CLIENT link local: [undef]
  2764. Mon Dec 20 20:49:50 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2765. Mon Dec 20 20:49:50 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=5ed40f18 c29c2bef
  2766. Mon Dec 20 20:49:51 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2767. Mon Dec 20 20:49:51 2010 VERIFY OK: nsCertType=SERVER
  2768. Mon Dec 20 20:49:51 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2769. Mon Dec 20 20:49:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2770. Mon Dec 20 20:49:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2771. Mon Dec 20 20:49:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2772. Mon Dec 20 20:49:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2773. Mon Dec 20 20:49:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2774. Mon Dec 20 20:49:53 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2775. Mon Dec 20 20:49:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2776. Mon Dec 20 20:49:55 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2777. Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2778. Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: --socket-flags option modified
  2779. Mon Dec 20 20:49:55 2010 Socket flags: TCP_NODELAY=1 succeeded
  2780. Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2781. Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: route options modified
  2782. Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: route-related options modified
  2783. Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2784. Mon Dec 20 20:49:55 2010 Preserving previous TUN/TAP instance: tun0
  2785. Mon Dec 20 20:49:55 2010 Initialization Sequence Completed
  2786. Mon Dec 20 20:50:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1944 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2787. Mon Dec 20 20:50:51 2010 Fatal decryption error (process_incoming_link), restarting
  2788. Mon Dec 20 20:50:51 2010 TCP/UDP: Closing socket
  2789. Mon Dec 20 20:50:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2790. Mon Dec 20 20:50:51 2010 Restart pause, 5 second(s)
  2791. Mon Dec 20 20:50:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2792. Mon Dec 20 20:50:56 2010 Re-using SSL/TLS context
  2793. Mon Dec 20 20:50:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2794. Mon Dec 20 20:50:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2795. Mon Dec 20 20:50:56 2010 Local Options hash (VER=V4): 'bf6006bf'
  2796. Mon Dec 20 20:50:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2797. Mon Dec 20 20:50:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2798. Mon Dec 20 20:50:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2799. Mon Dec 20 20:50:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2800. Mon Dec 20 20:50:57 2010 Socket flags: TCP_NODELAY=1 succeeded
  2801. Mon Dec 20 20:50:57 2010 TCPv4_CLIENT link local: [undef]
  2802. Mon Dec 20 20:50:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2803. Mon Dec 20 20:50:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e88ae86e 4aaaa02b
  2804. Mon Dec 20 20:50:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2805. Mon Dec 20 20:50:58 2010 VERIFY OK: nsCertType=SERVER
  2806. Mon Dec 20 20:50:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2807. Mon Dec 20 20:51:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2808. Mon Dec 20 20:51:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2809. Mon Dec 20 20:51:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2810. Mon Dec 20 20:51:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2811. Mon Dec 20 20:51:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2812. Mon Dec 20 20:51:01 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2813. Mon Dec 20 20:51:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2814. Mon Dec 20 20:51:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2815. Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2816. Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: --socket-flags option modified
  2817. Mon Dec 20 20:51:03 2010 Socket flags: TCP_NODELAY=1 succeeded
  2818. Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2819. Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: route options modified
  2820. Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: route-related options modified
  2821. Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2822. Mon Dec 20 20:51:03 2010 Preserving previous TUN/TAP instance: tun0
  2823. Mon Dec 20 20:51:03 2010 Initialization Sequence Completed
  2824. Mon Dec 20 20:51:27 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #772 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2825. Mon Dec 20 20:51:27 2010 Fatal decryption error (process_incoming_link), restarting
  2826. Mon Dec 20 20:51:27 2010 TCP/UDP: Closing socket
  2827. Mon Dec 20 20:51:27 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2828. Mon Dec 20 20:51:27 2010 Restart pause, 5 second(s)
  2829. Mon Dec 20 20:51:32 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2830. Mon Dec 20 20:51:32 2010 Re-using SSL/TLS context
  2831. Mon Dec 20 20:51:32 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2832. Mon Dec 20 20:51:32 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2833. Mon Dec 20 20:51:32 2010 Local Options hash (VER=V4): 'bf6006bf'
  2834. Mon Dec 20 20:51:32 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2835. Mon Dec 20 20:51:32 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2836. Mon Dec 20 20:51:33 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2837. Mon Dec 20 20:51:33 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2838. Mon Dec 20 20:51:33 2010 Socket flags: TCP_NODELAY=1 succeeded
  2839. Mon Dec 20 20:51:33 2010 TCPv4_CLIENT link local: [undef]
  2840. Mon Dec 20 20:51:33 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2841. Mon Dec 20 20:51:33 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=cc92fdb0 7f6787fb
  2842. Mon Dec 20 20:51:34 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2843. Mon Dec 20 20:51:34 2010 VERIFY OK: nsCertType=SERVER
  2844. Mon Dec 20 20:51:34 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2845. Mon Dec 20 20:51:38 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2846. Mon Dec 20 20:51:38 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2847. Mon Dec 20 20:51:38 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2848. Mon Dec 20 20:51:38 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2849. Mon Dec 20 20:51:38 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2850. Mon Dec 20 20:51:38 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2851. Mon Dec 20 20:51:40 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2852. Mon Dec 20 20:51:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2853. Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2854. Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: --socket-flags option modified
  2855. Mon Dec 20 20:51:41 2010 Socket flags: TCP_NODELAY=1 succeeded
  2856. Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2857. Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: route options modified
  2858. Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: route-related options modified
  2859. Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2860. Mon Dec 20 20:51:41 2010 Preserving previous TUN/TAP instance: tun0
  2861. Mon Dec 20 20:51:41 2010 Initialization Sequence Completed
  2862. Mon Dec 20 20:52:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2256 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2863. Mon Dec 20 20:52:51 2010 Fatal decryption error (process_incoming_link), restarting
  2864. Mon Dec 20 20:52:51 2010 TCP/UDP: Closing socket
  2865. Mon Dec 20 20:52:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2866. Mon Dec 20 20:52:51 2010 Restart pause, 5 second(s)
  2867. Mon Dec 20 20:52:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2868. Mon Dec 20 20:52:56 2010 Re-using SSL/TLS context
  2869. Mon Dec 20 20:52:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2870. Mon Dec 20 20:52:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2871. Mon Dec 20 20:52:56 2010 Local Options hash (VER=V4): 'bf6006bf'
  2872. Mon Dec 20 20:52:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2873. Mon Dec 20 20:52:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2874. Mon Dec 20 20:52:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2875. Mon Dec 20 20:52:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2876. Mon Dec 20 20:52:57 2010 Socket flags: TCP_NODELAY=1 succeeded
  2877. Mon Dec 20 20:52:57 2010 TCPv4_CLIENT link local: [undef]
  2878. Mon Dec 20 20:52:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2879. Mon Dec 20 20:52:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=cbc83a22 7a5a2c5b
  2880. Mon Dec 20 20:52:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2881. Mon Dec 20 20:52:58 2010 VERIFY OK: nsCertType=SERVER
  2882. Mon Dec 20 20:52:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2883. Mon Dec 20 20:53:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2884. Mon Dec 20 20:53:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2885. Mon Dec 20 20:53:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2886. Mon Dec 20 20:53:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2887. Mon Dec 20 20:53:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2888. Mon Dec 20 20:53:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2889. Mon Dec 20 20:53:02 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2890. Mon Dec 20 20:53:02 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2891. Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2892. Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: --socket-flags option modified
  2893. Mon Dec 20 20:53:02 2010 Socket flags: TCP_NODELAY=1 succeeded
  2894. Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2895. Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: route options modified
  2896. Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: route-related options modified
  2897. Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2898. Mon Dec 20 20:53:02 2010 Preserving previous TUN/TAP instance: tun0
  2899. Mon Dec 20 20:53:02 2010 Initialization Sequence Completed
  2900. Mon Dec 20 20:53:16 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1649 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2901. Mon Dec 20 20:53:16 2010 Fatal decryption error (process_incoming_link), restarting
  2902. Mon Dec 20 20:53:16 2010 TCP/UDP: Closing socket
  2903. Mon Dec 20 20:53:16 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2904. Mon Dec 20 20:53:16 2010 Restart pause, 5 second(s)
  2905. Mon Dec 20 20:53:21 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2906. Mon Dec 20 20:53:21 2010 Re-using SSL/TLS context
  2907. Mon Dec 20 20:53:21 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2908. Mon Dec 20 20:53:21 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2909. Mon Dec 20 20:53:21 2010 Local Options hash (VER=V4): 'bf6006bf'
  2910. Mon Dec 20 20:53:21 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2911. Mon Dec 20 20:53:21 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2912. Mon Dec 20 20:53:22 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2913. Mon Dec 20 20:53:22 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2914. Mon Dec 20 20:53:22 2010 Socket flags: TCP_NODELAY=1 succeeded
  2915. Mon Dec 20 20:53:22 2010 TCPv4_CLIENT link local: [undef]
  2916. Mon Dec 20 20:53:22 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2917. Mon Dec 20 20:53:22 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=af07e8e4 0c9b4c2e
  2918. Mon Dec 20 20:53:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2919. Mon Dec 20 20:53:23 2010 VERIFY OK: nsCertType=SERVER
  2920. Mon Dec 20 20:53:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2921. Mon Dec 20 20:53:26 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2922. Mon Dec 20 20:53:26 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2923. Mon Dec 20 20:53:26 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2924. Mon Dec 20 20:53:26 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2925. Mon Dec 20 20:53:26 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2926. Mon Dec 20 20:53:26 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2927. Mon Dec 20 20:53:28 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2928. Mon Dec 20 20:53:28 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2929. Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2930. Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: --socket-flags option modified
  2931. Mon Dec 20 20:53:28 2010 Socket flags: TCP_NODELAY=1 succeeded
  2932. Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2933. Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: route options modified
  2934. Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: route-related options modified
  2935. Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2936. Mon Dec 20 20:53:28 2010 Preserving previous TUN/TAP instance: tun0
  2937. Mon Dec 20 20:53:28 2010 Initialization Sequence Completed
  2938. Mon Dec 20 20:53:58 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2939. Mon Dec 20 20:53:58 2010 Fatal decryption error (process_incoming_link), restarting
  2940. Mon Dec 20 20:53:58 2010 TCP/UDP: Closing socket
  2941. Mon Dec 20 20:53:58 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2942. Mon Dec 20 20:53:58 2010 Restart pause, 5 second(s)
  2943. Mon Dec 20 20:54:03 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2944. Mon Dec 20 20:54:03 2010 Re-using SSL/TLS context
  2945. Mon Dec 20 20:54:03 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2946. Mon Dec 20 20:54:03 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2947. Mon Dec 20 20:54:03 2010 Local Options hash (VER=V4): 'bf6006bf'
  2948. Mon Dec 20 20:54:03 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2949. Mon Dec 20 20:54:03 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2950. Mon Dec 20 20:54:04 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2951. Mon Dec 20 20:54:04 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2952. Mon Dec 20 20:54:04 2010 Socket flags: TCP_NODELAY=1 succeeded
  2953. Mon Dec 20 20:54:04 2010 TCPv4_CLIENT link local: [undef]
  2954. Mon Dec 20 20:54:04 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2955. Mon Dec 20 20:54:04 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9cd4e71f fcd0b717
  2956. Mon Dec 20 20:54:05 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2957. Mon Dec 20 20:54:05 2010 VERIFY OK: nsCertType=SERVER
  2958. Mon Dec 20 20:54:05 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2959. Mon Dec 20 20:54:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2960. Mon Dec 20 20:54:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2961. Mon Dec 20 20:54:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2962. Mon Dec 20 20:54:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2963. Mon Dec 20 20:54:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  2964. Mon Dec 20 20:54:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  2965. Mon Dec 20 20:54:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  2966. Mon Dec 20 20:54:11 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  2967. Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: timers and/or timeouts modified
  2968. Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: --socket-flags option modified
  2969. Mon Dec 20 20:54:11 2010 Socket flags: TCP_NODELAY=1 succeeded
  2970. Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: --ifconfig/up options modified
  2971. Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: route options modified
  2972. Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: route-related options modified
  2973. Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  2974. Mon Dec 20 20:54:11 2010 Preserving previous TUN/TAP instance: tun0
  2975. Mon Dec 20 20:54:11 2010 Initialization Sequence Completed
  2976. Mon Dec 20 20:54:48 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2977. Mon Dec 20 20:54:48 2010 Fatal decryption error (process_incoming_link), restarting
  2978. Mon Dec 20 20:54:48 2010 TCP/UDP: Closing socket
  2979. Mon Dec 20 20:54:48 2010 SIGUSR1[soft,decryption-error] received, process restarting
  2980. Mon Dec 20 20:54:48 2010 Restart pause, 5 second(s)
  2981. Mon Dec 20 20:54:53 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  2982. Mon Dec 20 20:54:53 2010 Re-using SSL/TLS context
  2983. Mon Dec 20 20:54:53 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  2984. Mon Dec 20 20:54:53 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  2985. Mon Dec 20 20:54:53 2010 Local Options hash (VER=V4): 'bf6006bf'
  2986. Mon Dec 20 20:54:53 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  2987. Mon Dec 20 20:54:53 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  2988. Mon Dec 20 20:54:54 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  2989. Mon Dec 20 20:54:54 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  2990. Mon Dec 20 20:54:54 2010 Socket flags: TCP_NODELAY=1 succeeded
  2991. Mon Dec 20 20:54:54 2010 TCPv4_CLIENT link local: [undef]
  2992. Mon Dec 20 20:54:54 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  2993. Mon Dec 20 20:54:54 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9d27d5af a33bc91e
  2994. Mon Dec 20 20:54:55 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  2995. Mon Dec 20 20:54:55 2010 VERIFY OK: nsCertType=SERVER
  2996. Mon Dec 20 20:54:55 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  2997. Mon Dec 20 20:54:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  2998. Mon Dec 20 20:54:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  2999. Mon Dec 20 20:54:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3000. Mon Dec 20 20:54:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3001. Mon Dec 20 20:54:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3002. Mon Dec 20 20:54:57 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3003. Mon Dec 20 20:54:59 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3004. Mon Dec 20 20:54:59 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3005. Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3006. Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: --socket-flags option modified
  3007. Mon Dec 20 20:54:59 2010 Socket flags: TCP_NODELAY=1 succeeded
  3008. Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3009. Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: route options modified
  3010. Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: route-related options modified
  3011. Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3012. Mon Dec 20 20:54:59 2010 Preserving previous TUN/TAP instance: tun0
  3013. Mon Dec 20 20:54:59 2010 Initialization Sequence Completed
  3014. Mon Dec 20 20:55:20 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2012 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3015. Mon Dec 20 20:55:20 2010 Fatal decryption error (process_incoming_link), restarting
  3016. Mon Dec 20 20:55:20 2010 TCP/UDP: Closing socket
  3017. Mon Dec 20 20:55:20 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3018. Mon Dec 20 20:55:20 2010 Restart pause, 5 second(s)
  3019. Mon Dec 20 20:55:25 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3020. Mon Dec 20 20:55:25 2010 Re-using SSL/TLS context
  3021. Mon Dec 20 20:55:25 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3022. Mon Dec 20 20:55:25 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3023. Mon Dec 20 20:55:25 2010 Local Options hash (VER=V4): 'bf6006bf'
  3024. Mon Dec 20 20:55:25 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3025. Mon Dec 20 20:55:25 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3026. Mon Dec 20 20:55:26 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3027. Mon Dec 20 20:55:26 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3028. Mon Dec 20 20:55:26 2010 Socket flags: TCP_NODELAY=1 succeeded
  3029. Mon Dec 20 20:55:26 2010 TCPv4_CLIENT link local: [undef]
  3030. Mon Dec 20 20:55:26 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3031. Mon Dec 20 20:55:26 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=5bbbbb4d 987ed90b
  3032. Mon Dec 20 20:55:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3033. Mon Dec 20 20:55:28 2010 VERIFY OK: nsCertType=SERVER
  3034. Mon Dec 20 20:55:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3035. Mon Dec 20 20:55:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3036. Mon Dec 20 20:55:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3037. Mon Dec 20 20:55:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3038. Mon Dec 20 20:55:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3039. Mon Dec 20 20:55:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3040. Mon Dec 20 20:55:31 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3041. Mon Dec 20 20:55:33 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3042. Mon Dec 20 20:55:33 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3043. Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3044. Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: --socket-flags option modified
  3045. Mon Dec 20 20:55:33 2010 Socket flags: TCP_NODELAY=1 succeeded
  3046. Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3047. Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: route options modified
  3048. Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: route-related options modified
  3049. Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3050. Mon Dec 20 20:55:33 2010 Preserving previous TUN/TAP instance: tun0
  3051. Mon Dec 20 20:55:33 2010 Initialization Sequence Completed
  3052. Mon Dec 20 20:55:52 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #837 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3053. Mon Dec 20 20:55:52 2010 Fatal decryption error (process_incoming_link), restarting
  3054. Mon Dec 20 20:55:52 2010 TCP/UDP: Closing socket
  3055. Mon Dec 20 20:55:52 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3056. Mon Dec 20 20:55:52 2010 Restart pause, 5 second(s)
  3057. Mon Dec 20 20:55:57 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3058. Mon Dec 20 20:55:57 2010 Re-using SSL/TLS context
  3059. Mon Dec 20 20:55:57 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3060. Mon Dec 20 20:55:57 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3061. Mon Dec 20 20:55:57 2010 Local Options hash (VER=V4): 'bf6006bf'
  3062. Mon Dec 20 20:55:57 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3063. Mon Dec 20 20:55:57 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3064. Mon Dec 20 20:55:58 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3065. Mon Dec 20 20:55:58 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3066. Mon Dec 20 20:55:58 2010 Socket flags: TCP_NODELAY=1 succeeded
  3067. Mon Dec 20 20:55:58 2010 TCPv4_CLIENT link local: [undef]
  3068. Mon Dec 20 20:55:58 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3069. Mon Dec 20 20:55:58 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9b5d545e bf16150a
  3070. Mon Dec 20 20:55:59 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3071. Mon Dec 20 20:55:59 2010 VERIFY OK: nsCertType=SERVER
  3072. Mon Dec 20 20:55:59 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3073. Mon Dec 20 20:56:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3074. Mon Dec 20 20:56:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3075. Mon Dec 20 20:56:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3076. Mon Dec 20 20:56:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3077. Mon Dec 20 20:56:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3078. Mon Dec 20 20:56:01 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3079. Mon Dec 20 20:56:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3080. Mon Dec 20 20:56:04 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3081. Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3082. Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: --socket-flags option modified
  3083. Mon Dec 20 20:56:04 2010 Socket flags: TCP_NODELAY=1 succeeded
  3084. Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3085. Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: route options modified
  3086. Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: route-related options modified
  3087. Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3088. Mon Dec 20 20:56:04 2010 Preserving previous TUN/TAP instance: tun0
  3089. Mon Dec 20 20:56:04 2010 Initialization Sequence Completed
  3090. Mon Dec 20 20:56:28 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #600 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3091. Mon Dec 20 20:56:28 2010 Fatal decryption error (process_incoming_link), restarting
  3092. Mon Dec 20 20:56:28 2010 TCP/UDP: Closing socket
  3093. Mon Dec 20 20:56:28 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3094. Mon Dec 20 20:56:28 2010 Restart pause, 5 second(s)
  3095. Mon Dec 20 20:56:33 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3096. Mon Dec 20 20:56:33 2010 Re-using SSL/TLS context
  3097. Mon Dec 20 20:56:33 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3098. Mon Dec 20 20:56:33 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3099. Mon Dec 20 20:56:33 2010 Local Options hash (VER=V4): 'bf6006bf'
  3100. Mon Dec 20 20:56:33 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3101. Mon Dec 20 20:56:33 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3102. Mon Dec 20 20:56:34 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3103. Mon Dec 20 20:56:34 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3104. Mon Dec 20 20:56:34 2010 Socket flags: TCP_NODELAY=1 succeeded
  3105. Mon Dec 20 20:56:34 2010 TCPv4_CLIENT link local: [undef]
  3106. Mon Dec 20 20:56:34 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3107. Mon Dec 20 20:56:34 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=55621b14 5e8a0955
  3108. Mon Dec 20 20:56:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3109. Mon Dec 20 20:56:35 2010 VERIFY OK: nsCertType=SERVER
  3110. Mon Dec 20 20:56:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3111. Mon Dec 20 20:56:38 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3112. Mon Dec 20 20:56:38 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3113. Mon Dec 20 20:56:38 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3114. Mon Dec 20 20:56:38 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3115. Mon Dec 20 20:56:38 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3116. Mon Dec 20 20:56:38 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3117. Mon Dec 20 20:56:40 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3118. Mon Dec 20 20:56:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3119. Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3120. Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: --socket-flags option modified
  3121. Mon Dec 20 20:56:41 2010 Socket flags: TCP_NODELAY=1 succeeded
  3122. Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3123. Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: route options modified
  3124. Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: route-related options modified
  3125. Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3126. Mon Dec 20 20:56:41 2010 Preserving previous TUN/TAP instance: tun0
  3127. Mon Dec 20 20:56:41 2010 Initialization Sequence Completed
  3128. Mon Dec 20 20:57:01 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #679 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3129. Mon Dec 20 20:57:01 2010 Fatal decryption error (process_incoming_link), restarting
  3130. Mon Dec 20 20:57:01 2010 TCP/UDP: Closing socket
  3131. Mon Dec 20 20:57:01 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3132. Mon Dec 20 20:57:01 2010 Restart pause, 5 second(s)
  3133. Mon Dec 20 20:57:06 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3134. Mon Dec 20 20:57:06 2010 Re-using SSL/TLS context
  3135. Mon Dec 20 20:57:06 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3136. Mon Dec 20 20:57:06 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3137. Mon Dec 20 20:57:06 2010 Local Options hash (VER=V4): 'bf6006bf'
  3138. Mon Dec 20 20:57:06 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3139. Mon Dec 20 20:57:06 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3140. Mon Dec 20 20:57:07 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3141. Mon Dec 20 20:57:07 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3142. Mon Dec 20 20:57:07 2010 Socket flags: TCP_NODELAY=1 succeeded
  3143. Mon Dec 20 20:57:07 2010 TCPv4_CLIENT link local: [undef]
  3144. Mon Dec 20 20:57:07 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3145. Mon Dec 20 20:57:07 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=348dadea 9bb4dfbb
  3146. Mon Dec 20 20:57:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3147. Mon Dec 20 20:57:09 2010 VERIFY OK: nsCertType=SERVER
  3148. Mon Dec 20 20:57:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3149. Mon Dec 20 20:57:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3150. Mon Dec 20 20:57:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3151. Mon Dec 20 20:57:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3152. Mon Dec 20 20:57:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3153. Mon Dec 20 20:57:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3154. Mon Dec 20 20:57:12 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3155. Mon Dec 20 20:57:14 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3156. Mon Dec 20 20:57:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3157. Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3158. Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: --socket-flags option modified
  3159. Mon Dec 20 20:57:14 2010 Socket flags: TCP_NODELAY=1 succeeded
  3160. Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3161. Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: route options modified
  3162. Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: route-related options modified
  3163. Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3164. Mon Dec 20 20:57:14 2010 Preserving previous TUN/TAP instance: tun0
  3165. Mon Dec 20 20:57:14 2010 Initialization Sequence Completed
  3166. Mon Dec 20 20:57:40 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #849 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3167. Mon Dec 20 20:57:40 2010 Fatal decryption error (process_incoming_link), restarting
  3168. Mon Dec 20 20:57:40 2010 TCP/UDP: Closing socket
  3169. Mon Dec 20 20:57:40 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3170. Mon Dec 20 20:57:40 2010 Restart pause, 5 second(s)
  3171. Mon Dec 20 20:57:45 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3172. Mon Dec 20 20:57:45 2010 Re-using SSL/TLS context
  3173. Mon Dec 20 20:57:45 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3174. Mon Dec 20 20:57:45 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3175. Mon Dec 20 20:57:45 2010 Local Options hash (VER=V4): 'bf6006bf'
  3176. Mon Dec 20 20:57:45 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3177. Mon Dec 20 20:57:45 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3178. Mon Dec 20 20:57:46 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3179. Mon Dec 20 20:57:46 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3180. Mon Dec 20 20:57:46 2010 Socket flags: TCP_NODELAY=1 succeeded
  3181. Mon Dec 20 20:57:46 2010 TCPv4_CLIENT link local: [undef]
  3182. Mon Dec 20 20:57:46 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3183. Mon Dec 20 20:57:46 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=f6f9f13f 420e681e
  3184. Mon Dec 20 20:57:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3185. Mon Dec 20 20:57:47 2010 VERIFY OK: nsCertType=SERVER
  3186. Mon Dec 20 20:57:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3187. Mon Dec 20 20:57:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3188. Mon Dec 20 20:57:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3189. Mon Dec 20 20:57:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3190. Mon Dec 20 20:57:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3191. Mon Dec 20 20:57:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3192. Mon Dec 20 20:57:49 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3193. Mon Dec 20 20:57:52 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3194. Mon Dec 20 20:57:52 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3195. Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3196. Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: --socket-flags option modified
  3197. Mon Dec 20 20:57:52 2010 Socket flags: TCP_NODELAY=1 succeeded
  3198. Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3199. Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: route options modified
  3200. Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: route-related options modified
  3201. Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3202. Mon Dec 20 20:57:52 2010 Preserving previous TUN/TAP instance: tun0
  3203. Mon Dec 20 20:57:52 2010 Initialization Sequence Completed
  3204. Mon Dec 20 20:58:15 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1908 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3205. Mon Dec 20 20:58:15 2010 Fatal decryption error (process_incoming_link), restarting
  3206. Mon Dec 20 20:58:15 2010 TCP/UDP: Closing socket
  3207. Mon Dec 20 20:58:15 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3208. Mon Dec 20 20:58:15 2010 Restart pause, 5 second(s)
  3209. Mon Dec 20 20:58:20 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3210. Mon Dec 20 20:58:20 2010 Re-using SSL/TLS context
  3211. Mon Dec 20 20:58:20 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3212. Mon Dec 20 20:58:20 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3213. Mon Dec 20 20:58:20 2010 Local Options hash (VER=V4): 'bf6006bf'
  3214. Mon Dec 20 20:58:20 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3215. Mon Dec 20 20:58:20 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3216. Mon Dec 20 20:58:21 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3217. Mon Dec 20 20:58:21 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3218. Mon Dec 20 20:58:21 2010 Socket flags: TCP_NODELAY=1 succeeded
  3219. Mon Dec 20 20:58:21 2010 TCPv4_CLIENT link local: [undef]
  3220. Mon Dec 20 20:58:21 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3221. Mon Dec 20 20:58:21 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e60bda69 0bd732f7
  3222. Mon Dec 20 20:58:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3223. Mon Dec 20 20:58:23 2010 VERIFY OK: nsCertType=SERVER
  3224. Mon Dec 20 20:58:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3225. Mon Dec 20 20:58:25 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3226. Mon Dec 20 20:58:25 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3227. Mon Dec 20 20:58:25 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3228. Mon Dec 20 20:58:25 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3229. Mon Dec 20 20:58:25 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3230. Mon Dec 20 20:58:25 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3231. Mon Dec 20 20:58:27 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3232. Mon Dec 20 20:58:27 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3233. Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3234. Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: --socket-flags option modified
  3235. Mon Dec 20 20:58:27 2010 Socket flags: TCP_NODELAY=1 succeeded
  3236. Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3237. Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: route options modified
  3238. Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: route-related options modified
  3239. Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3240. Mon Dec 20 20:58:27 2010 Preserving previous TUN/TAP instance: tun0
  3241. Mon Dec 20 20:58:27 2010 Initialization Sequence Completed
  3242. Mon Dec 20 20:58:54 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3243. Mon Dec 20 20:58:54 2010 Fatal decryption error (process_incoming_link), restarting
  3244. Mon Dec 20 20:58:54 2010 TCP/UDP: Closing socket
  3245. Mon Dec 20 20:58:54 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3246. Mon Dec 20 20:58:54 2010 Restart pause, 5 second(s)
  3247. Mon Dec 20 20:58:59 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3248. Mon Dec 20 20:58:59 2010 Re-using SSL/TLS context
  3249. Mon Dec 20 20:58:59 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3250. Mon Dec 20 20:58:59 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3251. Mon Dec 20 20:58:59 2010 Local Options hash (VER=V4): 'bf6006bf'
  3252. Mon Dec 20 20:58:59 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3253. Mon Dec 20 20:58:59 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3254. Mon Dec 20 20:59:00 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3255. Mon Dec 20 20:59:00 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3256. Mon Dec 20 20:59:00 2010 Socket flags: TCP_NODELAY=1 succeeded
  3257. Mon Dec 20 20:59:00 2010 TCPv4_CLIENT link local: [undef]
  3258. Mon Dec 20 20:59:00 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3259. Mon Dec 20 20:59:01 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=ae5ae5b7 737850cd
  3260. Mon Dec 20 20:59:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3261. Mon Dec 20 20:59:02 2010 VERIFY OK: nsCertType=SERVER
  3262. Mon Dec 20 20:59:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3263. Mon Dec 20 20:59:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3264. Mon Dec 20 20:59:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3265. Mon Dec 20 20:59:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3266. Mon Dec 20 20:59:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3267. Mon Dec 20 20:59:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3268. Mon Dec 20 20:59:05 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3269. Mon Dec 20 20:59:07 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3270. Mon Dec 20 20:59:07 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3271. Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3272. Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: --socket-flags option modified
  3273. Mon Dec 20 20:59:07 2010 Socket flags: TCP_NODELAY=1 succeeded
  3274. Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3275. Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: route options modified
  3276. Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: route-related options modified
  3277. Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3278. Mon Dec 20 20:59:07 2010 Preserving previous TUN/TAP instance: tun0
  3279. Mon Dec 20 20:59:07 2010 Initialization Sequence Completed
  3280. Mon Dec 20 20:59:34 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #793 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3281. Mon Dec 20 20:59:34 2010 Fatal decryption error (process_incoming_link), restarting
  3282. Mon Dec 20 20:59:34 2010 TCP/UDP: Closing socket
  3283. Mon Dec 20 20:59:34 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3284. Mon Dec 20 20:59:34 2010 Restart pause, 5 second(s)
  3285. Mon Dec 20 20:59:39 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3286. Mon Dec 20 20:59:39 2010 Re-using SSL/TLS context
  3287. Mon Dec 20 20:59:39 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3288. Mon Dec 20 20:59:39 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3289. Mon Dec 20 20:59:39 2010 Local Options hash (VER=V4): 'bf6006bf'
  3290. Mon Dec 20 20:59:39 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3291. Mon Dec 20 20:59:39 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3292. Mon Dec 20 20:59:40 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3293. Mon Dec 20 20:59:40 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3294. Mon Dec 20 20:59:40 2010 Socket flags: TCP_NODELAY=1 succeeded
  3295. Mon Dec 20 20:59:40 2010 TCPv4_CLIENT link local: [undef]
  3296. Mon Dec 20 20:59:40 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3297. Mon Dec 20 20:59:40 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=8206adfc bf18af1d
  3298. Mon Dec 20 20:59:40 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3299. Mon Dec 20 20:59:40 2010 VERIFY OK: nsCertType=SERVER
  3300. Mon Dec 20 20:59:40 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3301. Mon Dec 20 20:59:42 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3302. Mon Dec 20 20:59:42 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3303. Mon Dec 20 20:59:42 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3304. Mon Dec 20 20:59:42 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3305. Mon Dec 20 20:59:42 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3306. Mon Dec 20 20:59:42 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3307. Mon Dec 20 20:59:44 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3308. Mon Dec 20 20:59:44 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3309. Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3310. Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: --socket-flags option modified
  3311. Mon Dec 20 20:59:44 2010 Socket flags: TCP_NODELAY=1 succeeded
  3312. Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3313. Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: route options modified
  3314. Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: route-related options modified
  3315. Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3316. Mon Dec 20 20:59:44 2010 Preserving previous TUN/TAP instance: tun0
  3317. Mon Dec 20 20:59:44 2010 Initialization Sequence Completed
  3318. Mon Dec 20 21:00:04 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3123 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3319. Mon Dec 20 21:00:04 2010 Fatal decryption error (process_incoming_link), restarting
  3320. Mon Dec 20 21:00:04 2010 TCP/UDP: Closing socket
  3321. Mon Dec 20 21:00:04 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3322. Mon Dec 20 21:00:04 2010 Restart pause, 5 second(s)
  3323. Mon Dec 20 21:00:09 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3324. Mon Dec 20 21:00:09 2010 Re-using SSL/TLS context
  3325. Mon Dec 20 21:00:09 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3326. Mon Dec 20 21:00:09 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3327. Mon Dec 20 21:00:09 2010 Local Options hash (VER=V4): 'bf6006bf'
  3328. Mon Dec 20 21:00:09 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3329. Mon Dec 20 21:00:09 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3330. Mon Dec 20 21:00:10 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3331. Mon Dec 20 21:00:10 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3332. Mon Dec 20 21:00:10 2010 Socket flags: TCP_NODELAY=1 succeeded
  3333. Mon Dec 20 21:00:10 2010 TCPv4_CLIENT link local: [undef]
  3334. Mon Dec 20 21:00:10 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3335. Mon Dec 20 21:00:10 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=928f6b82 bf321b20
  3336. Mon Dec 20 21:00:11 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3337. Mon Dec 20 21:00:11 2010 VERIFY OK: nsCertType=SERVER
  3338. Mon Dec 20 21:00:11 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3339. Mon Dec 20 21:00:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3340. Mon Dec 20 21:00:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3341. Mon Dec 20 21:00:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3342. Mon Dec 20 21:00:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3343. Mon Dec 20 21:00:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3344. Mon Dec 20 21:00:15 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3345. Mon Dec 20 21:00:17 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3346. Mon Dec 20 21:00:17 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3347. Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3348. Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: --socket-flags option modified
  3349. Mon Dec 20 21:00:17 2010 Socket flags: TCP_NODELAY=1 succeeded
  3350. Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3351. Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: route options modified
  3352. Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: route-related options modified
  3353. Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3354. Mon Dec 20 21:00:17 2010 Preserving previous TUN/TAP instance: tun0
  3355. Mon Dec 20 21:00:17 2010 Initialization Sequence Completed
  3356. Mon Dec 20 21:01:00 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1227 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3357. Mon Dec 20 21:01:00 2010 Fatal decryption error (process_incoming_link), restarting
  3358. Mon Dec 20 21:01:00 2010 TCP/UDP: Closing socket
  3359. Mon Dec 20 21:01:00 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3360. Mon Dec 20 21:01:00 2010 Restart pause, 5 second(s)
  3361. Mon Dec 20 21:01:05 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3362. Mon Dec 20 21:01:05 2010 Re-using SSL/TLS context
  3363. Mon Dec 20 21:01:05 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3364. Mon Dec 20 21:01:05 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3365. Mon Dec 20 21:01:05 2010 Local Options hash (VER=V4): 'bf6006bf'
  3366. Mon Dec 20 21:01:05 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3367. Mon Dec 20 21:01:05 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3368. Mon Dec 20 21:01:06 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3369. Mon Dec 20 21:01:06 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3370. Mon Dec 20 21:01:06 2010 Socket flags: TCP_NODELAY=1 succeeded
  3371. Mon Dec 20 21:01:06 2010 TCPv4_CLIENT link local: [undef]
  3372. Mon Dec 20 21:01:06 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3373. Mon Dec 20 21:01:06 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=72f83781 cc8ca051
  3374. Mon Dec 20 21:01:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3375. Mon Dec 20 21:01:07 2010 VERIFY OK: nsCertType=SERVER
  3376. Mon Dec 20 21:01:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3377. Mon Dec 20 21:01:10 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3378. Mon Dec 20 21:01:10 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3379. Mon Dec 20 21:01:10 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3380. Mon Dec 20 21:01:10 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3381. Mon Dec 20 21:01:10 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3382. Mon Dec 20 21:01:10 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3383. Mon Dec 20 21:01:12 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3384. Mon Dec 20 21:01:12 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3385. Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3386. Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: --socket-flags option modified
  3387. Mon Dec 20 21:01:12 2010 Socket flags: TCP_NODELAY=1 succeeded
  3388. Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3389. Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: route options modified
  3390. Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: route-related options modified
  3391. Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3392. Mon Dec 20 21:01:12 2010 Preserving previous TUN/TAP instance: tun0
  3393. Mon Dec 20 21:01:12 2010 Initialization Sequence Completed
  3394. Mon Dec 20 21:01:42 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #879 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3395. Mon Dec 20 21:01:42 2010 Fatal decryption error (process_incoming_link), restarting
  3396. Mon Dec 20 21:01:42 2010 TCP/UDP: Closing socket
  3397. Mon Dec 20 21:01:42 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3398. Mon Dec 20 21:01:42 2010 Restart pause, 5 second(s)
  3399. Mon Dec 20 21:01:47 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3400. Mon Dec 20 21:01:47 2010 Re-using SSL/TLS context
  3401. Mon Dec 20 21:01:47 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3402. Mon Dec 20 21:01:47 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3403. Mon Dec 20 21:01:47 2010 Local Options hash (VER=V4): 'bf6006bf'
  3404. Mon Dec 20 21:01:47 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3405. Mon Dec 20 21:01:47 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3406. Mon Dec 20 21:01:48 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3407. Mon Dec 20 21:01:48 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3408. Mon Dec 20 21:01:48 2010 Socket flags: TCP_NODELAY=1 succeeded
  3409. Mon Dec 20 21:01:48 2010 TCPv4_CLIENT link local: [undef]
  3410. Mon Dec 20 21:01:48 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3411. Mon Dec 20 21:01:48 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=dd8bcbe1 7dde83a1
  3412. Mon Dec 20 21:01:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3413. Mon Dec 20 21:01:50 2010 VERIFY OK: nsCertType=SERVER
  3414. Mon Dec 20 21:01:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3415. Mon Dec 20 21:01:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3416. Mon Dec 20 21:01:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3417. Mon Dec 20 21:01:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3418. Mon Dec 20 21:01:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3419. Mon Dec 20 21:01:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3420. Mon Dec 20 21:01:53 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3421. Mon Dec 20 21:01:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3422. Mon Dec 20 21:01:55 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3423. Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3424. Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: --socket-flags option modified
  3425. Mon Dec 20 21:01:55 2010 Socket flags: TCP_NODELAY=1 succeeded
  3426. Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3427. Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: route options modified
  3428. Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: route-related options modified
  3429. Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3430. Mon Dec 20 21:01:55 2010 Preserving previous TUN/TAP instance: tun0
  3431. Mon Dec 20 21:01:55 2010 Initialization Sequence Completed
  3432. Mon Dec 20 21:02:28 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1101 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3433. Mon Dec 20 21:02:28 2010 Fatal decryption error (process_incoming_link), restarting
  3434. Mon Dec 20 21:02:28 2010 TCP/UDP: Closing socket
  3435. Mon Dec 20 21:02:28 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3436. Mon Dec 20 21:02:28 2010 Restart pause, 5 second(s)
  3437. Mon Dec 20 21:02:33 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3438. Mon Dec 20 21:02:33 2010 Re-using SSL/TLS context
  3439. Mon Dec 20 21:02:33 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3440. Mon Dec 20 21:02:33 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3441. Mon Dec 20 21:02:33 2010 Local Options hash (VER=V4): 'bf6006bf'
  3442. Mon Dec 20 21:02:33 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3443. Mon Dec 20 21:02:33 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3444. Mon Dec 20 21:02:43 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3445. Mon Dec 20 21:02:43 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3446. Mon Dec 20 21:02:43 2010 Socket flags: TCP_NODELAY=1 succeeded
  3447. Mon Dec 20 21:02:43 2010 TCPv4_CLIENT link local: [undef]
  3448. Mon Dec 20 21:02:43 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3449. Mon Dec 20 21:02:44 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=a5d92733 99909497
  3450. Mon Dec 20 21:02:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3451. Mon Dec 20 21:02:45 2010 VERIFY OK: nsCertType=SERVER
  3452. Mon Dec 20 21:02:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3453. Mon Dec 20 21:02:47 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3454. Mon Dec 20 21:02:47 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3455. Mon Dec 20 21:02:47 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3456. Mon Dec 20 21:02:47 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3457. Mon Dec 20 21:02:47 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3458. Mon Dec 20 21:02:47 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3459. Mon Dec 20 21:02:50 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3460. Mon Dec 20 21:02:50 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3461. Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3462. Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: --socket-flags option modified
  3463. Mon Dec 20 21:02:50 2010 Socket flags: TCP_NODELAY=1 succeeded
  3464. Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3465. Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: route options modified
  3466. Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: route-related options modified
  3467. Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3468. Mon Dec 20 21:02:50 2010 Preserving previous TUN/TAP instance: tun0
  3469. Mon Dec 20 21:02:50 2010 Initialization Sequence Completed
  3470. Mon Dec 20 21:03:19 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1025 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3471. Mon Dec 20 21:03:19 2010 Fatal decryption error (process_incoming_link), restarting
  3472. Mon Dec 20 21:03:19 2010 TCP/UDP: Closing socket
  3473. Mon Dec 20 21:03:19 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3474. Mon Dec 20 21:03:19 2010 Restart pause, 5 second(s)
  3475. Mon Dec 20 21:03:24 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3476. Mon Dec 20 21:03:24 2010 Re-using SSL/TLS context
  3477. Mon Dec 20 21:03:24 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3478. Mon Dec 20 21:03:24 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3479. Mon Dec 20 21:03:24 2010 Local Options hash (VER=V4): 'bf6006bf'
  3480. Mon Dec 20 21:03:24 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3481. Mon Dec 20 21:03:24 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3482. Mon Dec 20 21:03:25 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3483. Mon Dec 20 21:03:25 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3484. Mon Dec 20 21:03:25 2010 Socket flags: TCP_NODELAY=1 succeeded
  3485. Mon Dec 20 21:03:25 2010 TCPv4_CLIENT link local: [undef]
  3486. Mon Dec 20 21:03:25 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3487. Mon Dec 20 21:03:25 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=dd578a50 923ccb5a
  3488. Mon Dec 20 21:03:26 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3489. Mon Dec 20 21:03:26 2010 VERIFY OK: nsCertType=SERVER
  3490. Mon Dec 20 21:03:26 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3491. Mon Dec 20 21:03:28 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3492. Mon Dec 20 21:03:28 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3493. Mon Dec 20 21:03:28 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3494. Mon Dec 20 21:03:28 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3495. Mon Dec 20 21:03:28 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3496. Mon Dec 20 21:03:28 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3497. Mon Dec 20 21:03:30 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3498. Mon Dec 20 21:03:30 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3499. Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3500. Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: --socket-flags option modified
  3501. Mon Dec 20 21:03:30 2010 Socket flags: TCP_NODELAY=1 succeeded
  3502. Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3503. Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: route options modified
  3504. Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: route-related options modified
  3505. Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3506. Mon Dec 20 21:03:30 2010 Preserving previous TUN/TAP instance: tun0
  3507. Mon Dec 20 21:03:30 2010 Initialization Sequence Completed
  3508. Mon Dec 20 21:03:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1831 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3509. Mon Dec 20 21:03:51 2010 Fatal decryption error (process_incoming_link), restarting
  3510. Mon Dec 20 21:03:51 2010 TCP/UDP: Closing socket
  3511. Mon Dec 20 21:03:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3512. Mon Dec 20 21:03:51 2010 Restart pause, 5 second(s)
  3513. Mon Dec 20 21:03:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3514. Mon Dec 20 21:03:56 2010 Re-using SSL/TLS context
  3515. Mon Dec 20 21:03:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3516. Mon Dec 20 21:03:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3517. Mon Dec 20 21:03:56 2010 Local Options hash (VER=V4): 'bf6006bf'
  3518. Mon Dec 20 21:03:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3519. Mon Dec 20 21:03:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3520. Mon Dec 20 21:03:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3521. Mon Dec 20 21:03:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3522. Mon Dec 20 21:03:57 2010 Socket flags: TCP_NODELAY=1 succeeded
  3523. Mon Dec 20 21:03:57 2010 TCPv4_CLIENT link local: [undef]
  3524. Mon Dec 20 21:03:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3525. Mon Dec 20 21:03:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=fc4dd96b a7996e6d
  3526. Mon Dec 20 21:03:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3527. Mon Dec 20 21:03:58 2010 VERIFY OK: nsCertType=SERVER
  3528. Mon Dec 20 21:03:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3529. Mon Dec 20 21:04:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3530. Mon Dec 20 21:04:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3531. Mon Dec 20 21:04:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3532. Mon Dec 20 21:04:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3533. Mon Dec 20 21:04:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3534. Mon Dec 20 21:04:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3535. Mon Dec 20 21:04:02 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3536. Mon Dec 20 21:04:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3537. Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3538. Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: --socket-flags option modified
  3539. Mon Dec 20 21:04:03 2010 Socket flags: TCP_NODELAY=1 succeeded
  3540. Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3541. Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: route options modified
  3542. Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: route-related options modified
  3543. Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3544. Mon Dec 20 21:04:03 2010 Preserving previous TUN/TAP instance: tun0
  3545. Mon Dec 20 21:04:03 2010 Initialization Sequence Completed
  3546. Mon Dec 20 21:04:47 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1187 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3547. Mon Dec 20 21:04:47 2010 Fatal decryption error (process_incoming_link), restarting
  3548. Mon Dec 20 21:04:47 2010 TCP/UDP: Closing socket
  3549. Mon Dec 20 21:04:47 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3550. Mon Dec 20 21:04:47 2010 Restart pause, 5 second(s)
  3551. Mon Dec 20 21:04:52 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3552. Mon Dec 20 21:04:52 2010 Re-using SSL/TLS context
  3553. Mon Dec 20 21:04:52 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3554. Mon Dec 20 21:04:52 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3555. Mon Dec 20 21:04:52 2010 Local Options hash (VER=V4): 'bf6006bf'
  3556. Mon Dec 20 21:04:52 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3557. Mon Dec 20 21:04:52 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3558. Mon Dec 20 21:04:53 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3559. Mon Dec 20 21:04:53 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3560. Mon Dec 20 21:04:53 2010 Socket flags: TCP_NODELAY=1 succeeded
  3561. Mon Dec 20 21:04:53 2010 TCPv4_CLIENT link local: [undef]
  3562. Mon Dec 20 21:04:53 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3563. Mon Dec 20 21:04:53 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e007c9d7 8f7f837c
  3564. Mon Dec 20 21:04:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3565. Mon Dec 20 21:04:54 2010 VERIFY OK: nsCertType=SERVER
  3566. Mon Dec 20 21:04:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3567. Mon Dec 20 21:04:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3568. Mon Dec 20 21:04:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3569. Mon Dec 20 21:04:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3570. Mon Dec 20 21:04:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3571. Mon Dec 20 21:04:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3572. Mon Dec 20 21:04:57 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3573. Mon Dec 20 21:04:59 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3574. Mon Dec 20 21:05:00 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3575. Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3576. Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: --socket-flags option modified
  3577. Mon Dec 20 21:05:00 2010 Socket flags: TCP_NODELAY=1 succeeded
  3578. Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3579. Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: route options modified
  3580. Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: route-related options modified
  3581. Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3582. Mon Dec 20 21:05:00 2010 Preserving previous TUN/TAP instance: tun0
  3583. Mon Dec 20 21:05:00 2010 Initialization Sequence Completed
  3584. Mon Dec 20 21:05:43 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1082 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3585. Mon Dec 20 21:05:43 2010 Fatal decryption error (process_incoming_link), restarting
  3586. Mon Dec 20 21:05:43 2010 TCP/UDP: Closing socket
  3587. Mon Dec 20 21:05:43 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3588. Mon Dec 20 21:05:43 2010 Restart pause, 5 second(s)
  3589. Mon Dec 20 21:05:48 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3590. Mon Dec 20 21:05:48 2010 Re-using SSL/TLS context
  3591. Mon Dec 20 21:05:48 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3592. Mon Dec 20 21:05:48 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3593. Mon Dec 20 21:05:48 2010 Local Options hash (VER=V4): 'bf6006bf'
  3594. Mon Dec 20 21:05:48 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3595. Mon Dec 20 21:05:48 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3596. Mon Dec 20 21:05:49 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3597. Mon Dec 20 21:05:49 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3598. Mon Dec 20 21:05:49 2010 Socket flags: TCP_NODELAY=1 succeeded
  3599. Mon Dec 20 21:05:49 2010 TCPv4_CLIENT link local: [undef]
  3600. Mon Dec 20 21:05:49 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3601. Mon Dec 20 21:05:49 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=400411c1 c4e26f30
  3602. Mon Dec 20 21:05:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3603. Mon Dec 20 21:05:50 2010 VERIFY OK: nsCertType=SERVER
  3604. Mon Dec 20 21:05:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3605. Mon Dec 20 21:05:52 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3606. Mon Dec 20 21:05:52 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3607. Mon Dec 20 21:05:52 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3608. Mon Dec 20 21:05:52 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3609. Mon Dec 20 21:05:52 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3610. Mon Dec 20 21:05:52 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3611. Mon Dec 20 21:05:54 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3612. Mon Dec 20 21:05:54 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3613. Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3614. Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: --socket-flags option modified
  3615. Mon Dec 20 21:05:54 2010 Socket flags: TCP_NODELAY=1 succeeded
  3616. Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3617. Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: route options modified
  3618. Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: route-related options modified
  3619. Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3620. Mon Dec 20 21:05:54 2010 Preserving previous TUN/TAP instance: tun0
  3621. Mon Dec 20 21:05:54 2010 Initialization Sequence Completed
  3622. Mon Dec 20 21:06:12 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1567 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3623. Mon Dec 20 21:06:12 2010 Fatal decryption error (process_incoming_link), restarting
  3624. Mon Dec 20 21:06:12 2010 TCP/UDP: Closing socket
  3625. Mon Dec 20 21:06:12 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3626. Mon Dec 20 21:06:12 2010 Restart pause, 5 second(s)
  3627. Mon Dec 20 21:06:17 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3628. Mon Dec 20 21:06:17 2010 Re-using SSL/TLS context
  3629. Mon Dec 20 21:06:17 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3630. Mon Dec 20 21:06:17 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3631. Mon Dec 20 21:06:17 2010 Local Options hash (VER=V4): 'bf6006bf'
  3632. Mon Dec 20 21:06:17 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3633. Mon Dec 20 21:06:17 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3634. Mon Dec 20 21:06:18 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3635. Mon Dec 20 21:06:18 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3636. Mon Dec 20 21:06:18 2010 Socket flags: TCP_NODELAY=1 succeeded
  3637. Mon Dec 20 21:06:18 2010 TCPv4_CLIENT link local: [undef]
  3638. Mon Dec 20 21:06:18 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3639. Mon Dec 20 21:06:18 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d1ee0de5 93deba4d
  3640. Mon Dec 20 21:06:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3641. Mon Dec 20 21:06:19 2010 VERIFY OK: nsCertType=SERVER
  3642. Mon Dec 20 21:06:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3643. Mon Dec 20 21:06:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3644. Mon Dec 20 21:06:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3645. Mon Dec 20 21:06:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3646. Mon Dec 20 21:06:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3647. Mon Dec 20 21:06:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3648. Mon Dec 20 21:06:23 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3649. Mon Dec 20 21:06:25 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3650. Mon Dec 20 21:06:25 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3651. Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3652. Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: --socket-flags option modified
  3653. Mon Dec 20 21:06:25 2010 Socket flags: TCP_NODELAY=1 succeeded
  3654. Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3655. Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: route options modified
  3656. Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: route-related options modified
  3657. Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3658. Mon Dec 20 21:06:25 2010 Preserving previous TUN/TAP instance: tun0
  3659. Mon Dec 20 21:06:25 2010 Initialization Sequence Completed
  3660. Mon Dec 20 21:06:57 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1098 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3661. Mon Dec 20 21:06:57 2010 Fatal decryption error (process_incoming_link), restarting
  3662. Mon Dec 20 21:06:57 2010 TCP/UDP: Closing socket
  3663. Mon Dec 20 21:06:57 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3664. Mon Dec 20 21:06:57 2010 Restart pause, 5 second(s)
  3665. Mon Dec 20 21:07:02 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3666. Mon Dec 20 21:07:02 2010 Re-using SSL/TLS context
  3667. Mon Dec 20 21:07:02 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3668. Mon Dec 20 21:07:02 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3669. Mon Dec 20 21:07:02 2010 Local Options hash (VER=V4): 'bf6006bf'
  3670. Mon Dec 20 21:07:02 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3671. Mon Dec 20 21:07:02 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3672. Mon Dec 20 21:07:03 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3673. Mon Dec 20 21:07:03 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3674. Mon Dec 20 21:07:03 2010 Socket flags: TCP_NODELAY=1 succeeded
  3675. Mon Dec 20 21:07:03 2010 TCPv4_CLIENT link local: [undef]
  3676. Mon Dec 20 21:07:03 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3677. Mon Dec 20 21:07:03 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=0b02540a de96b8f8
  3678. Mon Dec 20 21:07:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3679. Mon Dec 20 21:07:04 2010 VERIFY OK: nsCertType=SERVER
  3680. Mon Dec 20 21:07:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3681. Mon Dec 20 21:07:07 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3682. Mon Dec 20 21:07:07 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3683. Mon Dec 20 21:07:07 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3684. Mon Dec 20 21:07:07 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3685. Mon Dec 20 21:07:07 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3686. Mon Dec 20 21:07:07 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3687. Mon Dec 20 21:07:10 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3688. Mon Dec 20 21:07:10 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3689. Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3690. Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: --socket-flags option modified
  3691. Mon Dec 20 21:07:10 2010 Socket flags: TCP_NODELAY=1 succeeded
  3692. Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3693. Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: route options modified
  3694. Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: route-related options modified
  3695. Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3696. Mon Dec 20 21:07:10 2010 Preserving previous TUN/TAP instance: tun0
  3697. Mon Dec 20 21:07:10 2010 Initialization Sequence Completed
  3698. Mon Dec 20 21:08:00 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1450 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3699. Mon Dec 20 21:08:00 2010 Fatal decryption error (process_incoming_link), restarting
  3700. Mon Dec 20 21:08:00 2010 TCP/UDP: Closing socket
  3701. Mon Dec 20 21:08:00 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3702. Mon Dec 20 21:08:00 2010 Restart pause, 5 second(s)
  3703. Mon Dec 20 21:08:05 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3704. Mon Dec 20 21:08:05 2010 Re-using SSL/TLS context
  3705. Mon Dec 20 21:08:05 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3706. Mon Dec 20 21:08:05 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3707. Mon Dec 20 21:08:05 2010 Local Options hash (VER=V4): 'bf6006bf'
  3708. Mon Dec 20 21:08:05 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3709. Mon Dec 20 21:08:05 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3710. Mon Dec 20 21:08:06 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3711. Mon Dec 20 21:08:06 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3712. Mon Dec 20 21:08:06 2010 Socket flags: TCP_NODELAY=1 succeeded
  3713. Mon Dec 20 21:08:06 2010 TCPv4_CLIENT link local: [undef]
  3714. Mon Dec 20 21:08:06 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3715. Mon Dec 20 21:08:06 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e5e3f08d de5eead7
  3716. Mon Dec 20 21:08:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3717. Mon Dec 20 21:08:07 2010 VERIFY OK: nsCertType=SERVER
  3718. Mon Dec 20 21:08:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3719. Mon Dec 20 21:08:10 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3720. Mon Dec 20 21:08:10 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3721. Mon Dec 20 21:08:10 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3722. Mon Dec 20 21:08:10 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3723. Mon Dec 20 21:08:10 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3724. Mon Dec 20 21:08:10 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3725. Mon Dec 20 21:08:12 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3726. Mon Dec 20 21:08:12 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3727. Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3728. Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: --socket-flags option modified
  3729. Mon Dec 20 21:08:12 2010 Socket flags: TCP_NODELAY=1 succeeded
  3730. Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3731. Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: route options modified
  3732. Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: route-related options modified
  3733. Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3734. Mon Dec 20 21:08:12 2010 Preserving previous TUN/TAP instance: tun0
  3735. Mon Dec 20 21:08:12 2010 Initialization Sequence Completed
  3736. Mon Dec 20 21:08:54 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1179 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3737. Mon Dec 20 21:08:54 2010 Fatal decryption error (process_incoming_link), restarting
  3738. Mon Dec 20 21:08:54 2010 TCP/UDP: Closing socket
  3739. Mon Dec 20 21:08:54 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3740. Mon Dec 20 21:08:54 2010 Restart pause, 5 second(s)
  3741. Mon Dec 20 21:08:59 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3742. Mon Dec 20 21:08:59 2010 Re-using SSL/TLS context
  3743. Mon Dec 20 21:08:59 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3744. Mon Dec 20 21:08:59 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3745. Mon Dec 20 21:08:59 2010 Local Options hash (VER=V4): 'bf6006bf'
  3746. Mon Dec 20 21:08:59 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3747. Mon Dec 20 21:08:59 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3748. Mon Dec 20 21:09:00 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3749. Mon Dec 20 21:09:00 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3750. Mon Dec 20 21:09:00 2010 Socket flags: TCP_NODELAY=1 succeeded
  3751. Mon Dec 20 21:09:00 2010 TCPv4_CLIENT link local: [undef]
  3752. Mon Dec 20 21:09:00 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3753. Mon Dec 20 21:09:00 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=b09579a3 80d84909
  3754. Mon Dec 20 21:09:01 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3755. Mon Dec 20 21:09:01 2010 VERIFY OK: nsCertType=SERVER
  3756. Mon Dec 20 21:09:01 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3757. Mon Dec 20 21:09:03 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3758. Mon Dec 20 21:09:03 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3759. Mon Dec 20 21:09:03 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3760. Mon Dec 20 21:09:03 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3761. Mon Dec 20 21:09:03 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3762. Mon Dec 20 21:09:03 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3763. Mon Dec 20 21:09:05 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3764. Mon Dec 20 21:09:06 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3765. Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3766. Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: --socket-flags option modified
  3767. Mon Dec 20 21:09:06 2010 Socket flags: TCP_NODELAY=1 succeeded
  3768. Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3769. Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: route options modified
  3770. Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: route-related options modified
  3771. Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3772. Mon Dec 20 21:09:06 2010 Preserving previous TUN/TAP instance: tun0
  3773. Mon Dec 20 21:09:06 2010 Initialization Sequence Completed
  3774. Mon Dec 20 21:09:38 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #735 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3775. Mon Dec 20 21:09:38 2010 Fatal decryption error (process_incoming_link), restarting
  3776. Mon Dec 20 21:09:38 2010 TCP/UDP: Closing socket
  3777. Mon Dec 20 21:09:38 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3778. Mon Dec 20 21:09:38 2010 Restart pause, 5 second(s)
  3779. Mon Dec 20 21:09:43 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3780. Mon Dec 20 21:09:43 2010 Re-using SSL/TLS context
  3781. Mon Dec 20 21:09:43 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3782. Mon Dec 20 21:09:43 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3783. Mon Dec 20 21:09:43 2010 Local Options hash (VER=V4): 'bf6006bf'
  3784. Mon Dec 20 21:09:43 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3785. Mon Dec 20 21:09:43 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3786. Mon Dec 20 21:09:44 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3787. Mon Dec 20 21:09:44 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3788. Mon Dec 20 21:09:44 2010 Socket flags: TCP_NODELAY=1 succeeded
  3789. Mon Dec 20 21:09:44 2010 TCPv4_CLIENT link local: [undef]
  3790. Mon Dec 20 21:09:44 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3791. Mon Dec 20 21:09:44 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=3ed5a2a7 9e471ee9
  3792. Mon Dec 20 21:09:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3793. Mon Dec 20 21:09:45 2010 VERIFY OK: nsCertType=SERVER
  3794. Mon Dec 20 21:09:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3795. Mon Dec 20 21:09:47 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3796. Mon Dec 20 21:09:47 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3797. Mon Dec 20 21:09:47 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3798. Mon Dec 20 21:09:47 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3799. Mon Dec 20 21:09:47 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3800. Mon Dec 20 21:09:47 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3801. Mon Dec 20 21:09:49 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3802. Mon Dec 20 21:09:50 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3803. Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3804. Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: --socket-flags option modified
  3805. Mon Dec 20 21:09:50 2010 Socket flags: TCP_NODELAY=1 succeeded
  3806. Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3807. Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: route options modified
  3808. Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: route-related options modified
  3809. Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3810. Mon Dec 20 21:09:50 2010 Preserving previous TUN/TAP instance: tun0
  3811. Mon Dec 20 21:09:50 2010 Initialization Sequence Completed
  3812. Mon Dec 20 21:10:09 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #778 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3813. Mon Dec 20 21:10:09 2010 Fatal decryption error (process_incoming_link), restarting
  3814. Mon Dec 20 21:10:09 2010 TCP/UDP: Closing socket
  3815. Mon Dec 20 21:10:09 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3816. Mon Dec 20 21:10:09 2010 Restart pause, 5 second(s)
  3817. Mon Dec 20 21:10:14 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3818. Mon Dec 20 21:10:14 2010 Re-using SSL/TLS context
  3819. Mon Dec 20 21:10:14 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3820. Mon Dec 20 21:10:14 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3821. Mon Dec 20 21:10:14 2010 Local Options hash (VER=V4): 'bf6006bf'
  3822. Mon Dec 20 21:10:14 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3823. Mon Dec 20 21:10:14 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3824. Mon Dec 20 21:10:15 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3825. Mon Dec 20 21:10:15 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3826. Mon Dec 20 21:10:15 2010 Socket flags: TCP_NODELAY=1 succeeded
  3827. Mon Dec 20 21:10:15 2010 TCPv4_CLIENT link local: [undef]
  3828. Mon Dec 20 21:10:15 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3829. Mon Dec 20 21:10:16 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c3547c3b 5d33f280
  3830. Mon Dec 20 21:10:17 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3831. Mon Dec 20 21:10:17 2010 VERIFY OK: nsCertType=SERVER
  3832. Mon Dec 20 21:10:17 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3833. Mon Dec 20 21:10:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3834. Mon Dec 20 21:10:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3835. Mon Dec 20 21:10:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3836. Mon Dec 20 21:10:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3837. Mon Dec 20 21:10:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3838. Mon Dec 20 21:10:20 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3839. Mon Dec 20 21:10:22 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3840. Mon Dec 20 21:10:22 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3841. Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3842. Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: --socket-flags option modified
  3843. Mon Dec 20 21:10:22 2010 Socket flags: TCP_NODELAY=1 succeeded
  3844. Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3845. Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: route options modified
  3846. Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: route-related options modified
  3847. Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3848. Mon Dec 20 21:10:22 2010 Preserving previous TUN/TAP instance: tun0
  3849. Mon Dec 20 21:10:22 2010 Initialization Sequence Completed
  3850. Mon Dec 20 21:10:45 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #894 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3851. Mon Dec 20 21:10:45 2010 Fatal decryption error (process_incoming_link), restarting
  3852. Mon Dec 20 21:10:45 2010 TCP/UDP: Closing socket
  3853. Mon Dec 20 21:10:45 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3854. Mon Dec 20 21:10:45 2010 Restart pause, 5 second(s)
  3855. Mon Dec 20 21:10:50 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3856. Mon Dec 20 21:10:50 2010 Re-using SSL/TLS context
  3857. Mon Dec 20 21:10:50 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3858. Mon Dec 20 21:10:50 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3859. Mon Dec 20 21:10:50 2010 Local Options hash (VER=V4): 'bf6006bf'
  3860. Mon Dec 20 21:10:50 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3861. Mon Dec 20 21:10:50 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3862. Mon Dec 20 21:10:51 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3863. Mon Dec 20 21:10:51 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3864. Mon Dec 20 21:10:51 2010 Socket flags: TCP_NODELAY=1 succeeded
  3865. Mon Dec 20 21:10:51 2010 TCPv4_CLIENT link local: [undef]
  3866. Mon Dec 20 21:10:51 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3867. Mon Dec 20 21:10:51 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=0084647f abc79c59
  3868. Mon Dec 20 21:10:52 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3869. Mon Dec 20 21:10:52 2010 VERIFY OK: nsCertType=SERVER
  3870. Mon Dec 20 21:10:52 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3871. Mon Dec 20 21:10:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3872. Mon Dec 20 21:10:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3873. Mon Dec 20 21:10:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3874. Mon Dec 20 21:10:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3875. Mon Dec 20 21:10:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3876. Mon Dec 20 21:10:55 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3877. Mon Dec 20 21:10:58 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3878. Mon Dec 20 21:10:58 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3879. Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3880. Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: --socket-flags option modified
  3881. Mon Dec 20 21:10:58 2010 Socket flags: TCP_NODELAY=1 succeeded
  3882. Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3883. Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: route options modified
  3884. Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: route-related options modified
  3885. Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3886. Mon Dec 20 21:10:58 2010 Preserving previous TUN/TAP instance: tun0
  3887. Mon Dec 20 21:10:58 2010 Initialization Sequence Completed
  3888. Mon Dec 20 21:11:28 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #940 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3889. Mon Dec 20 21:11:28 2010 Fatal decryption error (process_incoming_link), restarting
  3890. Mon Dec 20 21:11:28 2010 TCP/UDP: Closing socket
  3891. Mon Dec 20 21:11:28 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3892. Mon Dec 20 21:11:28 2010 Restart pause, 5 second(s)
  3893. Mon Dec 20 21:11:33 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3894. Mon Dec 20 21:11:33 2010 Re-using SSL/TLS context
  3895. Mon Dec 20 21:11:33 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3896. Mon Dec 20 21:11:33 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3897. Mon Dec 20 21:11:33 2010 Local Options hash (VER=V4): 'bf6006bf'
  3898. Mon Dec 20 21:11:33 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3899. Mon Dec 20 21:11:33 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3900. Mon Dec 20 21:11:34 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3901. Mon Dec 20 21:11:34 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3902. Mon Dec 20 21:11:34 2010 Socket flags: TCP_NODELAY=1 succeeded
  3903. Mon Dec 20 21:11:34 2010 TCPv4_CLIENT link local: [undef]
  3904. Mon Dec 20 21:11:34 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3905. Mon Dec 20 21:11:34 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=2dbd1a87 9625bfe1
  3906. Mon Dec 20 21:11:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3907. Mon Dec 20 21:11:35 2010 VERIFY OK: nsCertType=SERVER
  3908. Mon Dec 20 21:11:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3909. Mon Dec 20 21:11:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3910. Mon Dec 20 21:11:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3911. Mon Dec 20 21:11:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3912. Mon Dec 20 21:11:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3913. Mon Dec 20 21:11:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3914. Mon Dec 20 21:11:37 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3915. Mon Dec 20 21:11:40 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3916. Mon Dec 20 21:11:40 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3917. Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3918. Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: --socket-flags option modified
  3919. Mon Dec 20 21:11:40 2010 Socket flags: TCP_NODELAY=1 succeeded
  3920. Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3921. Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: route options modified
  3922. Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: route-related options modified
  3923. Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3924. Mon Dec 20 21:11:40 2010 Preserving previous TUN/TAP instance: tun0
  3925. Mon Dec 20 21:11:40 2010 Initialization Sequence Completed
  3926. Mon Dec 20 21:11:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #625 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3927. Mon Dec 20 21:11:51 2010 Fatal decryption error (process_incoming_link), restarting
  3928. Mon Dec 20 21:11:51 2010 TCP/UDP: Closing socket
  3929. Mon Dec 20 21:11:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3930. Mon Dec 20 21:11:51 2010 Restart pause, 5 second(s)
  3931. Mon Dec 20 21:11:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3932. Mon Dec 20 21:11:56 2010 Re-using SSL/TLS context
  3933. Mon Dec 20 21:11:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3934. Mon Dec 20 21:11:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3935. Mon Dec 20 21:11:56 2010 Local Options hash (VER=V4): 'bf6006bf'
  3936. Mon Dec 20 21:11:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3937. Mon Dec 20 21:11:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3938. Mon Dec 20 21:11:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3939. Mon Dec 20 21:11:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3940. Mon Dec 20 21:11:57 2010 Socket flags: TCP_NODELAY=1 succeeded
  3941. Mon Dec 20 21:11:57 2010 TCPv4_CLIENT link local: [undef]
  3942. Mon Dec 20 21:11:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3943. Mon Dec 20 21:11:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=acd2eb87 f9ed897f
  3944. Mon Dec 20 21:11:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3945. Mon Dec 20 21:11:58 2010 VERIFY OK: nsCertType=SERVER
  3946. Mon Dec 20 21:11:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3947. Mon Dec 20 21:12:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3948. Mon Dec 20 21:12:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3949. Mon Dec 20 21:12:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3950. Mon Dec 20 21:12:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3951. Mon Dec 20 21:12:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3952. Mon Dec 20 21:12:01 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3953. Mon Dec 20 21:12:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3954. Mon Dec 20 21:12:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3955. Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3956. Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: --socket-flags option modified
  3957. Mon Dec 20 21:12:03 2010 Socket flags: TCP_NODELAY=1 succeeded
  3958. Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3959. Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: route options modified
  3960. Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: route-related options modified
  3961. Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  3962. Mon Dec 20 21:12:03 2010 Preserving previous TUN/TAP instance: tun0
  3963. Mon Dec 20 21:12:03 2010 Initialization Sequence Completed
  3964. Mon Dec 20 21:12:27 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #824 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  3965. Mon Dec 20 21:12:27 2010 Fatal decryption error (process_incoming_link), restarting
  3966. Mon Dec 20 21:12:27 2010 TCP/UDP: Closing socket
  3967. Mon Dec 20 21:12:27 2010 SIGUSR1[soft,decryption-error] received, process restarting
  3968. Mon Dec 20 21:12:27 2010 Restart pause, 5 second(s)
  3969. Mon Dec 20 21:12:32 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3970. Mon Dec 20 21:12:32 2010 Re-using SSL/TLS context
  3971. Mon Dec 20 21:12:32 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  3972. Mon Dec 20 21:12:32 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  3973. Mon Dec 20 21:12:32 2010 Local Options hash (VER=V4): 'bf6006bf'
  3974. Mon Dec 20 21:12:32 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  3975. Mon Dec 20 21:12:32 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  3976. Mon Dec 20 21:12:33 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  3977. Mon Dec 20 21:12:33 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  3978. Mon Dec 20 21:12:33 2010 Socket flags: TCP_NODELAY=1 succeeded
  3979. Mon Dec 20 21:12:33 2010 TCPv4_CLIENT link local: [undef]
  3980. Mon Dec 20 21:12:33 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  3981. Mon Dec 20 21:12:33 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d6e7cf62 cecf4c4c
  3982. Mon Dec 20 21:12:34 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  3983. Mon Dec 20 21:12:34 2010 VERIFY OK: nsCertType=SERVER
  3984. Mon Dec 20 21:12:34 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  3985. Mon Dec 20 21:12:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3986. Mon Dec 20 21:12:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3987. Mon Dec 20 21:12:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  3988. Mon Dec 20 21:12:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  3989. Mon Dec 20 21:12:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  3990. Mon Dec 20 21:12:37 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  3991. Mon Dec 20 21:12:39 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  3992. Mon Dec 20 21:12:39 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  3993. Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: timers and/or timeouts modified
  3994. Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: --socket-flags option modified
  3995. Mon Dec 20 21:12:39 2010 Socket flags: TCP_NODELAY=1 succeeded
  3996. Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: --ifconfig/up options modified
  3997. Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: route options modified
  3998. Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: route-related options modified
  3999. Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4000. Mon Dec 20 21:12:39 2010 Preserving previous TUN/TAP instance: tun0
  4001. Mon Dec 20 21:12:39 2010 Initialization Sequence Completed
  4002. Mon Dec 20 21:13:23 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1151 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4003. Mon Dec 20 21:13:23 2010 Fatal decryption error (process_incoming_link), restarting
  4004. Mon Dec 20 21:13:23 2010 TCP/UDP: Closing socket
  4005. Mon Dec 20 21:13:23 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4006. Mon Dec 20 21:13:23 2010 Restart pause, 5 second(s)
  4007. Mon Dec 20 21:13:28 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4008. Mon Dec 20 21:13:28 2010 Re-using SSL/TLS context
  4009. Mon Dec 20 21:13:28 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4010. Mon Dec 20 21:13:28 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4011. Mon Dec 20 21:13:28 2010 Local Options hash (VER=V4): 'bf6006bf'
  4012. Mon Dec 20 21:13:28 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4013. Mon Dec 20 21:13:28 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4014. Mon Dec 20 21:13:29 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4015. Mon Dec 20 21:13:29 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4016. Mon Dec 20 21:13:29 2010 Socket flags: TCP_NODELAY=1 succeeded
  4017. Mon Dec 20 21:13:29 2010 TCPv4_CLIENT link local: [undef]
  4018. Mon Dec 20 21:13:29 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4019. Mon Dec 20 21:13:29 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d9d3b91d b27f05b6
  4020. Mon Dec 20 21:13:30 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4021. Mon Dec 20 21:13:30 2010 VERIFY OK: nsCertType=SERVER
  4022. Mon Dec 20 21:13:30 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4023. Mon Dec 20 21:13:33 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4024. Mon Dec 20 21:13:33 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4025. Mon Dec 20 21:13:33 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4026. Mon Dec 20 21:13:33 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4027. Mon Dec 20 21:13:33 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4028. Mon Dec 20 21:13:33 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4029. Mon Dec 20 21:13:35 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4030. Mon Dec 20 21:13:35 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4031. Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4032. Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: --socket-flags option modified
  4033. Mon Dec 20 21:13:35 2010 Socket flags: TCP_NODELAY=1 succeeded
  4034. Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4035. Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: route options modified
  4036. Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: route-related options modified
  4037. Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4038. Mon Dec 20 21:13:35 2010 Preserving previous TUN/TAP instance: tun0
  4039. Mon Dec 20 21:13:35 2010 Initialization Sequence Completed
  4040. Mon Dec 20 21:15:14 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1635 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4041. Mon Dec 20 21:15:14 2010 Fatal decryption error (process_incoming_link), restarting
  4042. Mon Dec 20 21:15:14 2010 TCP/UDP: Closing socket
  4043. Mon Dec 20 21:15:14 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4044. Mon Dec 20 21:15:14 2010 Restart pause, 5 second(s)
  4045. Mon Dec 20 21:15:19 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4046. Mon Dec 20 21:15:19 2010 Re-using SSL/TLS context
  4047. Mon Dec 20 21:15:19 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4048. Mon Dec 20 21:15:19 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4049. Mon Dec 20 21:15:19 2010 Local Options hash (VER=V4): 'bf6006bf'
  4050. Mon Dec 20 21:15:19 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4051. Mon Dec 20 21:15:19 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4052. Mon Dec 20 21:15:20 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4053. Mon Dec 20 21:15:20 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4054. Mon Dec 20 21:15:20 2010 Socket flags: TCP_NODELAY=1 succeeded
  4055. Mon Dec 20 21:15:20 2010 TCPv4_CLIENT link local: [undef]
  4056. Mon Dec 20 21:15:20 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4057. Mon Dec 20 21:15:21 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=91681e60 31299f5e
  4058. Mon Dec 20 21:15:22 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4059. Mon Dec 20 21:15:22 2010 VERIFY OK: nsCertType=SERVER
  4060. Mon Dec 20 21:15:22 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4061. Mon Dec 20 21:15:26 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4062. Mon Dec 20 21:15:26 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4063. Mon Dec 20 21:15:26 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4064. Mon Dec 20 21:15:26 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4065. Mon Dec 20 21:15:26 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4066. Mon Dec 20 21:15:26 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4067. Mon Dec 20 21:15:28 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4068. Mon Dec 20 21:15:28 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4069. Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4070. Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: --socket-flags option modified
  4071. Mon Dec 20 21:15:28 2010 Socket flags: TCP_NODELAY=1 succeeded
  4072. Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4073. Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: route options modified
  4074. Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: route-related options modified
  4075. Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4076. Mon Dec 20 21:15:28 2010 Preserving previous TUN/TAP instance: tun0
  4077. Mon Dec 20 21:15:28 2010 Initialization Sequence Completed
  4078. Mon Dec 20 21:16:05 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1670 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4079. Mon Dec 20 21:16:05 2010 Fatal decryption error (process_incoming_link), restarting
  4080. Mon Dec 20 21:16:05 2010 TCP/UDP: Closing socket
  4081. Mon Dec 20 21:16:05 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4082. Mon Dec 20 21:16:05 2010 Restart pause, 5 second(s)
  4083. Mon Dec 20 21:16:10 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4084. Mon Dec 20 21:16:10 2010 Re-using SSL/TLS context
  4085. Mon Dec 20 21:16:10 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4086. Mon Dec 20 21:16:10 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4087. Mon Dec 20 21:16:10 2010 Local Options hash (VER=V4): 'bf6006bf'
  4088. Mon Dec 20 21:16:10 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4089. Mon Dec 20 21:16:10 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4090. Mon Dec 20 21:16:11 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4091. Mon Dec 20 21:16:11 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4092. Mon Dec 20 21:16:11 2010 Socket flags: TCP_NODELAY=1 succeeded
  4093. Mon Dec 20 21:16:11 2010 TCPv4_CLIENT link local: [undef]
  4094. Mon Dec 20 21:16:11 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4095. Mon Dec 20 21:16:12 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=eba14d33 a1b06044
  4096. Mon Dec 20 21:16:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4097. Mon Dec 20 21:16:13 2010 VERIFY OK: nsCertType=SERVER
  4098. Mon Dec 20 21:16:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4099. Mon Dec 20 21:16:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4100. Mon Dec 20 21:16:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4101. Mon Dec 20 21:16:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4102. Mon Dec 20 21:16:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4103. Mon Dec 20 21:16:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4104. Mon Dec 20 21:16:15 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4105. Mon Dec 20 21:16:17 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4106. Mon Dec 20 21:16:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4107. Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4108. Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: --socket-flags option modified
  4109. Mon Dec 20 21:16:18 2010 Socket flags: TCP_NODELAY=1 succeeded
  4110. Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4111. Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: route options modified
  4112. Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: route-related options modified
  4113. Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4114. Mon Dec 20 21:16:18 2010 Preserving previous TUN/TAP instance: tun0
  4115. Mon Dec 20 21:16:18 2010 Initialization Sequence Completed
  4116. Mon Dec 20 21:16:36 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #670 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4117. Mon Dec 20 21:16:36 2010 Fatal decryption error (process_incoming_link), restarting
  4118. Mon Dec 20 21:16:36 2010 TCP/UDP: Closing socket
  4119. Mon Dec 20 21:16:36 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4120. Mon Dec 20 21:16:36 2010 Restart pause, 5 second(s)
  4121. Mon Dec 20 21:16:41 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4122. Mon Dec 20 21:16:41 2010 Re-using SSL/TLS context
  4123. Mon Dec 20 21:16:41 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4124. Mon Dec 20 21:16:41 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4125. Mon Dec 20 21:16:41 2010 Local Options hash (VER=V4): 'bf6006bf'
  4126. Mon Dec 20 21:16:41 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4127. Mon Dec 20 21:16:41 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4128. Mon Dec 20 21:16:42 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4129. Mon Dec 20 21:16:42 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4130. Mon Dec 20 21:16:42 2010 Socket flags: TCP_NODELAY=1 succeeded
  4131. Mon Dec 20 21:16:42 2010 TCPv4_CLIENT link local: [undef]
  4132. Mon Dec 20 21:16:42 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4133. Mon Dec 20 21:16:42 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=24f14207 215de578
  4134. Mon Dec 20 21:16:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4135. Mon Dec 20 21:16:43 2010 VERIFY OK: nsCertType=SERVER
  4136. Mon Dec 20 21:16:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4137. Mon Dec 20 21:16:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4138. Mon Dec 20 21:16:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4139. Mon Dec 20 21:16:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4140. Mon Dec 20 21:16:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4141. Mon Dec 20 21:16:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4142. Mon Dec 20 21:16:45 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4143. Mon Dec 20 21:16:47 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4144. Mon Dec 20 21:16:47 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4145. Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4146. Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: --socket-flags option modified
  4147. Mon Dec 20 21:16:47 2010 Socket flags: TCP_NODELAY=1 succeeded
  4148. Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4149. Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: route options modified
  4150. Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: route-related options modified
  4151. Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4152. Mon Dec 20 21:16:47 2010 Preserving previous TUN/TAP instance: tun0
  4153. Mon Dec 20 21:16:47 2010 Initialization Sequence Completed
  4154. Mon Dec 20 21:17:23 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1788 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4155. Mon Dec 20 21:17:23 2010 Fatal decryption error (process_incoming_link), restarting
  4156. Mon Dec 20 21:17:23 2010 TCP/UDP: Closing socket
  4157. Mon Dec 20 21:17:23 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4158. Mon Dec 20 21:17:23 2010 Restart pause, 5 second(s)
  4159. Mon Dec 20 21:17:28 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4160. Mon Dec 20 21:17:28 2010 Re-using SSL/TLS context
  4161. Mon Dec 20 21:17:28 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4162. Mon Dec 20 21:17:28 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4163. Mon Dec 20 21:17:28 2010 Local Options hash (VER=V4): 'bf6006bf'
  4164. Mon Dec 20 21:17:28 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4165. Mon Dec 20 21:17:28 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4166. Mon Dec 20 21:17:29 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4167. Mon Dec 20 21:17:29 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4168. Mon Dec 20 21:17:29 2010 Socket flags: TCP_NODELAY=1 succeeded
  4169. Mon Dec 20 21:17:29 2010 TCPv4_CLIENT link local: [undef]
  4170. Mon Dec 20 21:17:29 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4171. Mon Dec 20 21:17:29 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=1027edfd 4aa61cf8
  4172. Mon Dec 20 21:17:30 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4173. Mon Dec 20 21:17:30 2010 VERIFY OK: nsCertType=SERVER
  4174. Mon Dec 20 21:17:30 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4175. Mon Dec 20 21:17:32 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4176. Mon Dec 20 21:17:32 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4177. Mon Dec 20 21:17:32 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4178. Mon Dec 20 21:17:32 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4179. Mon Dec 20 21:17:32 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4180. Mon Dec 20 21:17:32 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4181. Mon Dec 20 21:17:34 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4182. Mon Dec 20 21:17:34 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4183. Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4184. Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: --socket-flags option modified
  4185. Mon Dec 20 21:17:34 2010 Socket flags: TCP_NODELAY=1 succeeded
  4186. Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4187. Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: route options modified
  4188. Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: route-related options modified
  4189. Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4190. Mon Dec 20 21:17:34 2010 Preserving previous TUN/TAP instance: tun0
  4191. Mon Dec 20 21:17:34 2010 Initialization Sequence Completed
  4192. Mon Dec 20 21:17:43 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1529 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4193. Mon Dec 20 21:17:43 2010 Fatal decryption error (process_incoming_link), restarting
  4194. Mon Dec 20 21:17:43 2010 TCP/UDP: Closing socket
  4195. Mon Dec 20 21:17:43 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4196. Mon Dec 20 21:17:43 2010 Restart pause, 5 second(s)
  4197. Mon Dec 20 21:17:48 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4198. Mon Dec 20 21:17:48 2010 Re-using SSL/TLS context
  4199. Mon Dec 20 21:17:48 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4200. Mon Dec 20 21:17:48 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4201. Mon Dec 20 21:17:48 2010 Local Options hash (VER=V4): 'bf6006bf'
  4202. Mon Dec 20 21:17:48 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4203. Mon Dec 20 21:17:48 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4204. Mon Dec 20 21:17:49 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4205. Mon Dec 20 21:17:49 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4206. Mon Dec 20 21:17:49 2010 Socket flags: TCP_NODELAY=1 succeeded
  4207. Mon Dec 20 21:17:49 2010 TCPv4_CLIENT link local: [undef]
  4208. Mon Dec 20 21:17:49 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4209. Mon Dec 20 21:17:49 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c878a7a4 7310ec97
  4210. Mon Dec 20 21:17:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4211. Mon Dec 20 21:17:50 2010 VERIFY OK: nsCertType=SERVER
  4212. Mon Dec 20 21:17:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4213. Mon Dec 20 21:17:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4214. Mon Dec 20 21:17:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4215. Mon Dec 20 21:17:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4216. Mon Dec 20 21:17:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4217. Mon Dec 20 21:17:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4218. Mon Dec 20 21:17:53 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4219. Mon Dec 20 21:17:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4220. Mon Dec 20 21:17:55 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4221. Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4222. Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: --socket-flags option modified
  4223. Mon Dec 20 21:17:55 2010 Socket flags: TCP_NODELAY=1 succeeded
  4224. Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4225. Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: route options modified
  4226. Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: route-related options modified
  4227. Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4228. Mon Dec 20 21:17:55 2010 Preserving previous TUN/TAP instance: tun0
  4229. Mon Dec 20 21:17:55 2010 Initialization Sequence Completed
  4230. Mon Dec 20 21:18:32 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1246 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4231. Mon Dec 20 21:18:32 2010 Fatal decryption error (process_incoming_link), restarting
  4232. Mon Dec 20 21:18:32 2010 TCP/UDP: Closing socket
  4233. Mon Dec 20 21:18:32 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4234. Mon Dec 20 21:18:32 2010 Restart pause, 5 second(s)
  4235. Mon Dec 20 21:18:37 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4236. Mon Dec 20 21:18:37 2010 Re-using SSL/TLS context
  4237. Mon Dec 20 21:18:37 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4238. Mon Dec 20 21:18:37 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4239. Mon Dec 20 21:18:37 2010 Local Options hash (VER=V4): 'bf6006bf'
  4240. Mon Dec 20 21:18:37 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4241. Mon Dec 20 21:18:37 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4242. Mon Dec 20 21:18:38 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4243. Mon Dec 20 21:18:38 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4244. Mon Dec 20 21:18:38 2010 Socket flags: TCP_NODELAY=1 succeeded
  4245. Mon Dec 20 21:18:38 2010 TCPv4_CLIENT link local: [undef]
  4246. Mon Dec 20 21:18:38 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4247. Mon Dec 20 21:18:38 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=b5f7073e 91a66487
  4248. Mon Dec 20 21:18:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4249. Mon Dec 20 21:18:39 2010 VERIFY OK: nsCertType=SERVER
  4250. Mon Dec 20 21:18:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4251. Mon Dec 20 21:18:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4252. Mon Dec 20 21:18:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4253. Mon Dec 20 21:18:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4254. Mon Dec 20 21:18:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4255. Mon Dec 20 21:18:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4256. Mon Dec 20 21:18:41 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4257. Mon Dec 20 21:18:43 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4258. Mon Dec 20 21:18:44 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4259. Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4260. Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: --socket-flags option modified
  4261. Mon Dec 20 21:18:44 2010 Socket flags: TCP_NODELAY=1 succeeded
  4262. Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4263. Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: route options modified
  4264. Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: route-related options modified
  4265. Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4266. Mon Dec 20 21:18:44 2010 Preserving previous TUN/TAP instance: tun0
  4267. Mon Dec 20 21:18:44 2010 Initialization Sequence Completed
  4268. Mon Dec 20 21:20:06 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1837 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4269. Mon Dec 20 21:20:06 2010 Fatal decryption error (process_incoming_link), restarting
  4270. Mon Dec 20 21:20:06 2010 TCP/UDP: Closing socket
  4271. Mon Dec 20 21:20:06 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4272. Mon Dec 20 21:20:06 2010 Restart pause, 5 second(s)
  4273. Mon Dec 20 21:20:11 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4274. Mon Dec 20 21:20:11 2010 Re-using SSL/TLS context
  4275. Mon Dec 20 21:20:11 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4276. Mon Dec 20 21:20:11 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4277. Mon Dec 20 21:20:11 2010 Local Options hash (VER=V4): 'bf6006bf'
  4278. Mon Dec 20 21:20:11 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4279. Mon Dec 20 21:20:11 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4280. Mon Dec 20 21:20:12 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4281. Mon Dec 20 21:20:12 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4282. Mon Dec 20 21:20:12 2010 Socket flags: TCP_NODELAY=1 succeeded
  4283. Mon Dec 20 21:20:12 2010 TCPv4_CLIENT link local: [undef]
  4284. Mon Dec 20 21:20:12 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4285. Mon Dec 20 21:20:12 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=743cc414 650b4189
  4286. Mon Dec 20 21:20:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4287. Mon Dec 20 21:20:13 2010 VERIFY OK: nsCertType=SERVER
  4288. Mon Dec 20 21:20:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4289. Mon Dec 20 21:20:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4290. Mon Dec 20 21:20:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4291. Mon Dec 20 21:20:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4292. Mon Dec 20 21:20:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4293. Mon Dec 20 21:20:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4294. Mon Dec 20 21:20:15 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4295. Mon Dec 20 21:20:17 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4296. Mon Dec 20 21:20:17 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4297. Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4298. Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: --socket-flags option modified
  4299. Mon Dec 20 21:20:17 2010 Socket flags: TCP_NODELAY=1 succeeded
  4300. Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4301. Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: route options modified
  4302. Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: route-related options modified
  4303. Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4304. Mon Dec 20 21:20:17 2010 Preserving previous TUN/TAP instance: tun0
  4305. Mon Dec 20 21:20:17 2010 Initialization Sequence Completed
  4306. Mon Dec 20 21:21:41 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1564 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4307. Mon Dec 20 21:21:41 2010 Fatal decryption error (process_incoming_link), restarting
  4308. Mon Dec 20 21:21:41 2010 TCP/UDP: Closing socket
  4309. Mon Dec 20 21:21:41 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4310. Mon Dec 20 21:21:41 2010 Restart pause, 5 second(s)
  4311. Mon Dec 20 21:21:46 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4312. Mon Dec 20 21:21:46 2010 Re-using SSL/TLS context
  4313. Mon Dec 20 21:21:46 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4314. Mon Dec 20 21:21:46 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4315. Mon Dec 20 21:21:46 2010 Local Options hash (VER=V4): 'bf6006bf'
  4316. Mon Dec 20 21:21:46 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4317. Mon Dec 20 21:21:46 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4318. Mon Dec 20 21:21:47 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4319. Mon Dec 20 21:21:47 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4320. Mon Dec 20 21:21:47 2010 Socket flags: TCP_NODELAY=1 succeeded
  4321. Mon Dec 20 21:21:47 2010 TCPv4_CLIENT link local: [undef]
  4322. Mon Dec 20 21:21:47 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4323. Mon Dec 20 21:21:47 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=6b5b836d 0f2934bc
  4324. Mon Dec 20 21:21:48 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4325. Mon Dec 20 21:21:48 2010 VERIFY OK: nsCertType=SERVER
  4326. Mon Dec 20 21:21:48 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4327. Mon Dec 20 21:21:50 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4328. Mon Dec 20 21:21:50 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4329. Mon Dec 20 21:21:50 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4330. Mon Dec 20 21:21:50 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4331. Mon Dec 20 21:21:50 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4332. Mon Dec 20 21:21:50 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4333. Mon Dec 20 21:21:52 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4334. Mon Dec 20 21:21:52 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4335. Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4336. Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: --socket-flags option modified
  4337. Mon Dec 20 21:21:52 2010 Socket flags: TCP_NODELAY=1 succeeded
  4338. Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4339. Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: route options modified
  4340. Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: route-related options modified
  4341. Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4342. Mon Dec 20 21:21:52 2010 Preserving previous TUN/TAP instance: tun0
  4343. Mon Dec 20 21:21:52 2010 Initialization Sequence Completed
  4344. Mon Dec 20 21:22:26 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #997 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4345. Mon Dec 20 21:22:26 2010 Fatal decryption error (process_incoming_link), restarting
  4346. Mon Dec 20 21:22:26 2010 TCP/UDP: Closing socket
  4347. Mon Dec 20 21:22:26 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4348. Mon Dec 20 21:22:26 2010 Restart pause, 5 second(s)
  4349. Mon Dec 20 21:22:31 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4350. Mon Dec 20 21:22:31 2010 Re-using SSL/TLS context
  4351. Mon Dec 20 21:22:31 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4352. Mon Dec 20 21:22:31 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4353. Mon Dec 20 21:22:31 2010 Local Options hash (VER=V4): 'bf6006bf'
  4354. Mon Dec 20 21:22:31 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4355. Mon Dec 20 21:22:31 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4356. Mon Dec 20 21:22:32 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4357. Mon Dec 20 21:22:32 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4358. Mon Dec 20 21:22:32 2010 Socket flags: TCP_NODELAY=1 succeeded
  4359. Mon Dec 20 21:22:32 2010 TCPv4_CLIENT link local: [undef]
  4360. Mon Dec 20 21:22:32 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4361. Mon Dec 20 21:22:32 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=a79cd6d5 4acaf11d
  4362. Mon Dec 20 21:22:33 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4363. Mon Dec 20 21:22:33 2010 VERIFY OK: nsCertType=SERVER
  4364. Mon Dec 20 21:22:33 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4365. Mon Dec 20 21:22:35 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4366. Mon Dec 20 21:22:35 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4367. Mon Dec 20 21:22:35 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4368. Mon Dec 20 21:22:35 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4369. Mon Dec 20 21:22:35 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4370. Mon Dec 20 21:22:35 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4371. Mon Dec 20 21:22:38 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4372. Mon Dec 20 21:22:38 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4373. Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4374. Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: --socket-flags option modified
  4375. Mon Dec 20 21:22:38 2010 Socket flags: TCP_NODELAY=1 succeeded
  4376. Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4377. Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: route options modified
  4378. Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: route-related options modified
  4379. Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4380. Mon Dec 20 21:22:38 2010 Preserving previous TUN/TAP instance: tun0
  4381. Mon Dec 20 21:22:38 2010 Initialization Sequence Completed
  4382. Mon Dec 20 21:23:02 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #849 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4383. Mon Dec 20 21:23:02 2010 Fatal decryption error (process_incoming_link), restarting
  4384. Mon Dec 20 21:23:02 2010 TCP/UDP: Closing socket
  4385. Mon Dec 20 21:23:02 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4386. Mon Dec 20 21:23:02 2010 Restart pause, 5 second(s)
  4387. Mon Dec 20 21:23:07 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4388. Mon Dec 20 21:23:07 2010 Re-using SSL/TLS context
  4389. Mon Dec 20 21:23:07 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4390. Mon Dec 20 21:23:07 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4391. Mon Dec 20 21:23:07 2010 Local Options hash (VER=V4): 'bf6006bf'
  4392. Mon Dec 20 21:23:07 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4393. Mon Dec 20 21:23:07 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4394. Mon Dec 20 21:23:08 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4395. Mon Dec 20 21:23:08 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4396. Mon Dec 20 21:23:08 2010 Socket flags: TCP_NODELAY=1 succeeded
  4397. Mon Dec 20 21:23:08 2010 TCPv4_CLIENT link local: [undef]
  4398. Mon Dec 20 21:23:08 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4399. Mon Dec 20 21:23:08 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=68453f38 0a44fdab
  4400. Mon Dec 20 21:23:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4401. Mon Dec 20 21:23:09 2010 VERIFY OK: nsCertType=SERVER
  4402. Mon Dec 20 21:23:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4403. Mon Dec 20 21:23:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4404. Mon Dec 20 21:23:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4405. Mon Dec 20 21:23:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4406. Mon Dec 20 21:23:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4407. Mon Dec 20 21:23:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4408. Mon Dec 20 21:23:12 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4409. Mon Dec 20 21:23:14 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4410. Mon Dec 20 21:23:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4411. Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4412. Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: --socket-flags option modified
  4413. Mon Dec 20 21:23:14 2010 Socket flags: TCP_NODELAY=1 succeeded
  4414. Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4415. Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: route options modified
  4416. Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: route-related options modified
  4417. Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4418. Mon Dec 20 21:23:14 2010 Preserving previous TUN/TAP instance: tun0
  4419. Mon Dec 20 21:23:14 2010 Initialization Sequence Completed
  4420. Mon Dec 20 21:24:38 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3272 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  4421. Mon Dec 20 21:24:38 2010 Fatal decryption error (process_incoming_link), restarting
  4422. Mon Dec 20 21:24:38 2010 TCP/UDP: Closing socket
  4423. Mon Dec 20 21:24:38 2010 SIGUSR1[soft,decryption-error] received, process restarting
  4424. Mon Dec 20 21:24:38 2010 Restart pause, 5 second(s)
  4425. Mon Dec 20 21:24:43 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4426. Mon Dec 20 21:24:43 2010 Re-using SSL/TLS context
  4427. Mon Dec 20 21:24:43 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4428. Mon Dec 20 21:24:43 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  4429. Mon Dec 20 21:24:43 2010 Local Options hash (VER=V4): 'bf6006bf'
  4430. Mon Dec 20 21:24:43 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
  4431. Mon Dec 20 21:24:43 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
  4432. Mon Dec 20 21:24:44 2010 TCP connection established with [AF_INET]93.190.142.152:54111
  4433. Mon Dec 20 21:24:44 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
  4434. Mon Dec 20 21:24:44 2010 Socket flags: TCP_NODELAY=1 succeeded
  4435. Mon Dec 20 21:24:44 2010 TCPv4_CLIENT link local: [undef]
  4436. Mon Dec 20 21:24:44 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
  4437. Mon Dec 20 21:24:44 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=09b39027 a5ae3b78
  4438. Mon Dec 20 21:24:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
  4439. Mon Dec 20 21:24:45 2010 VERIFY OK: nsCertType=SERVER
  4440. Mon Dec 20 21:24:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
  4441. Mon Dec 20 21:24:47 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4442. Mon Dec 20 21:24:47 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4443. Mon Dec 20 21:24:47 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
  4444. Mon Dec 20 21:24:47 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  4445. Mon Dec 20 21:24:47 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  4446. Mon Dec 20 21:24:47 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
  4447. Mon Dec 20 21:24:49 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  4448. Mon Dec 20 21:24:49 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
  4449. Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: timers and/or timeouts modified
  4450. Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: --socket-flags option modified
  4451. Mon Dec 20 21:24:49 2010 Socket flags: TCP_NODELAY=1 succeeded
  4452. Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: --ifconfig/up options modified
  4453. Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: route options modified
  4454. Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: route-related options modified
  4455. Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  4456. Mon Dec 20 21:24:49 2010 Preserving previous TUN/TAP instance: tun0
  4457. Mon Dec 20 21:24:49 2010 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement