Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
- Sun Dec 19 02:07:51 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
- Sun Dec 19 02:07:51 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Sun Dec 19 02:07:51 2010 WARNING: file 'cert.dat' is group or others accessible
- Sun Dec 19 02:07:51 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
- Sun Dec 19 02:07:51 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Sun Dec 19 02:07:51 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Sun Dec 19 02:07:51 2010 Local Options hash (VER=V4): 'bf6006bf'
- Sun Dec 19 02:07:51 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Sun Dec 19 02:07:51 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
- Sun Dec 19 02:07:52 2010 TCP connection established with [AF_INET]188.65.74.98:54111
- Sun Dec 19 02:07:52 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Sun Dec 19 02:07:52 2010 TCPv4_CLIENT link local: [undef]
- Sun Dec 19 02:07:52 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
- Sun Dec 19 02:07:52 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=77172359 63eac6bc
- Sun Dec 19 02:07:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 02:07:54 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 02:07:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 02:07:59 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:07:59 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:07:59 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:07:59 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:07:59 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 02:07:59 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
- Sun Dec 19 02:08:01 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Dec 19 02:08:01 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: --socket-flags option modified
- Sun Dec 19 02:08:01 2010 Socket flags: TCP_NODELAY=1 succeeded
- Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: route options modified
- Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: route-related options modified
- Sun Dec 19 02:08:01 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 19 02:08:01 2010 ROUTE default_gateway=192.168.2.1
- Sun Dec 19 02:08:01 2010 TUN/TAP device tun0 opened
- Sun Dec 19 02:08:01 2010 TUN/TAP TX queue length set to 100
- Sun Dec 19 02:08:01 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
- Sun Dec 19 02:08:03 2010 /sbin/route add -net 188.65.74.98 netmask 255.255.255.255 gw 192.168.2.1
- Sun Dec 19 02:08:03 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Sun Dec 19 02:08:03 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Sun Dec 19 02:08:03 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
- Sun Dec 19 02:08:03 2010 Initialization Sequence Completed
- Sun Dec 19 02:23:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 02:23:00 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 02:23:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 02:23:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:23:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:23:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:23:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:23:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 02:38:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 02:38:04 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 02:38:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 02:38:07 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:38:07 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:38:07 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:38:07 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:38:07 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 02:53:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 02:53:09 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 02:53:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 02:53:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:53:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:53:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 02:53:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 02:53:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 03:08:12 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 03:08:12 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 03:08:12 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 03:08:14 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 03:08:14 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 03:08:14 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 03:08:14 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 03:08:14 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- ^CSun Dec 19 03:18:23 2010 event_wait : Interrupted system call (code=4)
- Sun Dec 19 03:18:23 2010 TCP/UDP: Closing socket
- Sun Dec 19 03:18:23 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
- Sun Dec 19 03:18:23 2010 /sbin/route del -net 188.65.74.98 netmask 255.255.255.255
- Sun Dec 19 03:18:23 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Sun Dec 19 03:18:23 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Sun Dec 19 03:18:23 2010 Closing TUN/TAP interface
- Sun Dec 19 03:18:23 2010 /sbin/ifconfig tun0 0.0.0.0
- Sun Dec 19 03:18:23 2010 SIGINT[hard,] received, process exiting
- root@mybox:/etc/openvpn# nano /etc/resolv.conf
- root@mybox:/etc/openvpn# nano /etc/resolv.conf
- root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
- Sun Dec 19 16:47:13 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
- Sun Dec 19 16:47:13 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Sun Dec 19 16:47:13 2010 WARNING: file 'cert.dat' is group or others accessible
- Sun Dec 19 16:47:13 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
- Sun Dec 19 16:47:14 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Sun Dec 19 16:47:14 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Sun Dec 19 16:47:14 2010 Local Options hash (VER=V4): 'bf6006bf'
- Sun Dec 19 16:47:14 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Sun Dec 19 16:47:14 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
- Sun Dec 19 16:47:15 2010 TCP connection established with [AF_INET]188.65.74.98:54111
- Sun Dec 19 16:47:15 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Sun Dec 19 16:47:15 2010 TCPv4_CLIENT link local: [undef]
- Sun Dec 19 16:47:15 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
- Sun Dec 19 16:47:15 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=47e1ff25 d3046d0a
- Sun Dec 19 16:47:17 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 16:47:17 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 16:47:17 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 16:47:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 16:47:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 16:47:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 16:47:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 16:47:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 16:47:22 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
- Sun Dec 19 16:47:24 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Dec 19 16:47:24 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: --socket-flags option modified
- Sun Dec 19 16:47:24 2010 Socket flags: TCP_NODELAY=1 succeeded
- Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: route options modified
- Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: route-related options modified
- Sun Dec 19 16:47:24 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 19 16:47:24 2010 ROUTE default_gateway=192.168.2.1
- Sun Dec 19 16:47:24 2010 TUN/TAP device tun0 opened
- Sun Dec 19 16:47:24 2010 TUN/TAP TX queue length set to 100
- Sun Dec 19 16:47:24 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
- Sun Dec 19 16:47:26 2010 /sbin/route add -net 188.65.74.98 netmask 255.255.255.255 gw 192.168.2.1
- Sun Dec 19 16:47:26 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Sun Dec 19 16:47:26 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Sun Dec 19 16:47:26 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
- Sun Dec 19 16:47:26 2010 Initialization Sequence Completed
- Sun Dec 19 17:02:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 17:02:23 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 17:02:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 17:02:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:02:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:02:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:02:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:02:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 17:17:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 17:17:28 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 17:17:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 17:17:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:17:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:17:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:17:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:17:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 17:32:32 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 17:32:32 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 17:32:32 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 17:32:35 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:32:35 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:32:35 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:32:35 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:32:35 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 17:47:36 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 17:47:36 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 17:47:36 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 17:47:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:47:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:47:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 17:47:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 17:47:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 18:02:40 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 18:02:40 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 18:02:40 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 18:02:44 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:02:44 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:02:44 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:02:44 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:02:44 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 18:17:50 2010 [server] Inactivity timeout (--ping-restart), restarting
- Sun Dec 19 18:17:50 2010 TCP/UDP: Closing socket
- Sun Dec 19 18:17:50 2010 SIGUSR1[soft,ping-restart] received, process restarting
- Sun Dec 19 18:17:50 2010 Restart pause, 5 second(s)
- Sun Dec 19 18:17:55 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Sun Dec 19 18:17:55 2010 Re-using SSL/TLS context
- Sun Dec 19 18:17:55 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Sun Dec 19 18:17:55 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Sun Dec 19 18:17:55 2010 Local Options hash (VER=V4): 'bf6006bf'
- Sun Dec 19 18:17:55 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Sun Dec 19 18:17:55 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
- Sun Dec 19 18:17:56 2010 TCP connection established with [AF_INET]188.65.74.98:54111
- Sun Dec 19 18:17:56 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Sun Dec 19 18:17:56 2010 Socket flags: TCP_NODELAY=1 succeeded
- Sun Dec 19 18:17:56 2010 TCPv4_CLIENT link local: [undef]
- Sun Dec 19 18:17:56 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
- Sun Dec 19 18:17:56 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=d720ad12 e0daf36e
- Sun Dec 19 18:17:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 18:17:57 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 18:17:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 18:18:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:18:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:18:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:18:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:18:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 18:18:02 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
- Sun Dec 19 18:18:04 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Dec 19 18:18:04 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: --socket-flags option modified
- Sun Dec 19 18:18:04 2010 Socket flags: TCP_NODELAY=1 succeeded
- Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: route options modified
- Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: route-related options modified
- Sun Dec 19 18:18:04 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 19 18:18:04 2010 Preserving previous TUN/TAP instance: tun0
- Sun Dec 19 18:18:04 2010 Initialization Sequence Completed
- Sun Dec 19 18:33:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 18:33:03 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 18:33:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 18:33:06 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:33:06 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:33:06 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:33:06 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:33:06 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 18:48:08 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 18:48:08 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 18:48:08 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 18:48:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:48:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:48:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 18:48:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 18:48:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 19:03:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 19:03:14 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 19:03:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 19:03:17 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:03:17 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:03:17 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:03:17 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:03:17 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 19:18:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 19:18:19 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 19:18:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 19:18:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:18:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:18:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:18:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:18:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 19:33:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 19:33:25 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 19:33:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 19:33:28 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:33:28 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:33:28 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:33:28 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:33:28 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 19:48:29 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 19:48:29 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 19:48:29 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 19:48:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:48:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:48:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 19:48:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 19:48:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 20:03:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 20:03:35 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 20:03:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 20:03:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:03:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:03:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:03:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:03:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 20:18:41 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 20:18:41 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 20:18:41 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 20:18:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:18:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:18:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:18:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:18:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 20:33:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 20:33:45 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 20:33:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 20:33:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:33:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:33:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:33:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:33:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 20:48:51 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 20:48:51 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 20:48:51 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 20:48:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:48:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:48:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 20:48:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 20:48:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 21:03:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 21:03:57 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 21:03:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 21:04:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:04:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:04:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:04:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:04:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 21:19:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 21:19:04 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 21:19:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 21:19:07 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:19:07 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:19:07 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:19:07 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:19:07 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 21:34:08 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 21:34:08 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 21:34:08 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 21:34:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:34:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:34:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:34:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:34:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 21:49:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 21:49:13 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 21:49:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 21:49:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:49:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:49:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 21:49:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 21:49:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 22:04:18 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 22:04:18 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 22:04:18 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 22:04:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:04:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:04:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:04:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:04:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 22:19:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 22:19:21 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 22:19:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 22:19:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:19:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:19:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:19:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:19:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 22:34:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 22:34:25 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 22:34:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 22:34:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:34:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:34:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:34:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:34:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 22:49:29 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 22:49:29 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 22:49:29 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 22:49:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:49:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:49:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 22:49:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 22:49:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 23:04:33 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 23:04:33 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 23:04:33 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 23:04:35 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:04:35 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:04:35 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:04:35 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:04:35 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 23:19:37 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 23:19:37 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 23:19:37 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 23:19:40 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:19:40 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:19:40 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:19:40 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:19:40 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 23:34:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 23:34:43 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 23:34:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 23:34:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:34:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:34:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:34:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:34:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Dec 19 23:49:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Sun Dec 19 23:49:47 2010 VERIFY OK: nsCertType=SERVER
- Sun Dec 19 23:49:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Sun Dec 19 23:49:50 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:49:50 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:49:50 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Sun Dec 19 23:49:50 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 19 23:49:50 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 00:04:51 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 00:04:51 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 00:04:51 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 00:04:54 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:04:54 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:04:54 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:04:54 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:04:54 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 00:19:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 00:19:54 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 00:19:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 00:19:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:19:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:19:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:19:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:19:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 00:34:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 00:34:57 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 00:34:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 00:35:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:35:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:35:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:35:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:35:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 00:50:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 00:50:00 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 00:50:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 00:50:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:50:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:50:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 00:50:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 00:50:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 01:05:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 01:05:03 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 01:05:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 01:05:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:05:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:05:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:05:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:05:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 01:20:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 01:20:07 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 01:20:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 01:20:10 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:20:10 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:20:10 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:20:10 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:20:10 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 01:35:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 01:35:10 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 01:35:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 01:35:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:35:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:35:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:35:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:35:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 01:50:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 01:50:14 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 01:50:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 01:50:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:50:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:50:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 01:50:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 01:50:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 02:05:17 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 02:05:17 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 02:05:17 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 02:05:19 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:05:19 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:05:19 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:05:19 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:05:19 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 02:20:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 02:20:21 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 02:20:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 02:20:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:20:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:20:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:20:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:20:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 02:35:24 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 02:35:24 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 02:35:24 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 02:35:26 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:35:26 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:35:26 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:35:26 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:35:26 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 02:50:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 02:50:28 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 02:50:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 02:50:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:50:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:50:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 02:50:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 02:50:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 03:05:32 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 03:05:32 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 03:05:32 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 03:05:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:05:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:05:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:05:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:05:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 03:20:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 03:20:35 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 03:20:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 03:20:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:20:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:20:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:20:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:20:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 03:35:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 03:35:39 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 03:35:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 03:35:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:35:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:35:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:35:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:35:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 03:50:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 03:50:42 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 03:50:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 03:50:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:50:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:50:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 03:50:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 03:50:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 04:05:46 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 04:05:46 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 04:05:46 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 04:05:48 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:05:48 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:05:48 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:05:48 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:05:48 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 04:20:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 04:20:49 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 04:20:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 04:20:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:20:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:20:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:20:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:20:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 04:35:52 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 04:35:52 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 04:35:52 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 04:35:54 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:35:54 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:35:54 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:35:54 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:35:54 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 04:50:55 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 04:50:55 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 04:50:55 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 04:50:58 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:50:58 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:50:58 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 04:50:58 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 04:50:58 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 05:05:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 05:05:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 05:05:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 05:06:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:06:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:06:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:06:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:06:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 05:21:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 05:21:02 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 05:21:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 05:21:04 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:21:04 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:21:04 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:21:04 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:21:04 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 05:36:05 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 05:36:05 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 05:36:05 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 05:36:08 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:36:08 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:36:08 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:36:08 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:36:08 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 05:51:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 05:51:09 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 05:51:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 05:51:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:51:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:51:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 05:51:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 05:51:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 06:06:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 06:06:13 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 06:06:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 06:06:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:06:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:06:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:06:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:06:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 06:21:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 06:21:16 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 06:21:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 06:21:19 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:21:19 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:21:19 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:21:19 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:21:19 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 06:36:20 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 06:36:20 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 06:36:20 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 06:36:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:36:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:36:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:36:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:36:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 06:51:24 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 06:51:24 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 06:51:24 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 06:51:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:51:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:51:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 06:51:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 06:51:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 07:06:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 07:06:28 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 07:06:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 07:06:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:06:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:06:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:06:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:06:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 07:21:31 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 07:21:31 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 07:21:31 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 07:21:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:21:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:21:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:21:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:21:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 07:36:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 07:36:35 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 07:36:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 07:36:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:36:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:36:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:36:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:36:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 07:51:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 07:51:39 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 07:51:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 07:51:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:51:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:51:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 07:51:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 07:51:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 08:06:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 08:06:43 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 08:06:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 08:06:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:06:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:06:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:06:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:06:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 08:21:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 08:21:47 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 08:21:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 08:21:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:21:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:21:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:21:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:21:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 08:36:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 08:36:50 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 08:36:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 08:36:52 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:36:52 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:36:52 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:36:52 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:36:52 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 08:51:53 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 08:51:53 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 08:51:53 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 08:51:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:51:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:51:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 08:51:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 08:51:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 09:06:56 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 09:06:56 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 09:06:56 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 09:06:58 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:06:58 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:06:58 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:06:58 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:06:58 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 09:22:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 09:22:00 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 09:22:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 09:22:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:22:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:22:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:22:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:22:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 09:37:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 09:37:03 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 09:37:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 09:37:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:37:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:37:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:37:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:37:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 09:52:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 09:52:06 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 09:52:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 09:52:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:52:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:52:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 09:52:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 09:52:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 10:07:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 10:07:10 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 10:07:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 10:07:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:07:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:07:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:07:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:07:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 10:22:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 10:22:13 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 10:22:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 10:22:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:22:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:22:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:22:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:22:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 10:37:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 10:37:16 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 10:37:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 10:37:19 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:37:19 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:37:19 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:37:19 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:37:19 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 10:52:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 10:52:19 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 10:52:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 10:52:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:52:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:52:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 10:52:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 10:52:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 11:07:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 11:07:23 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 11:07:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 11:07:25 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:07:25 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:07:25 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:07:25 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:07:25 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 11:22:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 11:22:21 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 11:22:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 11:22:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:22:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:22:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:22:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:22:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 11:37:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 11:37:25 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 11:37:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 11:37:28 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:37:28 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:37:28 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:37:28 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:37:28 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 11:52:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 11:52:28 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 11:52:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 11:52:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:52:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:52:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 11:52:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 11:52:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 12:07:31 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 12:07:31 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 12:07:31 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 12:07:34 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:07:34 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:07:34 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:07:34 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:07:34 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 12:22:34 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 12:22:34 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 12:22:34 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 12:22:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:22:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:22:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:22:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:22:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 12:37:38 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 12:37:38 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 12:37:38 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 12:37:40 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:37:40 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:37:40 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:37:40 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:37:40 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 12:52:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 12:52:42 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 12:52:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 12:52:44 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:52:44 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:52:44 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 12:52:44 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 12:52:44 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 13:07:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 13:07:45 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 13:07:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 13:07:48 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:07:48 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:07:48 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:07:48 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:07:48 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 13:22:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 13:22:49 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 13:22:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 13:22:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:22:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:22:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:22:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:22:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 13:37:53 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 13:37:53 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 13:37:53 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 13:37:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:37:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:37:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:37:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:37:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 13:53:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 13:53:00 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 13:53:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 13:53:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:53:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:53:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 13:53:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 13:53:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 14:08:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 14:08:06 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 14:08:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 14:08:08 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:08:08 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:08:08 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:08:08 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:08:08 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 14:23:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 14:23:09 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 14:23:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 14:23:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:23:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:23:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:23:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:23:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 14:38:12 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 14:38:12 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 14:38:12 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 14:38:14 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:38:14 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:38:14 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:38:14 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:38:14 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 14:53:15 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 14:53:15 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 14:53:15 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 14:53:17 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:53:17 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:53:17 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 14:53:17 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 14:53:17 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 15:08:18 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 15:08:18 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 15:08:18 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 15:08:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:08:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:08:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:08:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:08:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- ^CMon Dec 20 15:14:00 2010 event_wait : Interrupted system call (code=4)
- Mon Dec 20 15:14:00 2010 TCP/UDP: Closing socket
- Mon Dec 20 15:14:00 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
- Mon Dec 20 15:14:00 2010 /sbin/route del -net 188.65.74.98 netmask 255.255.255.255
- Mon Dec 20 15:14:00 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Mon Dec 20 15:14:00 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Mon Dec 20 15:14:00 2010 Closing TUN/TAP interface
- Mon Dec 20 15:14:00 2010 /sbin/ifconfig tun0 0.0.0.0
- Mon Dec 20 15:14:00 2010 SIGINT[hard,] received, process exiting
- root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
- Mon Dec 20 15:14:02 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
- Mon Dec 20 15:14:02 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 15:14:02 2010 WARNING: file 'cert.dat' is group or others accessible
- Mon Dec 20 15:14:02 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
- Mon Dec 20 15:14:02 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 15:14:02 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 15:14:02 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 15:14:02 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 15:14:02 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 15:14:03 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 15:14:03 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 15:14:03 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 15:14:03 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 15:14:03 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=84378c0c f34aa8b1
- Mon Dec 20 15:14:05 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 15:14:05 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 15:14:05 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 15:14:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:14:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:14:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:14:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:14:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 15:14:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 15:14:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 15:14:11 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 15:14:11 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 15:14:11 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 15:14:11 2010 ROUTE default_gateway=192.168.2.1
- Mon Dec 20 15:14:11 2010 TUN/TAP device tun0 opened
- Mon Dec 20 15:14:11 2010 TUN/TAP TX queue length set to 100
- Mon Dec 20 15:14:11 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
- Mon Dec 20 15:14:13 2010 /sbin/route add -net 93.190.142.152 netmask 255.255.255.255 gw 192.168.2.1
- Mon Dec 20 15:14:13 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 15:14:13 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 15:14:13 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
- Mon Dec 20 15:14:13 2010 Initialization Sequence Completed
- Mon Dec 20 15:29:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 15:29:10 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 15:29:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 15:29:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:29:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:29:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:29:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:29:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 15:44:12 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 15:44:12 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 15:44:12 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 15:44:14 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:44:14 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:44:14 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:44:14 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:44:14 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 15:59:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 15:59:16 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 15:59:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 15:59:18 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:59:18 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:59:18 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 15:59:18 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 15:59:18 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 16:14:18 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 16:14:18 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 16:14:18 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 16:14:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:14:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:14:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:14:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:14:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 16:29:22 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 16:29:22 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 16:29:22 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 16:29:24 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:29:24 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:29:24 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:29:24 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:29:24 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 16:44:25 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 16:44:25 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 16:44:25 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 16:44:27 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:44:27 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:44:27 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:44:27 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:44:27 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 16:59:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 16:59:28 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 16:59:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 16:59:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:59:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:59:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 16:59:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 16:59:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 17:14:31 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 17:14:31 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 17:14:31 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 17:14:33 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:14:33 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:14:33 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:14:33 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:14:33 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 17:29:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 17:29:35 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 17:29:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 17:29:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:29:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:29:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:29:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:29:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 17:44:37 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 17:44:37 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 17:44:37 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 17:44:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:44:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:44:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:44:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:44:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 17:59:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 17:59:39 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 17:59:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 17:59:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:59:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:59:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 17:59:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 17:59:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- ^CMon Dec 20 18:10:38 2010 event_wait : Interrupted system call (code=4)
- Mon Dec 20 18:10:38 2010 TCP/UDP: Closing socket
- Mon Dec 20 18:10:38 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
- Mon Dec 20 18:10:38 2010 /sbin/route del -net 93.190.142.152 netmask 255.255.255.255
- Mon Dec 20 18:10:38 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Mon Dec 20 18:10:38 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Mon Dec 20 18:10:38 2010 Closing TUN/TAP interface
- Mon Dec 20 18:10:38 2010 /sbin/ifconfig tun0 0.0.0.0
- Mon Dec 20 18:10:39 2010 SIGINT[hard,] received, process exiting
- root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
- Mon Dec 20 18:10:39 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
- Mon Dec 20 18:10:39 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 18:10:39 2010 WARNING: file 'cert.dat' is group or others accessible
- Mon Dec 20 18:10:39 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
- Mon Dec 20 18:10:39 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 18:10:39 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 18:10:39 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 18:10:39 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 18:10:39 2010 Attempting to establish TCP connection with [AF_INET]95.143.192.190:54111 [nonblock]
- Mon Dec 20 18:10:49 2010 TCP: connect to [AF_INET]95.143.192.190:54111 failed, will try again in 5 seconds: Connection timed out
- Mon Dec 20 18:10:49 2010 SIGUSR1[soft,init_instance] received, process restarting
- Mon Dec 20 18:10:49 2010 Restart pause, 5 second(s)
- Mon Dec 20 18:10:54 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 18:10:54 2010 Re-using SSL/TLS context
- Mon Dec 20 18:10:54 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 18:10:54 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 18:10:54 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 18:10:54 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 18:10:54 2010 Attempting to establish TCP connection with [AF_INET]188.65.74.98:54111 [nonblock]
- Mon Dec 20 18:10:55 2010 TCP connection established with [AF_INET]188.65.74.98:54111
- Mon Dec 20 18:10:55 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 18:10:55 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 18:10:55 2010 TCPv4_CLIENT link remote: [AF_INET]188.65.74.98:54111
- Mon Dec 20 18:10:55 2010 TLS: Initial packet from [AF_INET]188.65.74.98:54111, sid=ce82a98f fba1c929
- Mon Dec 20 18:10:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 18:10:57 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 18:10:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 18:11:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:11:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:11:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:11:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:11:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 18:11:02 2010 [server] Peer Connection Initiated with [AF_INET]188.65.74.98:54111
- Mon Dec 20 18:11:04 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 18:11:04 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 18:11:04 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 18:11:04 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 18:11:04 2010 ROUTE default_gateway=192.168.2.1
- Mon Dec 20 18:11:04 2010 TUN/TAP device tun0 opened
- Mon Dec 20 18:11:04 2010 TUN/TAP TX queue length set to 100
- Mon Dec 20 18:11:04 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
- Mon Dec 20 18:11:07 2010 /sbin/route add -net 188.65.74.98 netmask 255.255.255.255 gw 192.168.2.1
- Mon Dec 20 18:11:07 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 18:11:07 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 18:11:07 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
- Mon Dec 20 18:11:07 2010 Initialization Sequence Completed
- ^CMon Dec 20 18:12:44 2010 event_wait : Interrupted system call (code=4)
- Mon Dec 20 18:12:44 2010 TCP/UDP: Closing socket
- Mon Dec 20 18:12:44 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
- Mon Dec 20 18:12:44 2010 /sbin/route del -net 188.65.74.98 netmask 255.255.255.255
- Mon Dec 20 18:12:44 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Mon Dec 20 18:12:44 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Mon Dec 20 18:12:44 2010 Closing TUN/TAP interface
- Mon Dec 20 18:12:44 2010 /sbin/ifconfig tun0 0.0.0.0
- Mon Dec 20 18:12:44 2010 SIGINT[hard,] received, process exiting
- root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
- Mon Dec 20 18:12:46 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
- Mon Dec 20 18:12:46 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 18:12:46 2010 WARNING: file 'cert.dat' is group or others accessible
- Mon Dec 20 18:12:46 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
- Mon Dec 20 18:12:47 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 18:12:47 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 18:12:47 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 18:12:47 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 18:12:47 2010 Attempting to establish TCP connection with [AF_INET]95.143.192.190:54111 [nonblock]
- Mon Dec 20 18:12:48 2010 TCP connection established with [AF_INET]95.143.192.190:54111
- Mon Dec 20 18:12:48 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 18:12:48 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 18:12:48 2010 TCPv4_CLIENT link remote: [AF_INET]95.143.192.190:54111
- Mon Dec 20 18:12:48 2010 TLS: Initial packet from [AF_INET]95.143.192.190:54111, sid=0e0cbb11 8ef59c80
- Mon Dec 20 18:12:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 18:12:49 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 18:12:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 18:12:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:12:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:12:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:12:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:12:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 18:12:53 2010 [server] Peer Connection Initiated with [AF_INET]95.143.192.190:54111
- Mon Dec 20 18:12:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 18:12:56 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 18:12:56 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 18:12:56 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 18:12:56 2010 ROUTE default_gateway=192.168.2.1
- Mon Dec 20 18:12:56 2010 TUN/TAP device tun0 opened
- Mon Dec 20 18:12:56 2010 TUN/TAP TX queue length set to 100
- Mon Dec 20 18:12:56 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
- Mon Dec 20 18:12:59 2010 /sbin/route add -net 95.143.192.190 netmask 255.255.255.255 gw 192.168.2.1
- Mon Dec 20 18:12:59 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 18:12:59 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 18:12:59 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
- Mon Dec 20 18:12:59 2010 Initialization Sequence Completed
- Mon Dec 20 18:27:55 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 18:27:55 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 18:27:55 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 18:27:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:27:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:27:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:27:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:27:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 18:42:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 18:42:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 18:42:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 18:43:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:43:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:43:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:43:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:43:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 18:58:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 18:58:02 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 18:58:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 18:58:04 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:58:04 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:58:04 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 18:58:04 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 18:58:04 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 19:13:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 19:13:06 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 19:13:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 19:13:08 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:13:08 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:13:08 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:13:08 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:13:08 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 19:28:10 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 19:28:10 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 19:28:10 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 19:28:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:28:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:28:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:28:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:28:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 19:43:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 19:43:13 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 19:43:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 19:43:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:43:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:43:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:43:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:43:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 19:58:16 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 19:58:16 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 19:58:16 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 19:58:18 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:58:18 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:58:18 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 19:58:18 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 19:58:18 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- ^CMon Dec 20 20:12:21 2010 event_wait : Interrupted system call (code=4)
- Mon Dec 20 20:12:21 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:12:21 2010 /sbin/route del -net 10.100.1.0 netmask 255.255.255.0
- Mon Dec 20 20:12:21 2010 /sbin/route del -net 95.143.192.190 netmask 255.255.255.255
- Mon Dec 20 20:12:21 2010 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Mon Dec 20 20:12:21 2010 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Mon Dec 20 20:12:21 2010 Closing TUN/TAP interface
- Mon Dec 20 20:12:21 2010 /sbin/ifconfig tun0 0.0.0.0
- Mon Dec 20 20:12:21 2010 SIGINT[hard,] received, process exiting
- root@mybox:/etc/openvpn# openvpn Czech_Republic-DoubleVPN.ovpn
- Mon Dec 20 20:12:23 2010 OpenVPN 2.1.0 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 12 2010
- Mon Dec 20 20:12:23 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:12:23 2010 WARNING: file 'cert.dat' is group or others accessible
- Mon Dec 20 20:12:23 2010 /usr/bin/openssl-vulnkey -q -b 2048 -m <modulus omitted>
- Mon Dec 20 20:12:24 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:12:24 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:12:24 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:12:24 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:12:24 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:12:25 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:12:25 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:12:25 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:12:25 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:12:25 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=1da2d450 fc3456cc
- Mon Dec 20 20:12:26 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:12:26 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:12:26 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:12:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:12:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:12:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:12:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:12:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:12:31 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:12:33 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:12:33 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:12:33 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:12:33 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:12:33 2010 ROUTE default_gateway=192.168.2.1
- Mon Dec 20 20:12:33 2010 TUN/TAP device tun0 opened
- Mon Dec 20 20:12:33 2010 TUN/TAP TX queue length set to 100
- Mon Dec 20 20:12:33 2010 /sbin/ifconfig tun0 10.100.1.171 netmask 255.255.255.0 mtu 1500 broadcast 10.100.1.255
- Mon Dec 20 20:12:35 2010 /sbin/route add -net 93.190.142.152 netmask 255.255.255.255 gw 192.168.2.1
- Mon Dec 20 20:12:35 2010 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 20:12:35 2010 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.100.1.1
- Mon Dec 20 20:12:35 2010 /sbin/route add -net 10.100.1.0 netmask 255.255.255.0 gw 10.100.1.1
- Mon Dec 20 20:12:35 2010 Initialization Sequence Completed
- Mon Dec 20 20:21:32 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4150 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:21:32 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:21:32 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:21:32 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:21:32 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:21:37 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:21:37 2010 Re-using SSL/TLS context
- Mon Dec 20 20:21:37 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:21:37 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:21:37 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:21:37 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:21:37 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:21:41 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:21:41 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:21:41 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:21:41 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:21:41 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:21:41 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=00768c72 d67c849b
- Mon Dec 20 20:21:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:21:42 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:21:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:21:46 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:21:46 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:21:46 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:21:46 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:21:46 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:21:46 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:21:48 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:21:48 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:21:48 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:21:48 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:21:48 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:21:48 2010 Initialization Sequence Completed
- Mon Dec 20 20:24:31 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #6018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:24:31 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:24:31 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:24:31 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:24:31 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:24:36 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:24:36 2010 Re-using SSL/TLS context
- Mon Dec 20 20:24:36 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:24:36 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:24:36 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:24:36 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:24:36 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:24:37 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:24:37 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:24:37 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:24:37 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:24:37 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:24:38 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=30cc94fd a90f0e9f
- Mon Dec 20 20:24:38 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:24:38 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:24:38 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:24:42 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:24:42 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:24:42 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:24:42 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:24:42 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:24:42 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:24:44 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:24:45 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:24:45 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:24:45 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:24:45 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:24:45 2010 Initialization Sequence Completed
- Mon Dec 20 20:25:35 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1428 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:25:35 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:25:35 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:25:35 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:25:35 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:25:40 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:25:40 2010 Re-using SSL/TLS context
- Mon Dec 20 20:25:40 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:25:40 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:25:40 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:25:40 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:25:40 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:25:41 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:25:41 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:25:41 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:25:41 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:25:41 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:25:41 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=2ad6ef9e 44f983c0
- Mon Dec 20 20:25:42 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:25:42 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:25:42 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:25:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:25:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:25:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:25:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:25:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:25:45 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:25:47 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:25:48 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:25:48 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:25:48 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:25:48 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:25:48 2010 Initialization Sequence Completed
- Mon Dec 20 20:26:14 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #749 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:26:14 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:26:14 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:26:14 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:26:14 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:26:19 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:26:19 2010 Re-using SSL/TLS context
- Mon Dec 20 20:26:19 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:26:19 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:26:19 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:26:19 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:26:19 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:26:20 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:26:20 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:26:20 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:26:20 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:26:20 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:26:20 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9f7b1373 9f5a4a83
- Mon Dec 20 20:26:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:26:21 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:26:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:26:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:26:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:26:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:26:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:26:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:26:23 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:26:25 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:26:25 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:26:25 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:26:25 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:26:25 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:26:25 2010 Initialization Sequence Completed
- Mon Dec 20 20:26:54 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #741 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:26:54 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:26:54 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:26:54 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:26:54 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:26:59 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:26:59 2010 Re-using SSL/TLS context
- Mon Dec 20 20:26:59 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:26:59 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:26:59 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:26:59 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:26:59 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:27:00 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:27:00 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:27:00 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:27:00 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:27:00 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:27:00 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=32733a54 c830041e
- Mon Dec 20 20:27:01 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:27:01 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:27:01 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:27:03 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:27:03 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:27:03 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:27:03 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:27:03 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:27:03 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:27:05 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:27:06 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:27:06 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:27:06 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:27:06 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:27:06 2010 Initialization Sequence Completed
- Mon Dec 20 20:27:21 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1596 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:27:21 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:27:21 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:27:21 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:27:21 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:27:26 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:27:26 2010 Re-using SSL/TLS context
- Mon Dec 20 20:27:26 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:27:26 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:27:26 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:27:26 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:27:26 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:27:27 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:27:27 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:27:27 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:27:27 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:27:27 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:27:27 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=41241376 c661af2f
- Mon Dec 20 20:27:27 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:27:27 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:27:27 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:27:29 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:27:29 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:27:29 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:27:29 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:27:29 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:27:29 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:27:32 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:27:32 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:27:32 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:27:32 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:27:32 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:27:32 2010 Initialization Sequence Completed
- Mon Dec 20 20:27:57 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2712 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:27:57 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:27:57 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:27:57 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:27:57 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:28:02 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:28:02 2010 Re-using SSL/TLS context
- Mon Dec 20 20:28:02 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:28:02 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:28:02 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:28:02 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:28:02 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:28:03 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:28:03 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:28:03 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:28:03 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:28:03 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:28:03 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=19ceb5de a6a8301c
- Mon Dec 20 20:28:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:28:04 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:28:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:28:06 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:28:06 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:28:06 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:28:06 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:28:06 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:28:06 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:28:08 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:28:08 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:28:08 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:28:08 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:28:08 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:28:08 2010 Initialization Sequence Completed
- Mon Dec 20 20:28:20 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #643 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:28:20 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:28:20 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:28:20 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:28:20 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:28:25 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:28:25 2010 Re-using SSL/TLS context
- Mon Dec 20 20:28:25 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:28:25 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:28:25 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:28:25 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:28:25 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:28:26 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:28:26 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:28:26 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:28:26 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:28:26 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:28:26 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=89950036 b1c00a93
- Mon Dec 20 20:28:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:28:28 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:28:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:28:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:28:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:28:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:28:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:28:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:28:30 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:28:32 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:28:32 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:28:32 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:28:32 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:28:32 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:28:32 2010 Initialization Sequence Completed
- Mon Dec 20 20:29:08 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1673 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:29:08 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:29:08 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:29:08 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:29:08 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:29:13 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:29:13 2010 Re-using SSL/TLS context
- Mon Dec 20 20:29:13 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:29:13 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:29:13 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:29:13 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:29:13 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:29:17 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:29:17 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:29:17 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:29:17 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:29:17 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:29:17 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=76c60739 1f6ed605
- Mon Dec 20 20:29:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:29:19 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:29:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:29:21 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:29:21 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:29:21 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:29:21 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:29:21 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:29:21 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:29:23 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:29:23 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:29:23 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:29:23 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:29:23 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:29:23 2010 Initialization Sequence Completed
- Mon Dec 20 20:29:39 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #707 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:29:39 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:29:39 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:29:39 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:29:39 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:29:44 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:29:44 2010 Re-using SSL/TLS context
- Mon Dec 20 20:29:44 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:29:44 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:29:44 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:29:44 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:29:44 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:29:45 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:29:45 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:29:45 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:29:45 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:29:45 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:29:46 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=73ef5d5f a859cd8e
- Mon Dec 20 20:29:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:29:47 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:29:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:29:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:29:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:29:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:29:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:29:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:29:49 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:29:51 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:29:51 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:29:51 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:29:51 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:29:51 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:29:51 2010 Initialization Sequence Completed
- Mon Dec 20 20:30:02 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #619 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:30:02 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:30:02 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:30:02 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:30:02 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:30:07 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:30:07 2010 Re-using SSL/TLS context
- Mon Dec 20 20:30:07 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:30:07 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:30:07 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:30:07 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:30:07 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:30:08 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:30:08 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:30:08 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:30:08 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:30:08 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:30:08 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=4fd59fe4 7b74a9dd
- Mon Dec 20 20:30:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:30:09 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:30:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:30:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:30:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:30:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:30:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:30:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:30:12 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:30:14 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:30:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:30:14 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:30:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:30:14 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:30:14 2010 Initialization Sequence Completed
- Mon Dec 20 20:30:47 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1316 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:30:47 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:30:47 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:30:47 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:30:47 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:30:52 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:30:52 2010 Re-using SSL/TLS context
- Mon Dec 20 20:30:52 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:30:52 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:30:52 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:30:52 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:30:52 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:30:53 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:30:53 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:30:53 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:30:53 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:30:53 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:30:53 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=79271e16 6b84d383
- Mon Dec 20 20:30:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:30:54 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:30:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:30:56 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:30:56 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:30:56 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:30:56 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:30:56 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:30:56 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:30:58 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:30:58 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:30:58 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:30:58 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:30:58 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:30:58 2010 Initialization Sequence Completed
- Mon Dec 20 20:31:08 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2030 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:31:08 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:31:08 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:31:08 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:31:08 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:31:13 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:31:13 2010 Re-using SSL/TLS context
- Mon Dec 20 20:31:13 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:31:13 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:31:13 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:31:13 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:31:13 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:31:14 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:31:14 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:31:14 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:31:14 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:31:14 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:31:14 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9d340735 9597006c
- Mon Dec 20 20:31:15 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:31:15 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:31:15 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:31:18 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:31:18 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:31:18 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:31:18 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:31:18 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:31:18 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:31:20 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:31:20 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:31:20 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:31:20 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:31:20 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:31:20 2010 Initialization Sequence Completed
- Mon Dec 20 20:31:46 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1463 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:31:46 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:31:46 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:31:46 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:31:46 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:31:51 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:31:51 2010 Re-using SSL/TLS context
- Mon Dec 20 20:31:51 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:31:51 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:31:51 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:31:51 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:31:51 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:31:52 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:31:52 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:31:52 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:31:52 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:31:52 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:31:53 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=7eb43599 23beea53
- Mon Dec 20 20:31:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:31:54 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:31:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:31:56 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:31:56 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:31:56 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:31:56 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:31:56 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:31:56 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:31:58 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:31:59 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:31:59 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:31:59 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:31:59 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:31:59 2010 Initialization Sequence Completed
- Mon Dec 20 20:32:32 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1195 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:32:32 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:32:32 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:32:32 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:32:32 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:32:37 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:32:37 2010 Re-using SSL/TLS context
- Mon Dec 20 20:32:37 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:32:37 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:32:37 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:32:37 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:32:37 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:32:38 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:32:38 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:32:38 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:32:38 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:32:38 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:32:38 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=eb4bfc62 93d35100
- Mon Dec 20 20:32:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:32:39 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:32:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:32:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:32:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:32:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:32:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:32:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:32:41 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:32:43 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:32:43 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:32:43 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:32:43 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:32:43 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:32:43 2010 Initialization Sequence Completed
- Mon Dec 20 20:32:55 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1968 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:32:55 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:32:55 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:32:55 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:32:55 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:33:00 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:33:00 2010 Re-using SSL/TLS context
- Mon Dec 20 20:33:00 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:33:00 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:33:00 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:33:00 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:33:00 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:33:01 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:33:01 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:33:01 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:33:01 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:33:01 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:33:02 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=47947869 5bbac972
- Mon Dec 20 20:33:03 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:33:03 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:33:03 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:33:06 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:33:06 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:33:06 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:33:06 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:33:06 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:33:06 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:33:08 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:33:09 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:33:09 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:33:09 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:33:09 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:33:09 2010 Initialization Sequence Completed
- Mon Dec 20 20:33:38 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1134 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:33:38 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:33:38 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:33:38 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:33:38 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:33:43 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:33:43 2010 Re-using SSL/TLS context
- Mon Dec 20 20:33:43 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:33:43 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:33:43 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:33:43 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:33:43 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:33:44 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:33:44 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:33:44 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:33:44 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:33:44 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:33:45 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9ff1566a e6ab24a3
- Mon Dec 20 20:33:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:33:45 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:33:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:33:48 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:33:48 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:33:48 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:33:48 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:33:48 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:33:48 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:33:50 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:33:50 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:33:50 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:33:50 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:33:50 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:33:50 2010 Initialization Sequence Completed
- Mon Dec 20 20:34:20 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1194 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:34:20 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:34:20 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:34:20 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:34:20 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:34:25 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:34:25 2010 Re-using SSL/TLS context
- Mon Dec 20 20:34:25 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:34:25 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:34:25 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:34:25 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:34:25 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:34:26 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:34:26 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:34:26 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:34:26 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:34:26 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:34:26 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d2d70bff 8718a9f9
- Mon Dec 20 20:34:27 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:34:27 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:34:27 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:34:29 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:34:29 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:34:29 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:34:29 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:34:29 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:34:29 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:34:31 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:34:31 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:34:31 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:34:31 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:34:31 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:34:31 2010 Initialization Sequence Completed
- Mon Dec 20 20:35:07 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1530 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:35:07 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:35:07 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:35:07 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:35:07 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:35:12 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:35:12 2010 Re-using SSL/TLS context
- Mon Dec 20 20:35:12 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:35:12 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:35:12 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:35:12 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:35:12 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:35:13 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:35:13 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:35:13 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:35:13 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:35:13 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:35:13 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=32a08eec bdaa2b8d
- Mon Dec 20 20:35:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:35:14 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:35:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:35:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:35:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:35:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:35:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:35:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:35:16 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:35:18 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:35:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:35:18 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:35:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:35:18 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:35:18 2010 Initialization Sequence Completed
- Mon Dec 20 20:37:14 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2618 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:37:14 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:37:14 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:37:14 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:37:14 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:37:19 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:37:19 2010 Re-using SSL/TLS context
- Mon Dec 20 20:37:19 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:37:19 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:37:19 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:37:19 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:37:19 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:37:20 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:37:20 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:37:20 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:37:20 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:37:20 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:37:20 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=bd0aa79b c86fcdef
- Mon Dec 20 20:37:21 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:37:21 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:37:21 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:37:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:37:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:37:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:37:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:37:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:37:23 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:37:25 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:37:25 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:37:25 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:37:25 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:37:25 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:37:25 2010 Initialization Sequence Completed
- Mon Dec 20 20:37:42 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1770 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:37:42 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:37:42 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:37:42 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:37:42 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:37:47 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:37:47 2010 Re-using SSL/TLS context
- Mon Dec 20 20:37:47 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:37:47 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:37:47 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:37:47 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:37:47 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:37:48 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:37:48 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:37:48 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:37:48 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:37:48 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:37:48 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=0ee31ce4 c43b8987
- Mon Dec 20 20:37:49 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:37:49 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:37:49 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:37:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:37:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:37:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:37:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:37:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:37:51 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:37:53 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:37:53 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:37:53 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:37:53 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:37:53 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:37:53 2010 Initialization Sequence Completed
- Mon Dec 20 20:38:22 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1440 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:38:22 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:38:22 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:38:22 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:38:22 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:38:27 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:38:27 2010 Re-using SSL/TLS context
- Mon Dec 20 20:38:27 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:38:27 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:38:27 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:38:27 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:38:27 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:38:28 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:38:28 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:38:28 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:38:28 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:38:28 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:38:28 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=7b7d534f 679e384d
- Mon Dec 20 20:38:29 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:38:29 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:38:29 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:38:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:38:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:38:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:38:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:38:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:38:31 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:38:33 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:38:33 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:38:33 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:38:33 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:38:33 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:38:33 2010 Initialization Sequence Completed
- Mon Dec 20 20:38:55 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1366 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:38:55 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:38:55 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:38:55 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:38:55 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:39:00 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:39:00 2010 Re-using SSL/TLS context
- Mon Dec 20 20:39:00 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:39:00 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:39:00 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:39:00 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:39:00 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:39:01 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:39:01 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:39:01 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:39:01 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:39:01 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:39:01 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=f3e709d9 93858607
- Mon Dec 20 20:39:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:39:02 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:39:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:39:04 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:39:04 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:39:04 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:39:04 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:39:04 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:39:04 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:39:07 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:39:07 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:39:07 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:39:07 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:39:07 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:39:07 2010 Initialization Sequence Completed
- Mon Dec 20 20:39:41 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #4052 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:39:41 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:39:41 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:39:41 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:39:41 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:39:46 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:39:46 2010 Re-using SSL/TLS context
- Mon Dec 20 20:39:46 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:39:46 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:39:46 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:39:46 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:39:46 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:39:47 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:39:47 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:39:47 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:39:47 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:39:47 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:39:47 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c491dcc1 af286578
- Mon Dec 20 20:39:48 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:39:48 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:39:48 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:39:51 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:39:51 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:39:51 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:39:51 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:39:51 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:39:51 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:39:53 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:39:53 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:39:53 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:39:53 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:39:53 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:39:53 2010 Initialization Sequence Completed
- Mon Dec 20 20:40:07 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #905 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:40:07 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:40:07 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:40:07 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:40:07 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:40:12 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:40:12 2010 Re-using SSL/TLS context
- Mon Dec 20 20:40:12 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:40:12 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:40:12 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:40:12 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:40:12 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:40:13 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:40:13 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:40:13 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:40:13 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:40:13 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:40:13 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=ca0d2197 6d78c5f5
- Mon Dec 20 20:40:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:40:14 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:40:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:40:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:40:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:40:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:40:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:40:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:40:16 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:40:18 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:40:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:40:18 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:40:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:40:18 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:40:18 2010 Initialization Sequence Completed
- Mon Dec 20 20:40:30 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #738 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:40:30 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:40:30 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:40:30 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:40:30 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:40:35 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:40:35 2010 Re-using SSL/TLS context
- Mon Dec 20 20:40:35 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:40:35 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:40:35 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:40:35 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:40:35 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:40:36 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:40:36 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:40:36 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:40:36 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:40:36 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:40:36 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=2054d2b9 fcaf555e
- Mon Dec 20 20:40:37 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:40:37 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:40:37 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:40:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:40:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:40:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:40:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:40:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:40:39 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:40:41 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:40:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:40:41 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:40:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:40:41 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:40:41 2010 Initialization Sequence Completed
- Mon Dec 20 20:41:07 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1226 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:41:07 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:41:07 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:41:07 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:41:07 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:41:12 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:41:12 2010 Re-using SSL/TLS context
- Mon Dec 20 20:41:12 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:41:12 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:41:12 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:41:12 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:41:12 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:41:13 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:41:13 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:41:13 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:41:13 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:41:13 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:41:13 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c75a34cb 9147597a
- Mon Dec 20 20:41:14 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:41:14 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:41:14 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:41:16 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:41:16 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:41:16 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:41:16 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:41:16 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:41:16 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:41:18 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:41:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:41:18 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:41:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:41:18 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:41:18 2010 Initialization Sequence Completed
- Mon Dec 20 20:41:36 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #884 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:41:36 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:41:36 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:41:36 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:41:36 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:41:41 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:41:41 2010 Re-using SSL/TLS context
- Mon Dec 20 20:41:41 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:41:41 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:41:41 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:41:41 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:41:41 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:41:42 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:41:42 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:41:42 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:41:42 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:41:42 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:41:42 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=79879338 c4180514
- Mon Dec 20 20:41:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:41:43 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:41:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:41:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:41:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:41:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:41:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:41:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:41:45 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:41:47 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:41:47 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:41:47 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:41:47 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:41:47 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:41:47 2010 Initialization Sequence Completed
- Mon Dec 20 20:42:00 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1230 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:42:00 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:42:00 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:42:00 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:42:00 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:42:05 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:42:05 2010 Re-using SSL/TLS context
- Mon Dec 20 20:42:05 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:42:05 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:42:05 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:42:05 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:42:05 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:42:06 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:42:06 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:42:06 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:42:06 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:42:06 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:42:06 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=58fe531b f7b4f8fb
- Mon Dec 20 20:42:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:42:07 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:42:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:42:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:42:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:42:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:42:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:42:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:42:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:42:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:42:12 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:42:12 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:42:12 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:42:12 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:42:12 2010 Initialization Sequence Completed
- Mon Dec 20 20:42:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1306 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:42:51 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:42:51 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:42:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:42:51 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:42:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:42:56 2010 Re-using SSL/TLS context
- Mon Dec 20 20:42:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:42:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:42:56 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:42:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:42:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:42:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:42:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:42:57 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:42:57 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:42:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:42:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=809ca7c1 f1c12c11
- Mon Dec 20 20:42:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:42:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:42:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:43:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:43:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:43:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:43:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:43:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:43:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:43:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:43:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:43:03 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:43:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:43:03 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:43:03 2010 Initialization Sequence Completed
- Mon Dec 20 20:43:33 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1468 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:43:33 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:43:33 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:43:33 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:43:33 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:43:38 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:43:38 2010 Re-using SSL/TLS context
- Mon Dec 20 20:43:38 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:43:38 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:43:38 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:43:38 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:43:38 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:43:39 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:43:39 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:43:39 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:43:39 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:43:39 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:43:40 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c13a3b33 faabcd06
- Mon Dec 20 20:43:40 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:43:40 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:43:40 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:43:42 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:43:42 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:43:42 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:43:42 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:43:42 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:43:42 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:43:44 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:43:45 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:43:45 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:43:45 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:43:45 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:43:45 2010 Initialization Sequence Completed
- Mon Dec 20 20:43:49 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #915 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:43:49 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:43:49 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:43:49 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:43:49 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:43:54 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:43:54 2010 Re-using SSL/TLS context
- Mon Dec 20 20:43:54 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:43:54 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:43:54 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:43:54 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:43:54 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:43:55 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:43:55 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:43:55 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:43:55 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:43:55 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:43:55 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=daeedc2c aaa271f5
- Mon Dec 20 20:43:57 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:43:57 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:43:57 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:44:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:44:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:44:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:44:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:44:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:44:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:44:02 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:44:02 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:44:02 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:44:02 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:44:02 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:44:02 2010 Initialization Sequence Completed
- Mon Dec 20 20:44:29 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1307 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:44:29 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:44:29 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:44:29 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:44:29 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:44:34 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:44:34 2010 Re-using SSL/TLS context
- Mon Dec 20 20:44:34 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:44:34 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:44:34 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:44:34 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:44:34 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:44:35 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:44:35 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:44:35 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:44:35 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:44:35 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:44:35 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=8c130620 56551a5f
- Mon Dec 20 20:44:36 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:44:36 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:44:36 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:44:39 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:44:39 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:44:39 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:44:39 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:44:39 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:44:39 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:44:41 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:44:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:44:41 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:44:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:44:41 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:44:41 2010 Initialization Sequence Completed
- Mon Dec 20 20:44:59 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #727 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:44:59 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:44:59 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:44:59 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:44:59 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:45:04 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:45:04 2010 Re-using SSL/TLS context
- Mon Dec 20 20:45:04 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:45:04 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:45:04 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:45:04 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:45:04 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:45:05 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:45:05 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:45:05 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:45:05 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:45:05 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:45:05 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=10531ca9 15cc8feb
- Mon Dec 20 20:45:06 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:45:06 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:45:06 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:45:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:45:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:45:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:45:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:45:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:45:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:45:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:45:11 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:45:11 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:45:11 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:45:11 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:45:11 2010 Initialization Sequence Completed
- Mon Dec 20 20:45:39 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #915 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:45:39 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:45:39 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:45:39 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:45:39 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:45:44 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:45:44 2010 Re-using SSL/TLS context
- Mon Dec 20 20:45:44 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:45:44 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:45:44 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:45:44 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:45:44 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:45:45 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:45:45 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:45:45 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:45:45 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:45:45 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:45:46 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=593b7b9f dedf18ed
- Mon Dec 20 20:45:46 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:45:46 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:45:46 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:45:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:45:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:45:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:45:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:45:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:45:49 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:45:52 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:45:52 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:45:52 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:45:52 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:45:52 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:45:52 2010 Initialization Sequence Completed
- Mon Dec 20 20:46:13 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #682 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:46:13 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:46:13 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:46:13 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:46:13 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:46:18 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:46:18 2010 Re-using SSL/TLS context
- Mon Dec 20 20:46:18 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:46:18 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:46:18 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:46:18 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:46:18 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:46:19 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:46:19 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:46:19 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:46:19 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:46:19 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:46:19 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=ffd60c7f f34f9ab1
- Mon Dec 20 20:46:20 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:46:20 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:46:20 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:46:22 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:46:22 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:46:22 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:46:22 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:46:22 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:46:22 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:46:24 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:46:24 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:46:24 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:46:24 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:46:24 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:46:24 2010 Initialization Sequence Completed
- Mon Dec 20 20:46:33 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1562 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:46:33 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:46:33 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:46:33 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:46:33 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:46:38 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:46:38 2010 Re-using SSL/TLS context
- Mon Dec 20 20:46:38 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:46:38 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:46:38 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:46:38 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:46:38 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:46:39 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:46:39 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:46:39 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:46:39 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:46:39 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:46:40 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=518b03a6 0b74c046
- Mon Dec 20 20:46:41 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:46:41 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:46:41 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:46:44 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:46:44 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:46:44 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:46:44 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:46:44 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:46:44 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:46:46 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:46:46 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:46:46 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:46:46 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:46:46 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:46:46 2010 Initialization Sequence Completed
- Mon Dec 20 20:47:19 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1569 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:47:19 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:47:19 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:47:19 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:47:19 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:47:24 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:47:24 2010 Re-using SSL/TLS context
- Mon Dec 20 20:47:24 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:47:24 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:47:24 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:47:24 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:47:24 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:47:25 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:47:25 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:47:25 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:47:25 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:47:25 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:47:25 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=1e811778 d2845e92
- Mon Dec 20 20:47:26 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:47:26 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:47:26 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:47:30 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:47:30 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:47:30 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:47:30 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:47:30 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:47:30 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:47:32 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:47:32 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:47:32 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:47:32 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:47:32 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:47:32 2010 Initialization Sequence Completed
- Mon Dec 20 20:47:53 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #750 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:47:53 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:47:53 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:47:53 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:47:53 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:47:58 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:47:58 2010 Re-using SSL/TLS context
- Mon Dec 20 20:47:58 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:47:58 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:47:58 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:47:58 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:47:58 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:47:59 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:47:59 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:47:59 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:47:59 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:47:59 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:47:59 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=b01e918a 77d47f6a
- Mon Dec 20 20:48:00 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:48:00 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:48:00 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:48:02 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:48:02 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:48:02 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:48:02 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:48:02 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:48:02 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:48:05 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:48:05 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:48:05 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:48:05 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:48:05 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:48:05 2010 Initialization Sequence Completed
- Mon Dec 20 20:49:01 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3007 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:49:01 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:49:01 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:49:01 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:49:01 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:49:06 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:49:06 2010 Re-using SSL/TLS context
- Mon Dec 20 20:49:06 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:49:06 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:49:06 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:49:06 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:49:06 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:49:07 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:49:07 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:49:07 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:49:07 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:49:07 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:49:07 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=143b65d3 b907c44e
- Mon Dec 20 20:49:08 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:49:08 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:49:08 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:49:11 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:49:11 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:49:11 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:49:11 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:49:11 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:49:11 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:49:13 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:49:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:49:14 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:49:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:49:14 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:49:14 2010 Initialization Sequence Completed
- Mon Dec 20 20:49:44 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1184 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:49:44 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:49:44 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:49:44 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:49:44 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:49:49 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:49:49 2010 Re-using SSL/TLS context
- Mon Dec 20 20:49:49 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:49:49 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:49:49 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:49:49 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:49:49 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:49:50 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:49:50 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:49:50 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:49:50 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:49:50 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:49:50 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=5ed40f18 c29c2bef
- Mon Dec 20 20:49:51 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:49:51 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:49:51 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:49:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:49:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:49:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:49:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:49:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:49:53 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:49:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:49:55 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:49:55 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:49:55 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:49:55 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:49:55 2010 Initialization Sequence Completed
- Mon Dec 20 20:50:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1944 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:50:51 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:50:51 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:50:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:50:51 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:50:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:50:56 2010 Re-using SSL/TLS context
- Mon Dec 20 20:50:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:50:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:50:56 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:50:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:50:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:50:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:50:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:50:57 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:50:57 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:50:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:50:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e88ae86e 4aaaa02b
- Mon Dec 20 20:50:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:50:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:50:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:51:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:51:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:51:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:51:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:51:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:51:01 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:51:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:51:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:51:03 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:51:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:51:03 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:51:03 2010 Initialization Sequence Completed
- Mon Dec 20 20:51:27 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #772 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:51:27 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:51:27 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:51:27 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:51:27 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:51:32 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:51:32 2010 Re-using SSL/TLS context
- Mon Dec 20 20:51:32 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:51:32 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:51:32 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:51:32 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:51:32 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:51:33 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:51:33 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:51:33 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:51:33 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:51:33 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:51:33 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=cc92fdb0 7f6787fb
- Mon Dec 20 20:51:34 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:51:34 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:51:34 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:51:38 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:51:38 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:51:38 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:51:38 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:51:38 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:51:38 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:51:40 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:51:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:51:41 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:51:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:51:41 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:51:41 2010 Initialization Sequence Completed
- Mon Dec 20 20:52:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2256 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:52:51 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:52:51 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:52:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:52:51 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:52:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:52:56 2010 Re-using SSL/TLS context
- Mon Dec 20 20:52:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:52:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:52:56 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:52:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:52:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:52:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:52:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:52:57 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:52:57 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:52:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:52:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=cbc83a22 7a5a2c5b
- Mon Dec 20 20:52:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:52:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:52:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:53:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:53:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:53:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:53:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:53:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:53:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:53:02 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:53:02 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:53:02 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:53:02 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:53:02 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:53:02 2010 Initialization Sequence Completed
- Mon Dec 20 20:53:16 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1649 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:53:16 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:53:16 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:53:16 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:53:16 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:53:21 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:53:21 2010 Re-using SSL/TLS context
- Mon Dec 20 20:53:21 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:53:21 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:53:21 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:53:21 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:53:21 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:53:22 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:53:22 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:53:22 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:53:22 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:53:22 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:53:22 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=af07e8e4 0c9b4c2e
- Mon Dec 20 20:53:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:53:23 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:53:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:53:26 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:53:26 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:53:26 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:53:26 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:53:26 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:53:26 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:53:28 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:53:28 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:53:28 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:53:28 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:53:28 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:53:28 2010 Initialization Sequence Completed
- Mon Dec 20 20:53:58 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:53:58 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:53:58 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:53:58 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:53:58 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:54:03 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:54:03 2010 Re-using SSL/TLS context
- Mon Dec 20 20:54:03 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:54:03 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:54:03 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:54:03 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:54:03 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:54:04 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:54:04 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:54:04 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:54:04 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:54:04 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:54:04 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9cd4e71f fcd0b717
- Mon Dec 20 20:54:05 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:54:05 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:54:05 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:54:09 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:54:09 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:54:09 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:54:09 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:54:09 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:54:09 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:54:11 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:54:11 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:54:11 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:54:11 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:54:11 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:54:11 2010 Initialization Sequence Completed
- Mon Dec 20 20:54:48 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:54:48 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:54:48 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:54:48 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:54:48 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:54:53 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:54:53 2010 Re-using SSL/TLS context
- Mon Dec 20 20:54:53 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:54:53 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:54:53 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:54:53 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:54:53 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:54:54 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:54:54 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:54:54 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:54:54 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:54:54 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:54:54 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9d27d5af a33bc91e
- Mon Dec 20 20:54:55 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:54:55 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:54:55 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:54:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:54:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:54:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:54:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:54:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:54:57 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:54:59 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:54:59 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:54:59 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:54:59 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:54:59 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:54:59 2010 Initialization Sequence Completed
- Mon Dec 20 20:55:20 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #2012 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:55:20 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:55:20 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:55:20 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:55:20 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:55:25 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:55:25 2010 Re-using SSL/TLS context
- Mon Dec 20 20:55:25 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:55:25 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:55:25 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:55:25 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:55:25 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:55:26 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:55:26 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:55:26 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:55:26 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:55:26 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:55:26 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=5bbbbb4d 987ed90b
- Mon Dec 20 20:55:28 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:55:28 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:55:28 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:55:31 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:55:31 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:55:31 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:55:31 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:55:31 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:55:31 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:55:33 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:55:33 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:55:33 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:55:33 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:55:33 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:55:33 2010 Initialization Sequence Completed
- Mon Dec 20 20:55:52 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #837 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:55:52 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:55:52 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:55:52 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:55:52 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:55:57 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:55:57 2010 Re-using SSL/TLS context
- Mon Dec 20 20:55:57 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:55:57 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:55:57 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:55:57 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:55:57 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:55:58 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:55:58 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:55:58 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:55:58 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:55:58 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:55:58 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=9b5d545e bf16150a
- Mon Dec 20 20:55:59 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:55:59 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:55:59 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:56:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:56:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:56:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:56:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:56:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:56:01 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:56:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:56:04 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:56:04 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:56:04 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:56:04 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:56:04 2010 Initialization Sequence Completed
- Mon Dec 20 20:56:28 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #600 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:56:28 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:56:28 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:56:28 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:56:28 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:56:33 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:56:33 2010 Re-using SSL/TLS context
- Mon Dec 20 20:56:33 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:56:33 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:56:33 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:56:33 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:56:33 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:56:34 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:56:34 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:56:34 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:56:34 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:56:34 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:56:34 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=55621b14 5e8a0955
- Mon Dec 20 20:56:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:56:35 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:56:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:56:38 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:56:38 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:56:38 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:56:38 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:56:38 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:56:38 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:56:40 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:56:41 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:56:41 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:56:41 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:56:41 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:56:41 2010 Initialization Sequence Completed
- Mon Dec 20 20:57:01 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #679 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:57:01 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:57:01 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:57:01 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:57:01 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:57:06 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:57:06 2010 Re-using SSL/TLS context
- Mon Dec 20 20:57:06 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:57:06 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:57:06 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:57:06 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:57:06 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:57:07 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:57:07 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:57:07 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:57:07 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:57:07 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:57:07 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=348dadea 9bb4dfbb
- Mon Dec 20 20:57:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:57:09 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:57:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:57:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:57:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:57:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:57:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:57:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:57:12 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:57:14 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:57:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:57:14 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:57:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:57:14 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:57:14 2010 Initialization Sequence Completed
- Mon Dec 20 20:57:40 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #849 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:57:40 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:57:40 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:57:40 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:57:40 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:57:45 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:57:45 2010 Re-using SSL/TLS context
- Mon Dec 20 20:57:45 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:57:45 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:57:45 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:57:45 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:57:45 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:57:46 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:57:46 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:57:46 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:57:46 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:57:46 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:57:46 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=f6f9f13f 420e681e
- Mon Dec 20 20:57:47 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:57:47 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:57:47 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:57:49 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:57:49 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:57:49 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:57:49 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:57:49 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:57:49 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:57:52 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:57:52 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:57:52 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:57:52 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:57:52 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:57:52 2010 Initialization Sequence Completed
- Mon Dec 20 20:58:15 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1908 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:58:15 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:58:15 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:58:15 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:58:15 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:58:20 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:58:20 2010 Re-using SSL/TLS context
- Mon Dec 20 20:58:20 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:58:20 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:58:20 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:58:20 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:58:20 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:58:21 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:58:21 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:58:21 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:58:21 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:58:21 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:58:21 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e60bda69 0bd732f7
- Mon Dec 20 20:58:23 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:58:23 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:58:23 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:58:25 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:58:25 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:58:25 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:58:25 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:58:25 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:58:25 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:58:27 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:58:27 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:58:27 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:58:27 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:58:27 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:58:27 2010 Initialization Sequence Completed
- Mon Dec 20 20:58:54 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1126 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:58:54 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:58:54 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:58:54 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:58:54 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:58:59 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:58:59 2010 Re-using SSL/TLS context
- Mon Dec 20 20:58:59 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:58:59 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:58:59 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:58:59 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:58:59 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:59:00 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:59:00 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:59:00 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:59:00 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:59:00 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:59:01 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=ae5ae5b7 737850cd
- Mon Dec 20 20:59:02 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:59:02 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:59:02 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:59:05 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:59:05 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:59:05 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:59:05 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:59:05 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:59:05 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:59:07 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:59:07 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:59:07 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:59:07 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:59:07 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:59:07 2010 Initialization Sequence Completed
- Mon Dec 20 20:59:34 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #793 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 20:59:34 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 20:59:34 2010 TCP/UDP: Closing socket
- Mon Dec 20 20:59:34 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 20:59:34 2010 Restart pause, 5 second(s)
- Mon Dec 20 20:59:39 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 20:59:39 2010 Re-using SSL/TLS context
- Mon Dec 20 20:59:39 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 20:59:39 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 20:59:39 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 20:59:39 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 20:59:39 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 20:59:40 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:59:40 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 20:59:40 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:59:40 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 20:59:40 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:59:40 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=8206adfc bf18af1d
- Mon Dec 20 20:59:40 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 20:59:40 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 20:59:40 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 20:59:42 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:59:42 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:59:42 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 20:59:42 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 20:59:42 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 20:59:42 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 20:59:44 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 20:59:44 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 20:59:44 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 20:59:44 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 20:59:44 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 20:59:44 2010 Initialization Sequence Completed
- Mon Dec 20 21:00:04 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3123 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:00:04 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:00:04 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:00:04 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:00:04 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:00:09 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:00:09 2010 Re-using SSL/TLS context
- Mon Dec 20 21:00:09 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:00:09 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:00:09 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:00:09 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:00:09 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:00:10 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:00:10 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:00:10 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:00:10 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:00:10 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:00:10 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=928f6b82 bf321b20
- Mon Dec 20 21:00:11 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:00:11 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:00:11 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:00:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:00:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:00:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:00:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:00:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:00:15 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:00:17 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:00:17 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:00:17 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:00:17 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:00:17 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:00:17 2010 Initialization Sequence Completed
- Mon Dec 20 21:01:00 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1227 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:01:00 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:01:00 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:01:00 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:01:00 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:01:05 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:01:05 2010 Re-using SSL/TLS context
- Mon Dec 20 21:01:05 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:01:05 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:01:05 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:01:05 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:01:05 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:01:06 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:01:06 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:01:06 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:01:06 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:01:06 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:01:06 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=72f83781 cc8ca051
- Mon Dec 20 21:01:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:01:07 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:01:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:01:10 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:01:10 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:01:10 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:01:10 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:01:10 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:01:10 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:01:12 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:01:12 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:01:12 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:01:12 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:01:12 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:01:12 2010 Initialization Sequence Completed
- Mon Dec 20 21:01:42 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #879 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:01:42 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:01:42 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:01:42 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:01:42 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:01:47 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:01:47 2010 Re-using SSL/TLS context
- Mon Dec 20 21:01:47 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:01:47 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:01:47 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:01:47 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:01:47 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:01:48 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:01:48 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:01:48 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:01:48 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:01:48 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:01:48 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=dd8bcbe1 7dde83a1
- Mon Dec 20 21:01:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:01:50 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:01:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:01:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:01:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:01:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:01:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:01:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:01:53 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:01:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:01:55 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:01:55 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:01:55 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:01:55 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:01:55 2010 Initialization Sequence Completed
- Mon Dec 20 21:02:28 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1101 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:02:28 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:02:28 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:02:28 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:02:28 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:02:33 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:02:33 2010 Re-using SSL/TLS context
- Mon Dec 20 21:02:33 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:02:33 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:02:33 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:02:33 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:02:33 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:02:43 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:02:43 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:02:43 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:02:43 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:02:43 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:02:44 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=a5d92733 99909497
- Mon Dec 20 21:02:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:02:45 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:02:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:02:47 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:02:47 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:02:47 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:02:47 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:02:47 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:02:47 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:02:50 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:02:50 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:02:50 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:02:50 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:02:50 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:02:50 2010 Initialization Sequence Completed
- Mon Dec 20 21:03:19 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1025 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:03:19 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:03:19 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:03:19 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:03:19 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:03:24 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:03:24 2010 Re-using SSL/TLS context
- Mon Dec 20 21:03:24 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:03:24 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:03:24 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:03:24 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:03:24 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:03:25 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:03:25 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:03:25 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:03:25 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:03:25 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:03:25 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=dd578a50 923ccb5a
- Mon Dec 20 21:03:26 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:03:26 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:03:26 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:03:28 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:03:28 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:03:28 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:03:28 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:03:28 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:03:28 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:03:30 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:03:30 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:03:30 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:03:30 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:03:30 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:03:30 2010 Initialization Sequence Completed
- Mon Dec 20 21:03:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1831 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:03:51 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:03:51 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:03:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:03:51 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:03:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:03:56 2010 Re-using SSL/TLS context
- Mon Dec 20 21:03:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:03:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:03:56 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:03:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:03:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:03:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:03:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:03:57 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:03:57 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:03:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:03:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=fc4dd96b a7996e6d
- Mon Dec 20 21:03:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:03:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:03:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:04:00 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:04:00 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:04:00 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:04:00 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:04:00 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:04:00 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:04:02 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:04:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:04:03 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:04:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:04:03 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:04:03 2010 Initialization Sequence Completed
- Mon Dec 20 21:04:47 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1187 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:04:47 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:04:47 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:04:47 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:04:47 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:04:52 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:04:52 2010 Re-using SSL/TLS context
- Mon Dec 20 21:04:52 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:04:52 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:04:52 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:04:52 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:04:52 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:04:53 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:04:53 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:04:53 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:04:53 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:04:53 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:04:53 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e007c9d7 8f7f837c
- Mon Dec 20 21:04:54 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:04:54 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:04:54 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:04:57 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:04:57 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:04:57 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:04:57 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:04:57 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:04:57 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:04:59 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:05:00 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:05:00 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:05:00 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:05:00 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:05:00 2010 Initialization Sequence Completed
- Mon Dec 20 21:05:43 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1082 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:05:43 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:05:43 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:05:43 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:05:43 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:05:48 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:05:48 2010 Re-using SSL/TLS context
- Mon Dec 20 21:05:48 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:05:48 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:05:48 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:05:48 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:05:48 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:05:49 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:05:49 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:05:49 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:05:49 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:05:49 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:05:49 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=400411c1 c4e26f30
- Mon Dec 20 21:05:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:05:50 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:05:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:05:52 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:05:52 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:05:52 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:05:52 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:05:52 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:05:52 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:05:54 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:05:54 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:05:54 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:05:54 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:05:54 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:05:54 2010 Initialization Sequence Completed
- Mon Dec 20 21:06:12 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1567 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:06:12 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:06:12 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:06:12 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:06:12 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:06:17 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:06:17 2010 Re-using SSL/TLS context
- Mon Dec 20 21:06:17 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:06:17 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:06:17 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:06:17 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:06:17 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:06:18 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:06:18 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:06:18 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:06:18 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:06:18 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:06:18 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d1ee0de5 93deba4d
- Mon Dec 20 21:06:19 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:06:19 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:06:19 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:06:23 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:06:23 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:06:23 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:06:23 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:06:23 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:06:23 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:06:25 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:06:25 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:06:25 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:06:25 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:06:25 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:06:25 2010 Initialization Sequence Completed
- Mon Dec 20 21:06:57 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1098 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:06:57 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:06:57 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:06:57 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:06:57 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:07:02 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:07:02 2010 Re-using SSL/TLS context
- Mon Dec 20 21:07:02 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:07:02 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:07:02 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:07:02 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:07:02 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:07:03 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:07:03 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:07:03 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:07:03 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:07:03 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:07:03 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=0b02540a de96b8f8
- Mon Dec 20 21:07:04 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:07:04 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:07:04 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:07:07 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:07:07 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:07:07 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:07:07 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:07:07 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:07:07 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:07:10 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:07:10 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:07:10 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:07:10 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:07:10 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:07:10 2010 Initialization Sequence Completed
- Mon Dec 20 21:08:00 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1450 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:08:00 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:08:00 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:08:00 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:08:00 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:08:05 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:08:05 2010 Re-using SSL/TLS context
- Mon Dec 20 21:08:05 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:08:05 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:08:05 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:08:05 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:08:05 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:08:06 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:08:06 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:08:06 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:08:06 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:08:06 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:08:06 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=e5e3f08d de5eead7
- Mon Dec 20 21:08:07 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:08:07 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:08:07 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:08:10 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:08:10 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:08:10 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:08:10 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:08:10 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:08:10 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:08:12 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:08:12 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:08:12 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:08:12 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:08:12 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:08:12 2010 Initialization Sequence Completed
- Mon Dec 20 21:08:54 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1179 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:08:54 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:08:54 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:08:54 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:08:54 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:08:59 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:08:59 2010 Re-using SSL/TLS context
- Mon Dec 20 21:08:59 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:08:59 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:08:59 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:08:59 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:08:59 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:09:00 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:09:00 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:09:00 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:09:00 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:09:00 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:09:00 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=b09579a3 80d84909
- Mon Dec 20 21:09:01 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:09:01 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:09:01 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:09:03 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:09:03 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:09:03 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:09:03 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:09:03 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:09:03 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:09:05 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:09:06 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:09:06 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:09:06 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:09:06 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:09:06 2010 Initialization Sequence Completed
- Mon Dec 20 21:09:38 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #735 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:09:38 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:09:38 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:09:38 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:09:38 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:09:43 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:09:43 2010 Re-using SSL/TLS context
- Mon Dec 20 21:09:43 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:09:43 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:09:43 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:09:43 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:09:43 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:09:44 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:09:44 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:09:44 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:09:44 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:09:44 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:09:44 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=3ed5a2a7 9e471ee9
- Mon Dec 20 21:09:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:09:45 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:09:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:09:47 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:09:47 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:09:47 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:09:47 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:09:47 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:09:47 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:09:49 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:09:50 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:09:50 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:09:50 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:09:50 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:09:50 2010 Initialization Sequence Completed
- Mon Dec 20 21:10:09 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #778 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:10:09 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:10:09 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:10:09 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:10:09 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:10:14 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:10:14 2010 Re-using SSL/TLS context
- Mon Dec 20 21:10:14 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:10:14 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:10:14 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:10:14 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:10:14 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:10:15 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:10:15 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:10:15 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:10:15 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:10:15 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:10:16 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c3547c3b 5d33f280
- Mon Dec 20 21:10:17 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:10:17 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:10:17 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:10:20 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:10:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:10:20 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:10:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:10:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:10:20 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:10:22 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:10:22 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:10:22 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:10:22 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:10:22 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:10:22 2010 Initialization Sequence Completed
- Mon Dec 20 21:10:45 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #894 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:10:45 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:10:45 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:10:45 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:10:45 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:10:50 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:10:50 2010 Re-using SSL/TLS context
- Mon Dec 20 21:10:50 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:10:50 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:10:50 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:10:50 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:10:50 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:10:51 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:10:51 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:10:51 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:10:51 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:10:51 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:10:51 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=0084647f abc79c59
- Mon Dec 20 21:10:52 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:10:52 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:10:52 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:10:55 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:10:55 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:10:55 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:10:55 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:10:55 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:10:55 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:10:58 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:10:58 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:10:58 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:10:58 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:10:58 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:10:58 2010 Initialization Sequence Completed
- Mon Dec 20 21:11:28 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #940 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:11:28 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:11:28 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:11:28 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:11:28 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:11:33 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:11:33 2010 Re-using SSL/TLS context
- Mon Dec 20 21:11:33 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:11:33 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:11:33 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:11:33 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:11:33 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:11:34 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:11:34 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:11:34 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:11:34 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:11:34 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:11:34 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=2dbd1a87 9625bfe1
- Mon Dec 20 21:11:35 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:11:35 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:11:35 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:11:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:11:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:11:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:11:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:11:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:11:37 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:11:40 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:11:40 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:11:40 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:11:40 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:11:40 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:11:40 2010 Initialization Sequence Completed
- Mon Dec 20 21:11:51 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #625 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:11:51 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:11:51 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:11:51 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:11:51 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:11:56 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:11:56 2010 Re-using SSL/TLS context
- Mon Dec 20 21:11:56 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:11:56 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:11:56 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:11:56 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:11:56 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:11:57 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:11:57 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:11:57 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:11:57 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:11:57 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:11:57 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=acd2eb87 f9ed897f
- Mon Dec 20 21:11:58 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:11:58 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:11:58 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:12:01 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:12:01 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:12:01 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:12:01 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:12:01 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:12:01 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:12:03 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:12:03 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:12:03 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:12:03 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:12:03 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:12:03 2010 Initialization Sequence Completed
- Mon Dec 20 21:12:27 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #824 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:12:27 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:12:27 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:12:27 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:12:27 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:12:32 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:12:32 2010 Re-using SSL/TLS context
- Mon Dec 20 21:12:32 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:12:32 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:12:32 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:12:32 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:12:32 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:12:33 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:12:33 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:12:33 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:12:33 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:12:33 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:12:33 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d6e7cf62 cecf4c4c
- Mon Dec 20 21:12:34 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:12:34 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:12:34 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:12:37 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:12:37 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:12:37 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:12:37 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:12:37 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:12:37 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:12:39 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:12:39 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:12:39 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:12:39 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:12:39 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:12:39 2010 Initialization Sequence Completed
- Mon Dec 20 21:13:23 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1151 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:13:23 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:13:23 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:13:23 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:13:23 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:13:28 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:13:28 2010 Re-using SSL/TLS context
- Mon Dec 20 21:13:28 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:13:28 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:13:28 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:13:28 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:13:28 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:13:29 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:13:29 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:13:29 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:13:29 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:13:29 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:13:29 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=d9d3b91d b27f05b6
- Mon Dec 20 21:13:30 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:13:30 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:13:30 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:13:33 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:13:33 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:13:33 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:13:33 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:13:33 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:13:33 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:13:35 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:13:35 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:13:35 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:13:35 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:13:35 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:13:35 2010 Initialization Sequence Completed
- Mon Dec 20 21:15:14 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1635 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:15:14 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:15:14 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:15:14 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:15:14 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:15:19 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:15:19 2010 Re-using SSL/TLS context
- Mon Dec 20 21:15:19 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:15:19 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:15:19 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:15:19 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:15:19 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:15:20 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:15:20 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:15:20 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:15:20 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:15:20 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:15:21 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=91681e60 31299f5e
- Mon Dec 20 21:15:22 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:15:22 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:15:22 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:15:26 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:15:26 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:15:26 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:15:26 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:15:26 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:15:26 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:15:28 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:15:28 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:15:28 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:15:28 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:15:28 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:15:28 2010 Initialization Sequence Completed
- Mon Dec 20 21:16:05 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1670 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:16:05 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:16:05 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:16:05 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:16:05 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:16:10 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:16:10 2010 Re-using SSL/TLS context
- Mon Dec 20 21:16:10 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:16:10 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:16:10 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:16:10 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:16:10 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:16:11 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:16:11 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:16:11 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:16:11 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:16:11 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:16:12 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=eba14d33 a1b06044
- Mon Dec 20 21:16:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:16:13 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:16:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:16:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:16:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:16:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:16:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:16:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:16:15 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:16:17 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:16:18 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:16:18 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:16:18 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:16:18 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:16:18 2010 Initialization Sequence Completed
- Mon Dec 20 21:16:36 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #670 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:16:36 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:16:36 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:16:36 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:16:36 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:16:41 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:16:41 2010 Re-using SSL/TLS context
- Mon Dec 20 21:16:41 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:16:41 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:16:41 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:16:41 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:16:41 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:16:42 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:16:42 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:16:42 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:16:42 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:16:42 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:16:42 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=24f14207 215de578
- Mon Dec 20 21:16:43 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:16:43 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:16:43 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:16:45 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:16:45 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:16:45 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:16:45 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:16:45 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:16:45 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:16:47 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:16:47 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:16:47 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:16:47 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:16:47 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:16:47 2010 Initialization Sequence Completed
- Mon Dec 20 21:17:23 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1788 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:17:23 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:17:23 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:17:23 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:17:23 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:17:28 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:17:28 2010 Re-using SSL/TLS context
- Mon Dec 20 21:17:28 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:17:28 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:17:28 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:17:28 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:17:28 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:17:29 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:17:29 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:17:29 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:17:29 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:17:29 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:17:29 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=1027edfd 4aa61cf8
- Mon Dec 20 21:17:30 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:17:30 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:17:30 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:17:32 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:17:32 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:17:32 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:17:32 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:17:32 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:17:32 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:17:34 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:17:34 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:17:34 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:17:34 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:17:34 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:17:34 2010 Initialization Sequence Completed
- Mon Dec 20 21:17:43 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1529 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:17:43 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:17:43 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:17:43 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:17:43 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:17:48 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:17:48 2010 Re-using SSL/TLS context
- Mon Dec 20 21:17:48 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:17:48 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:17:48 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:17:48 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:17:48 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:17:49 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:17:49 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:17:49 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:17:49 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:17:49 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:17:49 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=c878a7a4 7310ec97
- Mon Dec 20 21:17:50 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:17:50 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:17:50 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:17:53 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:17:53 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:17:53 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:17:53 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:17:53 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:17:53 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:17:55 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:17:55 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:17:55 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:17:55 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:17:55 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:17:55 2010 Initialization Sequence Completed
- Mon Dec 20 21:18:32 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1246 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:18:32 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:18:32 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:18:32 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:18:32 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:18:37 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:18:37 2010 Re-using SSL/TLS context
- Mon Dec 20 21:18:37 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:18:37 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:18:37 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:18:37 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:18:37 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:18:38 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:18:38 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:18:38 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:18:38 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:18:38 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:18:38 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=b5f7073e 91a66487
- Mon Dec 20 21:18:39 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:18:39 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:18:39 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:18:41 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:18:41 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:18:41 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:18:41 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:18:41 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:18:41 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:18:43 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:18:44 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:18:44 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:18:44 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:18:44 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:18:44 2010 Initialization Sequence Completed
- Mon Dec 20 21:20:06 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1837 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:20:06 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:20:06 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:20:06 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:20:06 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:20:11 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:20:11 2010 Re-using SSL/TLS context
- Mon Dec 20 21:20:11 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:20:11 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:20:11 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:20:11 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:20:11 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:20:12 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:20:12 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:20:12 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:20:12 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:20:12 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:20:12 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=743cc414 650b4189
- Mon Dec 20 21:20:13 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:20:13 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:20:13 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:20:15 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:20:15 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:20:15 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:20:15 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:20:15 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:20:15 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:20:17 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:20:17 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:20:17 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:20:17 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:20:17 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:20:17 2010 Initialization Sequence Completed
- Mon Dec 20 21:21:41 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #1564 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:21:41 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:21:41 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:21:41 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:21:41 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:21:46 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:21:46 2010 Re-using SSL/TLS context
- Mon Dec 20 21:21:46 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:21:46 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:21:46 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:21:46 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:21:46 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:21:47 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:21:47 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:21:47 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:21:47 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:21:47 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:21:47 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=6b5b836d 0f2934bc
- Mon Dec 20 21:21:48 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:21:48 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:21:48 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:21:50 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:21:50 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:21:50 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:21:50 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:21:50 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:21:50 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:21:52 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:21:52 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:21:52 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:21:52 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:21:52 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:21:52 2010 Initialization Sequence Completed
- Mon Dec 20 21:22:26 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #997 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:22:26 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:22:26 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:22:26 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:22:26 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:22:31 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:22:31 2010 Re-using SSL/TLS context
- Mon Dec 20 21:22:31 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:22:31 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:22:31 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:22:31 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:22:31 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:22:32 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:22:32 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:22:32 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:22:32 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:22:32 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:22:32 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=a79cd6d5 4acaf11d
- Mon Dec 20 21:22:33 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:22:33 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:22:33 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:22:35 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:22:35 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:22:35 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:22:35 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:22:35 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:22:35 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:22:38 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:22:38 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:22:38 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:22:38 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:22:38 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:22:38 2010 Initialization Sequence Completed
- Mon Dec 20 21:23:02 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #849 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:23:02 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:23:02 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:23:02 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:23:02 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:23:07 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:23:07 2010 Re-using SSL/TLS context
- Mon Dec 20 21:23:07 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:23:07 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:23:07 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:23:07 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:23:07 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:23:08 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:23:08 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:23:08 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:23:08 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:23:08 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:23:08 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=68453f38 0a44fdab
- Mon Dec 20 21:23:09 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:23:09 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:23:09 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:23:12 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:23:12 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:23:12 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:23:12 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:23:12 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:23:12 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:23:14 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:23:14 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:23:14 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:23:14 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:23:14 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:23:14 2010 Initialization Sequence Completed
- Mon Dec 20 21:24:38 2010 Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #3272 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Mon Dec 20 21:24:38 2010 Fatal decryption error (process_incoming_link), restarting
- Mon Dec 20 21:24:38 2010 TCP/UDP: Closing socket
- Mon Dec 20 21:24:38 2010 SIGUSR1[soft,decryption-error] received, process restarting
- Mon Dec 20 21:24:38 2010 Restart pause, 5 second(s)
- Mon Dec 20 21:24:43 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Mon Dec 20 21:24:43 2010 Re-using SSL/TLS context
- Mon Dec 20 21:24:43 2010 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Mon Dec 20 21:24:43 2010 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
- Mon Dec 20 21:24:43 2010 Local Options hash (VER=V4): 'bf6006bf'
- Mon Dec 20 21:24:43 2010 Expected Remote Options hash (VER=V4): '3ce6ab7f'
- Mon Dec 20 21:24:43 2010 Attempting to establish TCP connection with [AF_INET]93.190.142.152:54111 [nonblock]
- Mon Dec 20 21:24:44 2010 TCP connection established with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:24:44 2010 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Mon Dec 20 21:24:44 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:24:44 2010 TCPv4_CLIENT link local: [undef]
- Mon Dec 20 21:24:44 2010 TCPv4_CLIENT link remote: [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:24:44 2010 TLS: Initial packet from [AF_INET]93.190.142.152:54111, sid=09b39027 a5ae3b78
- Mon Dec 20 21:24:45 2010 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York/O=example.com/CN=example.com_CA/emailAddress=admin@example.com
- Mon Dec 20 21:24:45 2010 VERIFY OK: nsCertType=SERVER
- Mon Dec 20 21:24:45 2010 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York/O=example.com/CN=server/emailAddress=admin@example.com
- Mon Dec 20 21:24:47 2010 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:24:47 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:24:47 2010 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 256 bit key
- Mon Dec 20 21:24:47 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Dec 20 21:24:47 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Dec 20 21:24:47 2010 [server] Peer Connection Initiated with [AF_INET]93.190.142.152:54111
- Mon Dec 20 21:24:49 2010 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Dec 20 21:24:49 2010 PUSH: Received control message: 'PUSH_REPLY,route 10.100.1.0 255.255.255.0,redirect-gateway,dhcp-option DNS 10.100.1.1,route-gateway 10.100.1.1,topology subnet,ping 120,ping-restart 360,socket-flags TCP_NODELAY,ifconfig 10.100.1.171 255.255.255.0'
- Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: --socket-flags option modified
- Mon Dec 20 21:24:49 2010 Socket flags: TCP_NODELAY=1 succeeded
- Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: route options modified
- Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: route-related options modified
- Mon Dec 20 21:24:49 2010 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Dec 20 21:24:49 2010 Preserving previous TUN/TAP instance: tun0
- Mon Dec 20 21:24:49 2010 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement