Advertisement
MastroPino

Untitled

Oct 3rd, 2022
90
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 99.85 KB | None | 0 0
  1. App: Passepartout 2.0.0 (3340)
  2. OS: iPadOS 15.7
  3. Device: iPad (UIUserInterfaceIdiom(rawValue: 1))
  4.  
  5. : <masked>
  6. 09:23:08 - Current SSID: none (disconnected from WiFi)
  7. 09:23:08 - DNS resolved addresses: <masked>
  8. 09:23:08 - Unrolled endpoints: <masked>
  9. 09:23:08 - Pick current endpoint: <masked>
  10. 09:23:08 - Will connect to <masked>:1194
  11. 09:23:08 - Socket type is NEUDPSocket
  12. 09:23:08 - Socket state is ready (endpoint: <masked> -> <masked>)
  13. 09:23:08 - Starting VPN session
  14. 09:23:08 - Send hard reset
  15. 09:23:08 - Negotiation key index is 0
  16. 09:23:08 - Control: Enqueued 1 packet [0]
  17. 09:23:08 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 3975a3ea7486aef3, pid: 0, [0 bytes]}
  18. 09:23:08 - Send control packet (14 bytes): 383975a3ea7486aef30000000000
  19. 09:23:08 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  20. 09:23:08 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: bfc99ca287e7698a, acks: {[0], 3975a3ea7486aef3}, pid: 0}
  21. 09:23:08 - Send ack for received packetId 0
  22. 09:23:08 - Control: Write ack packet {ACK_V1 | 0, sid: 3975a3ea7486aef3, acks: {[0], bfc99ca287e7698a}}
  23. 09:23:08 - Control: Remote sessionId is bfc99ca287e7698a
  24. 09:23:08 - Start TLS handshake
  25. 09:23:08 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  26. 09:23:08 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  27. 09:23:08 - Ack successfully written to LINK for packetId 0
  28. 09:23:08 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  29. 09:23:08 - Cleaning up...
  30. 09:23:08 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  31. 09:23:08 - Flushing log...
  32. 09:23:08 - Ignoring read from outdated LINK
  33. 09:23:08 - Cleaning up...
  34. 09:23:08 -
  35. 09:23:08 - --- EOF ---
  36. 09:23:08 -
  37. 09:23:08 - Starting tunnel...
  38. 09:23:08 - App version: Passepartout 2.0.0 (3340)
  39. 09:23:08 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  40. 09:23:08 - Cipher: AES-128-CBC
  41. 09:23:08 - Digest: HMAC-SHA1
  42. 09:23:08 - Compression framing: comp-lzo
  43. 09:23:08 - Username authentication: false
  44. 09:23:08 - Compression algorithm: lzo
  45. 09:23:08 - Client verification: enabled
  46. 09:23:08 - TLS wrapping: disabled
  47. 09:23:08 - TLS security level: 0
  48. 09:23:08 - Keep-alive interval: 10s
  49. 09:23:08 - Keep-alive timeout: 1m
  50. 09:23:08 - Renegotiation: never
  51. 09:23:08 - Server EKU verification: disabled
  52. 09:23:08 - Host SAN verification: disabled
  53. 09:23:08 - Gateway: not configured
  54. 09:23:08 - DNS: not configured
  55. 09:23:08 - MTU: default
  56. 09:23:08 - Debug: true
  57. 09:23:08 - Masks private data: true
  58. 09:23:08 - Creating link session
  59. 09:23:08 - No resolved endpoints, will resort to DNS resolution
  60. 09:23:08 - DNS resolve address: <masked>
  61. 09:23:08 - Current SSID: none (disconnected from WiFi)
  62. 09:23:08 - DNS resolved addresses: <masked>
  63. 09:23:08 - Unrolled endpoints: <masked>
  64. 09:23:08 - Pick current endpoint: <masked>
  65. 09:23:08 - Will connect to <masked>:1194
  66. 09:23:08 - Socket type is NEUDPSocket
  67. 09:23:08 - Socket state is ready (endpoint: <masked> -> <masked>)
  68. 09:23:08 - Starting VPN session
  69. 09:23:08 - Send hard reset
  70. 09:23:08 - Negotiation key index is 0
  71. 09:23:08 - Control: Enqueued 1 packet [0]
  72. 09:23:08 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 88b880a2b2a06664, pid: 0, [0 bytes]}
  73. 09:23:08 - Send control packet (14 bytes): 3888b880a2b2a066640000000000
  74. 09:23:08 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  75. 09:23:08 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 7eeaba882a8b94f8, acks: {[0], 88b880a2b2a06664}, pid: 0}
  76. 09:23:08 - Send ack for received packetId 0
  77. 09:23:08 - Control: Write ack packet {ACK_V1 | 0, sid: 88b880a2b2a06664, acks: {[0], 7eeaba882a8b94f8}}
  78. 09:23:08 - Control: Remote sessionId is 7eeaba882a8b94f8
  79. 09:23:08 - Start TLS handshake
  80. 09:23:08 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  81. 09:23:08 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  82. 09:23:08 - Ack successfully written to LINK for packetId 0
  83. 09:23:08 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  84. 09:23:08 - Cleaning up...
  85. 09:23:08 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  86. 09:23:08 - Flushing log...
  87. 09:23:08 - Ignoring read from outdated LINK
  88. 09:23:08 - Cleaning up...
  89. 09:23:09 -
  90. 09:23:09 - --- EOF ---
  91. 09:23:09 -
  92. 09:23:09 - Starting tunnel...
  93. 09:23:09 - App version: Passepartout 2.0.0 (3340)
  94. 09:23:09 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  95. 09:23:09 - Cipher: AES-128-CBC
  96. 09:23:09 - Digest: HMAC-SHA1
  97. 09:23:09 - Compression framing: comp-lzo
  98. 09:23:09 - Username authentication: false
  99. 09:23:09 - Compression algorithm: lzo
  100. 09:23:09 - Client verification: enabled
  101. 09:23:09 - TLS wrapping: disabled
  102. 09:23:09 - TLS security level: 0
  103. 09:23:09 - Keep-alive interval: 10s
  104. 09:23:09 - Keep-alive timeout: 1m
  105. 09:23:09 - Renegotiation: never
  106. 09:23:09 - Server EKU verification: disabled
  107. 09:23:09 - Host SAN verification: disabled
  108. 09:23:09 - Gateway: not configured
  109. 09:23:09 - DNS: not configured
  110. 09:23:09 - MTU: default
  111. 09:23:09 - Debug: true
  112. 09:23:09 - Masks private data: true
  113. 09:23:09 - Creating link session
  114. 09:23:09 - No resolved endpoints, will resort to DNS resolution
  115. 09:23:09 - DNS resolve address: <masked>
  116. 09:23:09 - Current SSID: none (disconnected from WiFi)
  117. 09:23:09 - DNS resolved addresses: <masked>
  118. 09:23:09 - Unrolled endpoints: <masked>
  119. 09:23:09 - Pick current endpoint: <masked>
  120. 09:23:09 - Will connect to <masked>:1194
  121. 09:23:09 - Socket type is NEUDPSocket
  122. 09:23:09 - Socket state is ready (endpoint: <masked> -> <masked>)
  123. 09:23:09 - Starting VPN session
  124. 09:23:09 - Send hard reset
  125. 09:23:09 - Negotiation key index is 0
  126. 09:23:09 - Control: Enqueued 1 packet [0]
  127. 09:23:09 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 227366690d228446, pid: 0, [0 bytes]}
  128. 09:23:09 - Send control packet (14 bytes): 38227366690d2284460000000000
  129. 09:23:09 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  130. 09:23:09 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 95467508ba753a99, acks: {[0], 227366690d228446}, pid: 0}
  131. 09:23:09 - Send ack for received packetId 0
  132. 09:23:09 - Control: Write ack packet {ACK_V1 | 0, sid: 227366690d228446, acks: {[0], 95467508ba753a99}}
  133. 09:23:09 - Control: Remote sessionId is 95467508ba753a99
  134. 09:23:09 - Start TLS handshake
  135. 09:23:09 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  136. 09:23:09 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  137. 09:23:09 - Ack successfully written to LINK for packetId 0
  138. 09:23:09 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  139. 09:23:09 - Cleaning up...
  140. 09:23:09 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  141. 09:23:09 - Flushing log...
  142. 09:23:09 - Ignoring read from outdated LINK
  143. 09:23:09 - Cleaning up...
  144. 09:23:09 -
  145. 09:23:09 - --- EOF ---
  146. 09:23:09 -
  147. 09:23:09 - Starting tunnel...
  148. 09:23:09 - App version: Passepartout 2.0.0 (3340)
  149. 09:23:09 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  150. 09:23:09 - Cipher: AES-128-CBC
  151. 09:23:09 - Digest: HMAC-SHA1
  152. 09:23:09 - Compression framing: comp-lzo
  153. 09:23:09 - Username authentication: false
  154. 09:23:09 - Compression algorithm: lzo
  155. 09:23:09 - Client verification: enabled
  156. 09:23:09 - TLS wrapping: disabled
  157. 09:23:09 - TLS security level: 0
  158. 09:23:09 - Keep-alive interval: 10s
  159. 09:23:09 - Keep-alive timeout: 1m
  160. 09:23:09 - Renegotiation: never
  161. 09:23:09 - Server EKU verification: disabled
  162. 09:23:09 - Host SAN verification: disabled
  163. 09:23:09 - Gateway: not configured
  164. 09:23:09 - DNS: not configured
  165. 09:23:09 - MTU: default
  166. 09:23:09 - Debug: true
  167. 09:23:09 - Masks private data: true
  168. 09:23:09 - Creating link session
  169. 09:23:09 - No resolved endpoints, will resort to DNS resolution
  170. 09:23:09 - DNS resolve address: <masked>
  171. 09:23:09 - Current SSID: none (disconnected from WiFi)
  172. 09:23:09 - DNS resolved addresses: <masked>
  173. 09:23:09 - Unrolled endpoints: <masked>
  174. 09:23:09 - Pick current endpoint: <masked>
  175. 09:23:09 - Will connect to <masked>:1194
  176. 09:23:09 - Socket type is NEUDPSocket
  177. 09:23:09 - Socket state is ready (endpoint: <masked> -> <masked>)
  178. 09:23:09 - Starting VPN session
  179. 09:23:09 - Send hard reset
  180. 09:23:09 - Negotiation key index is 0
  181. 09:23:09 - Control: Enqueued 1 packet [0]
  182. 09:23:09 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: c25704af0f4132d3, pid: 0, [0 bytes]}
  183. 09:23:09 - Send control packet (14 bytes): 38c25704af0f4132d30000000000
  184. 09:23:09 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  185. 09:23:09 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: adb7ea2ab440c7f2, acks: {[0], c25704af0f4132d3}, pid: 0}
  186. 09:23:09 - Send ack for received packetId 0
  187. 09:23:09 - Control: Write ack packet {ACK_V1 | 0, sid: c25704af0f4132d3, acks: {[0], adb7ea2ab440c7f2}}
  188. 09:23:09 - Control: Remote sessionId is adb7ea2ab440c7f2
  189. 09:23:09 - Start TLS handshake
  190. 09:23:09 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  191. 09:23:09 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  192. 09:23:09 - Ack successfully written to LINK for packetId 0
  193. 09:23:09 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  194. 09:23:09 - Cleaning up...
  195. 09:23:09 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  196. 09:23:09 - Flushing log...
  197. 09:23:09 - Ignoring read from outdated LINK
  198. 09:23:09 - Cleaning up...
  199. 09:23:10 -
  200. 09:23:10 - --- EOF ---
  201. 09:23:10 -
  202. 09:23:10 - Starting tunnel...
  203. 09:23:10 - App version: Passepartout 2.0.0 (3340)
  204. 09:23:10 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  205. 09:23:10 - Cipher: AES-128-CBC
  206. 09:23:10 - Digest: HMAC-SHA1
  207. 09:23:10 - Compression framing: comp-lzo
  208. 09:23:10 - Username authentication: false
  209. 09:23:10 - Compression algorithm: lzo
  210. 09:23:10 - Client verification: enabled
  211. 09:23:10 - TLS wrapping: disabled
  212. 09:23:10 - TLS security level: 0
  213. 09:23:10 - Keep-alive interval: 10s
  214. 09:23:10 - Keep-alive timeout: 1m
  215. 09:23:10 - Renegotiation: never
  216. 09:23:10 - Server EKU verification: disabled
  217. 09:23:10 - Host SAN verification: disabled
  218. 09:23:10 - Gateway: not configured
  219. 09:23:10 - DNS: not configured
  220. 09:23:10 - MTU: default
  221. 09:23:10 - Debug: true
  222. 09:23:10 - Masks private data: true
  223. 09:23:10 - Creating link session
  224. 09:23:10 - No resolved endpoints, will resort to DNS resolution
  225. 09:23:10 - DNS resolve address: <masked>
  226. 09:23:10 - DNS resolved addresses: <masked>
  227. 09:23:10 - Current SSID: none (disconnected from WiFi)
  228. 09:23:10 - Unrolled endpoints: <masked>
  229. 09:23:10 - Pick current endpoint: <masked>
  230. 09:23:10 - Will connect to <masked>:1194
  231. 09:23:10 - Socket type is NEUDPSocket
  232. 09:23:10 - Socket state is ready (endpoint: <masked> -> <masked>)
  233. 09:23:10 - Starting VPN session
  234. 09:23:10 - Send hard reset
  235. 09:23:10 - Negotiation key index is 0
  236. 09:23:10 - Control: Enqueued 1 packet [0]
  237. 09:23:10 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 942cd788b1d7a791, pid: 0, [0 bytes]}
  238. 09:23:10 - Send control packet (14 bytes): 38942cd788b1d7a7910000000000
  239. 09:23:10 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  240. 09:23:10 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 84883ac544f921a5, acks: {[0], 942cd788b1d7a791}, pid: 0}
  241. 09:23:10 - Send ack for received packetId 0
  242. 09:23:10 - Control: Write ack packet {ACK_V1 | 0, sid: 942cd788b1d7a791, acks: {[0], 84883ac544f921a5}}
  243. 09:23:10 - Control: Remote sessionId is 84883ac544f921a5
  244. 09:23:10 - Start TLS handshake
  245. 09:23:10 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  246. 09:23:10 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  247. 09:23:10 - Ack successfully written to LINK for packetId 0
  248. 09:23:10 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  249. 09:23:10 - Cleaning up...
  250. 09:23:10 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  251. 09:23:10 - Flushing log...
  252. 09:23:10 - Ignoring read from outdated LINK
  253. 09:23:10 - Cleaning up...
  254. 09:23:10 -
  255. 09:23:10 - --- EOF ---
  256. 09:23:10 -
  257. 09:23:10 - Starting tunnel...
  258. 09:23:10 - App version: Passepartout 2.0.0 (3340)
  259. 09:23:10 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  260. 09:23:10 - Cipher: AES-128-CBC
  261. 09:23:10 - Digest: HMAC-SHA1
  262. 09:23:10 - Compression framing: comp-lzo
  263. 09:23:10 - Username authentication: false
  264. 09:23:10 - Compression algorithm: lzo
  265. 09:23:10 - Client verification: enabled
  266. 09:23:10 - TLS wrapping: disabled
  267. 09:23:10 - TLS security level: 0
  268. 09:23:10 - Keep-alive interval: 10s
  269. 09:23:10 - Keep-alive timeout: 1m
  270. 09:23:10 - Renegotiation: never
  271. 09:23:10 - Server EKU verification: disabled
  272. 09:23:10 - Host SAN verification: disabled
  273. 09:23:10 - Gateway: not configured
  274. 09:23:10 - DNS: not configured
  275. 09:23:10 - MTU: default
  276. 09:23:10 - Debug: true
  277. 09:23:10 - Masks private data: true
  278. 09:23:10 - Creating link session
  279. 09:23:10 - No resolved endpoints, will resort to DNS resolution
  280. 09:23:10 - DNS resolve address: <masked>
  281. 09:23:10 - Current SSID: none (disconnected from WiFi)
  282. 09:23:10 - DNS resolved addresses: <masked>
  283. 09:23:10 - Unrolled endpoints: <masked>
  284. 09:23:10 - Pick current endpoint: <masked>
  285. 09:23:10 - Will connect to <masked>:1194
  286. 09:23:10 - Socket type is NEUDPSocket
  287. 09:23:10 - Socket state is ready (endpoint: <masked> -> <masked>)
  288. 09:23:10 - Starting VPN session
  289. 09:23:10 - Send hard reset
  290. 09:23:10 - Negotiation key index is 0
  291. 09:23:10 - Control: Enqueued 1 packet [0]
  292. 09:23:10 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 57aaee6bfe2286ac, pid: 0, [0 bytes]}
  293. 09:23:10 - Send control packet (14 bytes): 3857aaee6bfe2286ac0000000000
  294. 09:23:10 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  295. 09:23:10 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 3c66a88b2691683e, acks: {[0], 57aaee6bfe2286ac}, pid: 0}
  296. 09:23:10 - Send ack for received packetId 0
  297. 09:23:10 - Control: Write ack packet {ACK_V1 | 0, sid: 57aaee6bfe2286ac, acks: {[0], 3c66a88b2691683e}}
  298. 09:23:10 - Control: Remote sessionId is 3c66a88b2691683e
  299. 09:23:10 - Start TLS handshake
  300. 09:23:10 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  301. 09:23:10 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  302. 09:23:10 - Ack successfully written to LINK for packetId 0
  303. 09:23:10 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  304. 09:23:10 - Cleaning up...
  305. 09:23:10 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  306. 09:23:10 - Flushing log...
  307. 09:23:10 - Ignoring read from outdated LINK
  308. 09:23:10 - Cleaning up...
  309. 09:23:11 -
  310. 09:23:11 - --- EOF ---
  311. 09:23:11 -
  312. 09:23:11 - Starting tunnel...
  313. 09:23:11 - App version: Passepartout 2.0.0 (3340)
  314. 09:23:11 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  315. 09:23:11 - Cipher: AES-128-CBC
  316. 09:23:11 - Digest: HMAC-SHA1
  317. 09:23:11 - Compression framing: comp-lzo
  318. 09:23:11 - Username authentication: false
  319. 09:23:11 - Compression algorithm: lzo
  320. 09:23:11 - Client verification: enabled
  321. 09:23:11 - TLS wrapping: disabled
  322. 09:23:11 - TLS security level: 0
  323. 09:23:11 - Keep-alive interval: 10s
  324. 09:23:11 - Keep-alive timeout: 1m
  325. 09:23:11 - Renegotiation: never
  326. 09:23:11 - Server EKU verification: disabled
  327. 09:23:11 - Host SAN verification: disabled
  328. 09:23:11 - Gateway: not configured
  329. 09:23:11 - DNS: not configured
  330. 09:23:11 - MTU: default
  331. 09:23:11 - Debug: true
  332. 09:23:11 - Masks private data: true
  333. 09:23:11 - Creating link session
  334. 09:23:11 - No resolved endpoints, will resort to DNS resolution
  335. 09:23:11 - DNS resolve address: <masked>
  336. 09:23:11 - Current SSID: none (disconnected from WiFi)
  337. 09:23:11 - DNS resolved addresses: <masked>
  338. 09:23:11 - Unrolled endpoints: <masked>
  339. 09:23:11 - Pick current endpoint: <masked>
  340. 09:23:11 - Will connect to <masked>:1194
  341. 09:23:11 - Socket type is NEUDPSocket
  342. 09:23:11 - Socket state is ready (endpoint: <masked> -> <masked>)
  343. 09:23:11 - Starting VPN session
  344. 09:23:11 - Send hard reset
  345. 09:23:11 - Negotiation key index is 0
  346. 09:23:11 - Control: Enqueued 1 packet [0]
  347. 09:23:11 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: cae632fd53a14b46, pid: 0, [0 bytes]}
  348. 09:23:11 - Send control packet (14 bytes): 38cae632fd53a14b460000000000
  349. 09:23:11 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  350. 09:23:11 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 6751c41197ef9b84, acks: {[0], cae632fd53a14b46}, pid: 0}
  351. 09:23:11 - Send ack for received packetId 0
  352. 09:23:11 - Control: Write ack packet {ACK_V1 | 0, sid: cae632fd53a14b46, acks: {[0], 6751c41197ef9b84}}
  353. 09:23:11 - Control: Remote sessionId is 6751c41197ef9b84
  354. 09:23:11 - Start TLS handshake
  355. 09:23:11 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  356. 09:23:11 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  357. 09:23:11 - Ack successfully written to LINK for packetId 0
  358. 09:23:11 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  359. 09:23:11 - Cleaning up...
  360. 09:23:11 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  361. 09:23:11 - Flushing log...
  362. 09:23:11 - Ignoring read from outdated LINK
  363. 09:23:11 - Cleaning up...
  364. 09:23:11 -
  365. 09:23:11 - --- EOF ---
  366. 09:23:11 -
  367. 09:23:11 - Starting tunnel...
  368. 09:23:11 - App version: Passepartout 2.0.0 (3340)
  369. 09:23:11 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  370. 09:23:11 - Cipher: AES-128-CBC
  371. 09:23:11 - Digest: HMAC-SHA1
  372. 09:23:11 - Compression framing: comp-lzo
  373. 09:23:11 - Username authentication: false
  374. 09:23:11 - Compression algorithm: lzo
  375. 09:23:11 - Client verification: enabled
  376. 09:23:11 - TLS wrapping: disabled
  377. 09:23:11 - TLS security level: 0
  378. 09:23:11 - Keep-alive interval: 10s
  379. 09:23:11 - Keep-alive timeout: 1m
  380. 09:23:11 - Renegotiation: never
  381. 09:23:11 - Server EKU verification: disabled
  382. 09:23:11 - Host SAN verification: disabled
  383. 09:23:11 - Gateway: not configured
  384. 09:23:11 - DNS: not configured
  385. 09:23:11 - MTU: default
  386. 09:23:11 - Debug: true
  387. 09:23:11 - Masks private data: true
  388. 09:23:11 - Creating link session
  389. 09:23:11 - No resolved endpoints, will resort to DNS resolution
  390. 09:23:11 - DNS resolve address: <masked>
  391. 09:23:11 - Current SSID: none (disconnected from WiFi)
  392. 09:23:11 - DNS resolved addresses: <masked>
  393. 09:23:11 - Unrolled endpoints: <masked>
  394. 09:23:11 - Pick current endpoint: <masked>
  395. 09:23:11 - Will connect to <masked>:1194
  396. 09:23:11 - Socket type is NEUDPSocket
  397. 09:23:11 - Socket state is ready (endpoint: <masked> -> <masked>)
  398. 09:23:11 - Starting VPN session
  399. 09:23:11 - Send hard reset
  400. 09:23:11 - Negotiation key index is 0
  401. 09:23:11 - Control: Enqueued 1 packet [0]
  402. 09:23:11 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 80c466c0ad077632, pid: 0, [0 bytes]}
  403. 09:23:11 - Send control packet (14 bytes): 3880c466c0ad0776320000000000
  404. 09:23:11 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  405. 09:23:11 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 02728e419af2841b, acks: {[0], 80c466c0ad077632}, pid: 0}
  406. 09:23:11 - Send ack for received packetId 0
  407. 09:23:11 - Control: Write ack packet {ACK_V1 | 0, sid: 80c466c0ad077632, acks: {[0], 02728e419af2841b}}
  408. 09:23:11 - Control: Remote sessionId is 02728e419af2841b
  409. 09:23:11 - Start TLS handshake
  410. 09:23:11 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  411. 09:23:11 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  412. 09:23:11 - Ack successfully written to LINK for packetId 0
  413. 09:23:11 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  414. 09:23:11 - Cleaning up...
  415. 09:23:11 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  416. 09:23:11 - Flushing log...
  417. 09:23:11 - Ignoring read from outdated LINK
  418. 09:23:11 - Cleaning up...
  419. 09:23:11 -
  420. 09:23:11 - --- EOF ---
  421. 09:23:11 -
  422. 09:23:11 - Starting tunnel...
  423. 09:23:11 - App version: Passepartout 2.0.0 (3340)
  424. 09:23:11 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  425. 09:23:11 - Cipher: AES-128-CBC
  426. 09:23:11 - Digest: HMAC-SHA1
  427. 09:23:11 - Compression framing: comp-lzo
  428. 09:23:11 - Username authentication: false
  429. 09:23:11 - Compression algorithm: lzo
  430. 09:23:11 - Client verification: enabled
  431. 09:23:11 - TLS wrapping: disabled
  432. 09:23:11 - TLS security level: 0
  433. 09:23:11 - Keep-alive interval: 10s
  434. 09:23:11 - Keep-alive timeout: 1m
  435. 09:23:11 - Renegotiation: never
  436. 09:23:11 - Server EKU verification: disabled
  437. 09:23:11 - Host SAN verification: disabled
  438. 09:23:11 - Gateway: not configured
  439. 09:23:11 - DNS: not configured
  440. 09:23:11 - MTU: default
  441. 09:23:11 - Debug: true
  442. 09:23:11 - Masks private data: true
  443. 09:23:11 - Creating link session
  444. 09:23:11 - No resolved endpoints, will resort to DNS resolution
  445. 09:23:12 - DNS resolve address: <masked>
  446. 09:23:12 - Current SSID: none (disconnected from WiFi)
  447. 09:23:12 - DNS resolved addresses: <masked>
  448. 09:23:12 - Unrolled endpoints: <masked>
  449. 09:23:12 - Pick current endpoint: <masked>
  450. 09:23:12 - Will connect to <masked>:1194
  451. 09:23:12 - Socket type is NEUDPSocket
  452. 09:23:12 - Socket state is ready (endpoint: <masked> -> <masked>)
  453. 09:23:12 - Starting VPN session
  454. 09:23:12 - Send hard reset
  455. 09:23:12 - Negotiation key index is 0
  456. 09:23:12 - Control: Enqueued 1 packet [0]
  457. 09:23:12 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: f26fc122c24aba40, pid: 0, [0 bytes]}
  458. 09:23:12 - Send control packet (14 bytes): 38f26fc122c24aba400000000000
  459. 09:23:12 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  460. 09:23:12 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 00b934aab041a555, acks: {[0], f26fc122c24aba40}, pid: 0}
  461. 09:23:12 - Send ack for received packetId 0
  462. 09:23:12 - Control: Write ack packet {ACK_V1 | 0, sid: f26fc122c24aba40, acks: {[0], 00b934aab041a555}}
  463. 09:23:12 - Control: Remote sessionId is 00b934aab041a555
  464. 09:23:12 - Start TLS handshake
  465. 09:23:12 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  466. 09:23:12 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  467. 09:23:12 - Ack successfully written to LINK for packetId 0
  468. 09:23:12 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  469. 09:23:12 - Cleaning up...
  470. 09:23:12 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  471. 09:23:12 - Flushing log...
  472. 09:23:12 - Ignoring read from outdated LINK
  473. 09:23:12 - Cleaning up...
  474. 09:23:12 -
  475. 09:23:12 - --- EOF ---
  476. 09:23:12 -
  477. 09:23:12 - Starting tunnel...
  478. 09:23:12 - App version: Passepartout 2.0.0 (3340)
  479. 09:23:12 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  480. 09:23:12 - Cipher: AES-128-CBC
  481. 09:23:12 - Digest: HMAC-SHA1
  482. 09:23:12 - Compression framing: comp-lzo
  483. 09:23:12 - Username authentication: false
  484. 09:23:12 - Compression algorithm: lzo
  485. 09:23:12 - Client verification: enabled
  486. 09:23:12 - TLS wrapping: disabled
  487. 09:23:12 - TLS security level: 0
  488. 09:23:12 - Keep-alive interval: 10s
  489. 09:23:12 - Keep-alive timeout: 1m
  490. 09:23:12 - Renegotiation: never
  491. 09:23:12 - Server EKU verification: disabled
  492. 09:23:12 - Host SAN verification: disabled
  493. 09:23:12 - Gateway: not configured
  494. 09:23:12 - DNS: not configured
  495. 09:23:12 - MTU: default
  496. 09:23:12 - Debug: true
  497. 09:23:12 - Masks private data: true
  498. 09:23:12 - Creating link session
  499. 09:23:12 - No resolved endpoints, will resort to DNS resolution
  500. 09:23:12 - DNS resolve address: <masked>
  501. 09:23:12 - Current SSID: none (disconnected from WiFi)
  502. 09:23:12 - DNS resolved addresses: <masked>
  503. 09:23:12 - Unrolled endpoints: <masked>
  504. 09:23:12 - Pick current endpoint: <masked>
  505. 09:23:12 - Will connect to <masked>:1194
  506. 09:23:12 - Socket type is NEUDPSocket
  507. 09:23:12 - Socket state is ready (endpoint: <masked> -> <masked>)
  508. 09:23:12 - Starting VPN session
  509. 09:23:12 - Send hard reset
  510. 09:23:12 - Negotiation key index is 0
  511. 09:23:12 - Control: Enqueued 1 packet [0]
  512. 09:23:12 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 16e8ba5465a058d4, pid: 0, [0 bytes]}
  513. 09:23:12 - Send control packet (14 bytes): 3816e8ba5465a058d40000000000
  514. 09:23:12 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  515. 09:23:12 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 6adc17d5a57db5e8, acks: {[0], 16e8ba5465a058d4}, pid: 0}
  516. 09:23:12 - Send ack for received packetId 0
  517. 09:23:12 - Control: Write ack packet {ACK_V1 | 0, sid: 16e8ba5465a058d4, acks: {[0], 6adc17d5a57db5e8}}
  518. 09:23:12 - Control: Remote sessionId is 6adc17d5a57db5e8
  519. 09:23:12 - Start TLS handshake
  520. 09:23:12 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  521. 09:23:12 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  522. 09:23:12 - Ack successfully written to LINK for packetId 0
  523. 09:23:12 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  524. 09:23:12 - Cleaning up...
  525. 09:23:12 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  526. 09:23:12 - Flushing log...
  527. 09:23:12 - Ignoring read from outdated LINK
  528. 09:23:12 - Cleaning up...
  529. 09:23:12 -
  530. 09:23:12 - --- EOF ---
  531. 09:23:12 -
  532. 09:23:12 - Starting tunnel...
  533. 09:23:12 - App version: Passepartout 2.0.0 (3340)
  534. 09:23:12 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  535. 09:23:12 - Cipher: AES-128-CBC
  536. 09:23:12 - Digest: HMAC-SHA1
  537. 09:23:12 - Compression framing: comp-lzo
  538. 09:23:12 - Username authentication: false
  539. 09:23:12 - Compression algorithm: lzo
  540. 09:23:12 - Client verification: enabled
  541. 09:23:12 - TLS wrapping: disabled
  542. 09:23:12 - TLS security level: 0
  543. 09:23:12 - Keep-alive interval: 10s
  544. 09:23:12 - Keep-alive timeout: 1m
  545. 09:23:12 - Renegotiation: never
  546. 09:23:12 - Server EKU verification: disabled
  547. 09:23:12 - Host SAN verification: disabled
  548. 09:23:12 - Gateway: not configured
  549. 09:23:12 - DNS: not configured
  550. 09:23:12 - MTU: default
  551. 09:23:12 - Debug: true
  552. 09:23:12 - Masks private data: true
  553. 09:23:12 - Creating link session
  554. 09:23:12 - No resolved endpoints, will resort to DNS resolution
  555. 09:23:12 - DNS resolve address: <masked>
  556. 09:23:12 - Current SSID: none (disconnected from WiFi)
  557. 09:23:12 - DNS resolved addresses: <masked>
  558. 09:23:12 - Unrolled endpoints: <masked>
  559. 09:23:12 - Pick current endpoint: <masked>
  560. 09:23:12 - Will connect to <masked>:1194
  561. 09:23:12 - Socket type is NEUDPSocket
  562. 09:23:12 - Socket state is ready (endpoint: <masked> -> <masked>)
  563. 09:23:12 - Starting VPN session
  564. 09:23:12 - Send hard reset
  565. 09:23:12 - Negotiation key index is 0
  566. 09:23:12 - Control: Enqueued 1 packet [0]
  567. 09:23:12 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 5120f33733f4a9bf, pid: 0, [0 bytes]}
  568. 09:23:12 - Send control packet (14 bytes): 385120f33733f4a9bf0000000000
  569. 09:23:12 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  570. 09:23:13 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 479cd5b1d1e2595f, acks: {[0], 5120f33733f4a9bf}, pid: 0}
  571. 09:23:13 - Send ack for received packetId 0
  572. 09:23:13 - Control: Write ack packet {ACK_V1 | 0, sid: 5120f33733f4a9bf, acks: {[0], 479cd5b1d1e2595f}}
  573. 09:23:13 - Control: Remote sessionId is 479cd5b1d1e2595f
  574. 09:23:13 - Start TLS handshake
  575. 09:23:13 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  576. 09:23:13 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  577. 09:23:13 - Ack successfully written to LINK for packetId 0
  578. 09:23:13 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  579. 09:23:13 - Cleaning up...
  580. 09:23:13 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  581. 09:23:13 - Flushing log...
  582. 09:23:13 - Ignoring read from outdated LINK
  583. 09:23:13 - Cleaning up...
  584. 09:23:13 -
  585. 09:23:13 - --- EOF ---
  586. 09:23:13 -
  587. 09:23:13 - Starting tunnel...
  588. 09:23:13 - App version: Passepartout 2.0.0 (3340)
  589. 09:23:13 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  590. 09:23:13 - Cipher: AES-128-CBC
  591. 09:23:13 - Digest: HMAC-SHA1
  592. 09:23:13 - Compression framing: comp-lzo
  593. 09:23:13 - Username authentication: false
  594. 09:23:13 - Compression algorithm: lzo
  595. 09:23:13 - Client verification: enabled
  596. 09:23:13 - TLS wrapping: disabled
  597. 09:23:13 - TLS security level: 0
  598. 09:23:13 - Keep-alive interval: 10s
  599. 09:23:13 - Keep-alive timeout: 1m
  600. 09:23:13 - Renegotiation: never
  601. 09:23:13 - Server EKU verification: disabled
  602. 09:23:13 - Host SAN verification: disabled
  603. 09:23:13 - Gateway: not configured
  604. 09:23:13 - DNS: not configured
  605. 09:23:13 - MTU: default
  606. 09:23:13 - Debug: true
  607. 09:23:13 - Masks private data: true
  608. 09:23:13 - Creating link session
  609. 09:23:13 - No resolved endpoints, will resort to DNS resolution
  610. 09:23:13 - DNS resolve address: <masked>
  611. 09:23:13 - Current SSID: none (disconnected from WiFi)
  612. 09:23:13 - DNS resolved addresses: <masked>
  613. 09:23:13 - Unrolled endpoints: <masked>
  614. 09:23:13 - Pick current endpoint: <masked>
  615. 09:23:13 - Will connect to <masked>:1194
  616. 09:23:13 - Socket type is NEUDPSocket
  617. 09:23:13 - Socket state is ready (endpoint: <masked> -> <masked>)
  618. 09:23:13 - Starting VPN session
  619. 09:23:13 - Send hard reset
  620. 09:23:13 - Negotiation key index is 0
  621. 09:23:13 - Control: Enqueued 1 packet [0]
  622. 09:23:13 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: fe65ea0411094850, pid: 0, [0 bytes]}
  623. 09:23:13 - Send control packet (14 bytes): 38fe65ea04110948500000000000
  624. 09:23:13 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  625. 09:23:13 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 9dc52a343d0c5230, acks: {[0], fe65ea0411094850}, pid: 0}
  626. 09:23:13 - Send ack for received packetId 0
  627. 09:23:13 - Control: Write ack packet {ACK_V1 | 0, sid: fe65ea0411094850, acks: {[0], 9dc52a343d0c5230}}
  628. 09:23:13 - Control: Remote sessionId is 9dc52a343d0c5230
  629. 09:23:13 - Start TLS handshake
  630. 09:23:13 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  631. 09:23:13 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  632. 09:23:13 - Ack successfully written to LINK for packetId 0
  633. 09:23:13 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  634. 09:23:13 - Cleaning up...
  635. 09:23:13 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  636. 09:23:13 - Flushing log...
  637. 09:23:13 - Ignoring read from outdated LINK
  638. 09:23:13 - Cleaning up...
  639. 09:23:13 -
  640. 09:23:13 - --- EOF ---
  641. 09:23:13 -
  642. 09:23:13 - Starting tunnel...
  643. 09:23:13 - App version: Passepartout 2.0.0 (3340)
  644. 09:23:13 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  645. 09:23:13 - Cipher: AES-128-CBC
  646. 09:23:13 - Digest: HMAC-SHA1
  647. 09:23:13 - Compression framing: comp-lzo
  648. 09:23:13 - Username authentication: false
  649. 09:23:13 - Compression algorithm: lzo
  650. 09:23:13 - Client verification: enabled
  651. 09:23:13 - TLS wrapping: disabled
  652. 09:23:13 - TLS security level: 0
  653. 09:23:13 - Keep-alive interval: 10s
  654. 09:23:13 - Keep-alive timeout: 1m
  655. 09:23:13 - Renegotiation: never
  656. 09:23:13 - Server EKU verification: disabled
  657. 09:23:13 - Host SAN verification: disabled
  658. 09:23:13 - Gateway: not configured
  659. 09:23:13 - DNS: not configured
  660. 09:23:13 - MTU: default
  661. 09:23:13 - Debug: true
  662. 09:23:13 - Masks private data: true
  663. 09:23:13 - Creating link session
  664. 09:23:13 - No resolved endpoints, will resort to DNS resolution
  665. 09:23:13 - DNS resolve address: <masked>
  666. 09:23:13 - Current SSID: none (disconnected from WiFi)
  667. 09:23:13 - DNS resolved addresses: <masked>
  668. 09:23:13 - Unrolled endpoints: <masked>
  669. 09:23:13 - Pick current endpoint: <masked>
  670. 09:23:13 - Will connect to <masked>:1194
  671. 09:23:13 - Socket type is NEUDPSocket
  672. 09:23:13 - Socket state is ready (endpoint: <masked> -> <masked>)
  673. 09:23:13 - Starting VPN session
  674. 09:23:13 - Send hard reset
  675. 09:23:13 - Negotiation key index is 0
  676. 09:23:13 - Control: Enqueued 1 packet [0]
  677. 09:23:13 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: ed6224e11a517e12, pid: 0, [0 bytes]}
  678. 09:23:13 - Send control packet (14 bytes): 38ed6224e11a517e120000000000
  679. 09:23:13 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  680. 09:23:13 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 5d38ca1ea7d9733c, acks: {[0], ed6224e11a517e12}, pid: 0}
  681. 09:23:13 - Send ack for received packetId 0
  682. 09:23:13 - Control: Write ack packet {ACK_V1 | 0, sid: ed6224e11a517e12, acks: {[0], 5d38ca1ea7d9733c}}
  683. 09:23:13 - Control: Remote sessionId is 5d38ca1ea7d9733c
  684. 09:23:13 - Start TLS handshake
  685. 09:23:13 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  686. 09:23:13 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  687. 09:23:13 - Ack successfully written to LINK for packetId 0
  688. 09:23:13 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  689. 09:23:13 - Cleaning up...
  690. 09:23:13 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  691. 09:23:13 - Flushing log...
  692. 09:23:13 - Ignoring read from outdated LINK
  693. 09:23:13 - Cleaning up...
  694. 09:23:14 -
  695. 09:23:14 - --- EOF ---
  696. 09:23:14 -
  697. 09:23:14 - Starting tunnel...
  698. 09:23:14 - App version: Passepartout 2.0.0 (3340)
  699. 09:23:14 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  700. 09:23:14 - Cipher: AES-128-CBC
  701. 09:23:14 - Digest: HMAC-SHA1
  702. 09:23:14 - Compression framing: comp-lzo
  703. 09:23:14 - Username authentication: false
  704. 09:23:14 - Compression algorithm: lzo
  705. 09:23:14 - Client verification: enabled
  706. 09:23:14 - TLS wrapping: disabled
  707. 09:23:14 - TLS security level: 0
  708. 09:23:14 - Keep-alive interval: 10s
  709. 09:23:14 - Keep-alive timeout: 1m
  710. 09:23:14 - Renegotiation: never
  711. 09:23:14 - Server EKU verification: disabled
  712. 09:23:14 - Host SAN verification: disabled
  713. 09:23:14 - Gateway: not configured
  714. 09:23:14 - DNS: not configured
  715. 09:23:14 - MTU: default
  716. 09:23:14 - Debug: true
  717. 09:23:14 - Masks private data: true
  718. 09:23:14 - Creating link session
  719. 09:23:14 - No resolved endpoints, will resort to DNS resolution
  720. 09:23:14 - DNS resolve address: <masked>
  721. 09:23:14 - Current SSID: none (disconnected from WiFi)
  722. 09:23:14 - DNS resolved addresses: <masked>
  723. 09:23:14 - Unrolled endpoints: <masked>
  724. 09:23:14 - Pick current endpoint: <masked>
  725. 09:23:14 - Will connect to <masked>:1194
  726. 09:23:14 - Socket type is NEUDPSocket
  727. 09:23:14 - Socket state is ready (endpoint: <masked> -> <masked>)
  728. 09:23:14 - Starting VPN session
  729. 09:23:14 - Send hard reset
  730. 09:23:14 - Negotiation key index is 0
  731. 09:23:14 - Control: Enqueued 1 packet [0]
  732. 09:23:14 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: e2ed918128f7b7d4, pid: 0, [0 bytes]}
  733. 09:23:14 - Send control packet (14 bytes): 38e2ed918128f7b7d40000000000
  734. 09:23:14 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  735. 09:23:14 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 197023d101a04b54, acks: {[0], e2ed918128f7b7d4}, pid: 0}
  736. 09:23:14 - Send ack for received packetId 0
  737. 09:23:14 - Control: Write ack packet {ACK_V1 | 0, sid: e2ed918128f7b7d4, acks: {[0], 197023d101a04b54}}
  738. 09:23:14 -
  739. 09:23:14 - --- EOF ---
  740. 09:23:14 -
  741. 09:23:14 - Starting tunnel...
  742. 09:23:14 - App version: Passepartout 2.0.0 (3340)
  743. 09:23:14 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  744. 09:23:14 - Cipher: AES-128-CBC
  745. 09:23:14 - Digest: HMAC-SHA1
  746. 09:23:14 - Compression framing: comp-lzo
  747. 09:23:14 - Username authentication: false
  748. 09:23:14 - Compression algorithm: lzo
  749. 09:23:14 - Client verification: enabled
  750. 09:23:14 - TLS wrapping: disabled
  751. 09:23:14 - TLS security level: 0
  752. 09:23:14 - Keep-alive interval: 10s
  753. 09:23:14 - Keep-alive timeout: 1m
  754. 09:23:14 - Renegotiation: never
  755. 09:23:14 - Server EKU verification: disabled
  756. 09:23:14 - Host SAN verification: disabled
  757. 09:23:14 - Gateway: not configured
  758. 09:23:14 - DNS: not configured
  759. 09:23:14 - MTU: default
  760. 09:23:14 - Debug: true
  761. 09:23:14 - Masks private data: true
  762. 09:23:14 - Creating link session
  763. 09:23:14 - No resolved endpoints, will resort to DNS resolution
  764. 09:23:14 - DNS resolve address: <masked>
  765. 09:23:14 - Current SSID: none (disconnected from WiFi)
  766. 09:23:14 - DNS resolved addresses: <masked>
  767. 09:23:14 - Unrolled endpoints: <masked>
  768. 09:23:14 - Pick current endpoint: <masked>
  769. 09:23:14 - Will connect to <masked>:1194
  770. 09:23:14 - Socket type is NEUDPSocket
  771. 09:23:14 - Socket state is ready (endpoint: <masked> -> <masked>)
  772. 09:23:14 - Starting VPN session
  773. 09:23:14 - Send hard reset
  774. 09:23:14 - Negotiation key index is 0
  775. 09:23:14 - Control: Enqueued 1 packet [0]
  776. 09:23:14 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 8d96bf2deb3fbe7f, pid: 0, [0 bytes]}
  777. 09:23:14 - Send control packet (14 bytes): 388d96bf2deb3fbe7f0000000000
  778. 09:23:14 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  779. 09:23:14 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 40fed874be8d90d4, acks: {[0], 8d96bf2deb3fbe7f}, pid: 0}
  780. 09:23:14 - Send ack for received packetId 0
  781. 09:23:14 - Control: Write ack packet {ACK_V1 | 0, sid: 8d96bf2deb3fbe7f, acks: {[0], 40fed874be8d90d4}}
  782. 09:23:14 - Control: Remote sessionId is 40fed874be8d90d4
  783. 09:23:14 - Start TLS handshake
  784. 09:23:14 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  785. 09:23:14 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  786. 09:23:14 - Ack successfully written to LINK for packetId 0
  787. 09:23:14 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  788. 09:23:14 - Cleaning up...
  789. 09:23:14 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  790. 09:23:14 - Flushing log...
  791. 09:23:14 - Ignoring read from outdated LINK
  792. 09:23:14 - Cleaning up...
  793. 09:23:15 -
  794. 09:23:15 - --- EOF ---
  795. 09:23:15 -
  796. 09:23:15 - Starting tunnel...
  797. 09:23:15 - App version: Passepartout 2.0.0 (3340)
  798. 09:23:15 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  799. 09:23:15 - Cipher: AES-128-CBC
  800. 09:23:15 - Digest: HMAC-SHA1
  801. 09:23:15 - Compression framing: comp-lzo
  802. 09:23:15 - Username authentication: false
  803. 09:23:15 - Compression algorithm: lzo
  804. 09:23:15 - Client verification: enabled
  805. 09:23:15 - TLS wrapping: disabled
  806. 09:23:15 - TLS security level: 0
  807. 09:23:15 - Keep-alive interval: 10s
  808. 09:23:15 - Keep-alive timeout: 1m
  809. 09:23:15 - Renegotiation: never
  810. 09:23:15 - Server EKU verification: disabled
  811. 09:23:15 - Host SAN verification: disabled
  812. 09:23:15 - Gateway: not configured
  813. 09:23:15 - DNS: not configured
  814. 09:23:15 - MTU: default
  815. 09:23:15 - Debug: true
  816. 09:23:15 - Masks private data: true
  817. 09:23:15 - Creating link session
  818. 09:23:15 - No resolved endpoints, will resort to DNS resolution
  819. 09:23:15 - DNS resolve address: <masked>
  820. 09:23:15 - Current SSID: none (disconnected from WiFi)
  821. 09:23:15 - DNS resolved addresses: <masked>
  822. 09:23:15 - Unrolled endpoints: <masked>
  823. 09:23:15 - Pick current endpoint: <masked>
  824. 09:23:15 - Will connect to <masked>:1194
  825. 09:23:15 - Socket type is NEUDPSocket
  826. 09:23:15 - Socket state is ready (endpoint: <masked> -> <masked>)
  827. 09:23:15 - Starting VPN session
  828. 09:23:15 - Send hard reset
  829. 09:23:15 - Negotiation key index is 0
  830. 09:23:15 - Control: Enqueued 1 packet [0]
  831. 09:23:15 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 976d3f20461326a4, pid: 0, [0 bytes]}
  832. 09:23:15 - Send control packet (14 bytes): 38976d3f20461326a40000000000
  833. 09:23:15 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  834. 09:23:15 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: f0c0c0290e13323c, acks: {[0], 976d3f20461326a4}, pid: 0}
  835. 09:23:15 - Send ack for received packetId 0
  836. 09:23:15 - Control: Write ack packet {ACK_V1 | 0, sid: 976d3f20461326a4, acks: {[0], f0c0c0290e13323c}}
  837. 09:23:15 - Control: Remote sessionId is f0c0c0290e13323c
  838. 09:23:15 - Start TLS handshake
  839. 09:23:15 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  840. 09:23:15 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  841. 09:23:15 - Ack successfully written to LINK for packetId 0
  842. 09:23:15 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  843. 09:23:15 - Cleaning up...
  844. 09:23:15 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  845. 09:23:15 - Flushing log...
  846. 09:23:15 - Ignoring read from outdated LINK
  847. 09:23:15 - Cleaning up...
  848. 09:23:15 -
  849. 09:23:15 - --- EOF ---
  850. 09:23:15 -
  851. 09:23:15 - Starting tunnel...
  852. 09:23:15 - App version: Passepartout 2.0.0 (3340)
  853. 09:23:15 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  854. 09:23:15 - Cipher: AES-128-CBC
  855. 09:23:15 - Digest: HMAC-SHA1
  856. 09:23:15 - Compression framing: comp-lzo
  857. 09:23:15 - Username authentication: false
  858. 09:23:15 - Compression algorithm: lzo
  859. 09:23:15 - Client verification: enabled
  860. 09:23:15 - TLS wrapping: disabled
  861. 09:23:15 - TLS security level: 0
  862. 09:23:15 - Keep-alive interval: 10s
  863. 09:23:15 - Keep-alive timeout: 1m
  864. 09:23:15 - Renegotiation: never
  865. 09:23:15 - Server EKU verification: disabled
  866. 09:23:15 - Host SAN verification: disabled
  867. 09:23:15 - Gateway: not configured
  868. 09:23:15 - DNS: not configured
  869. 09:23:15 - MTU: default
  870. 09:23:15 - Debug: true
  871. 09:23:15 - Masks private data: true
  872. 09:23:15 - Creating link session
  873. 09:23:15 - No resolved endpoints, will resort to DNS resolution
  874. 09:23:15 - DNS resolve address: <masked>
  875. 09:23:15 - Current SSID: none (disconnected from WiFi)
  876. 09:23:15 - DNS resolved addresses: <masked>
  877. 09:23:15 - Unrolled endpoints: <masked>
  878. 09:23:15 - Pick current endpoint: <masked>
  879. 09:23:15 - Will connect to <masked>:1194
  880. 09:23:15 - Socket type is NEUDPSocket
  881. 09:23:15 - Socket state is ready (endpoint: <masked> -> <masked>)
  882. 09:23:15 - Starting VPN session
  883. 09:23:15 - Send hard reset
  884. 09:23:15 - Negotiation key index is 0
  885. 09:23:15 - Control: Enqueued 1 packet [0]
  886. 09:23:15 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: b29d26d4cd2b1b12, pid: 0, [0 bytes]}
  887. 09:23:15 - Send control packet (14 bytes): 38b29d26d4cd2b1b120000000000
  888. 09:23:15 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  889. 09:23:15 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 0db5d46d905bacb3, acks: {[0], b29d26d4cd2b1b12}, pid: 0}
  890. 09:23:15 - Send ack for received packetId 0
  891. 09:23:15 - Control: Write ack packet {ACK_V1 | 0, sid: b29d26d4cd2b1b12, acks: {[0], 0db5d46d905bacb3}}
  892. 09:23:15 - Control: Remote sessionId is 0db5d46d905bacb3
  893. 09:23:15 - Start TLS handshake
  894. 09:23:15 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  895. 09:23:15 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  896. 09:23:15 - Ack successfully written to LINK for packetId 0
  897. 09:23:15 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  898. 09:23:15 - Cleaning up...
  899. 09:23:15 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  900. 09:23:15 - Flushing log...
  901. 09:23:15 - Ignoring read from outdated LINK
  902. 09:23:15 - Cleaning up...
  903. 09:23:16 -
  904. 09:23:16 - --- EOF ---
  905. 09:23:16 -
  906. 09:23:16 - Starting tunnel...
  907. 09:23:16 - App version: Passepartout 2.0.0 (3340)
  908. 09:23:16 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  909. 09:23:16 - Cipher: AES-128-CBC
  910. 09:23:16 - Digest: HMAC-SHA1
  911. 09:23:16 - Compression framing: comp-lzo
  912. 09:23:16 - Username authentication: false
  913. 09:23:16 - Compression algorithm: lzo
  914. 09:23:16 - Client verification: enabled
  915. 09:23:16 - TLS wrapping: disabled
  916. 09:23:16 - TLS security level: 0
  917. 09:23:16 - Keep-alive interval: 10s
  918. 09:23:16 - Keep-alive timeout: 1m
  919. 09:23:16 - Renegotiation: never
  920. 09:23:16 - Server EKU verification: disabled
  921. 09:23:16 - Host SAN verification: disabled
  922. 09:23:16 - Gateway: not configured
  923. 09:23:16 - DNS: not configured
  924. 09:23:16 - MTU: default
  925. 09:23:16 - Debug: true
  926. 09:23:16 - Masks private data: true
  927. 09:23:16 - Creating link session
  928. 09:23:16 - No resolved endpoints, will resort to DNS resolution
  929. 09:23:16 - DNS resolve address: <masked>
  930. 09:23:16 - DNS resolved addresses: <masked>
  931. 09:23:16 - Current SSID: none (disconnected from WiFi)
  932. 09:23:16 - Unrolled endpoints: <masked>
  933. 09:23:16 - Pick current endpoint: <masked>
  934. 09:23:16 - Will connect to <masked>:1194
  935. 09:23:16 - Socket type is NEUDPSocket
  936. 09:23:16 - Socket state is ready (endpoint: <masked> -> <masked>)
  937. 09:23:16 - Starting VPN session
  938. 09:23:16 - Send hard reset
  939. 09:23:16 - Negotiation key index is 0
  940. 09:23:16 - Control: Enqueued 1 packet [0]
  941. 09:23:16 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: b7dc1fa429b60194, pid: 0, [0 bytes]}
  942. 09:23:16 - Send control packet (14 bytes): 38b7dc1fa429b601940000000000
  943. 09:23:16 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  944. 09:23:16 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 99e96f40f37059c5, acks: {[0], b7dc1fa429b60194}, pid: 0}
  945. 09:23:16 - Send ack for received packetId 0
  946. 09:23:16 - Control: Write ack packet {ACK_V1 | 0, sid: b7dc1fa429b60194, acks: {[0], 99e96f40f37059c5}}
  947. 09:23:16 - Control: Remote sessionId is 99e96f40f37059c5
  948. 09:23:16 - Start TLS handshake
  949. 09:23:16 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  950. 09:23:16 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  951. 09:23:16 - Ack successfully written to LINK for packetId 0
  952. 09:23:16 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  953. 09:23:16 - Cleaning up...
  954. 09:23:16 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  955. 09:23:16 - Flushing log...
  956. 09:23:16 - Ignoring read from outdated LINK
  957. 09:23:16 - Cleaning up...
  958. 09:23:16 -
  959. 09:23:16 - --- EOF ---
  960. 09:23:16 -
  961. 09:23:16 - Starting tunnel...
  962. 09:23:16 - App version: Passepartout 2.0.0 (3340)
  963. 09:23:16 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  964. 09:23:16 - Cipher: AES-128-CBC
  965. 09:23:16 - Digest: HMAC-SHA1
  966. 09:23:16 - Compression framing: comp-lzo
  967. 09:23:16 - Username authentication: false
  968. 09:23:16 - Compression algorithm: lzo
  969. 09:23:16 - Client verification: enabled
  970. 09:23:16 - TLS wrapping: disabled
  971. 09:23:16 - TLS security level: 0
  972. 09:23:16 - Keep-alive interval: 10s
  973. 09:23:16 - Keep-alive timeout: 1m
  974. 09:23:16 - Renegotiation: never
  975. 09:23:16 - Server EKU verification: disabled
  976. 09:23:16 - Host SAN verification: disabled
  977. 09:23:16 - Gateway: not configured
  978. 09:23:16 - DNS: not configured
  979. 09:23:16 - MTU: default
  980. 09:23:16 - Debug: true
  981. 09:23:16 - Masks private data: true
  982. 09:23:16 - Creating link session
  983. 09:23:16 - No resolved endpoints, will resort to DNS resolution
  984. 09:23:16 - DNS resolve address: <masked>
  985. 09:23:16 - Current SSID: none (disconnected from WiFi)
  986. 09:23:16 - DNS resolved addresses: <masked>
  987. 09:23:16 - Unrolled endpoints: <masked>
  988. 09:23:16 - Pick current endpoint: <masked>
  989. 09:23:16 - Will connect to <masked>:1194
  990. 09:23:16 - Socket type is NEUDPSocket
  991. 09:23:16 - Socket state is ready (endpoint: <masked> -> <masked>)
  992. 09:23:16 - Starting VPN session
  993. 09:23:16 - Send hard reset
  994. 09:23:16 - Negotiation key index is 0
  995. 09:23:16 - Control: Enqueued 1 packet [0]
  996. 09:23:16 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: d70f99b30ce2683f, pid: 0, [0 bytes]}
  997. 09:23:16 - Send control packet (14 bytes): 38d70f99b30ce2683f0000000000
  998. 09:23:16 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  999. 09:23:16 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: e15ca93ceeade060, acks: {[0], d70f99b30ce2683f}, pid: 0}
  1000. 09:23:16 - Send ack for received packetId 0
  1001. 09:23:16 - Control: Write ack packet {ACK_V1 | 0, sid: d70f99b30ce2683f, acks: {[0], e15ca93ceeade060}}
  1002. 09:23:16 - Control: Remote sessionId is e15ca93ceeade060
  1003. 09:23:16 - Start TLS handshake
  1004. 09:23:16 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1005. 09:23:16 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1006. 09:23:16 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1007. 09:23:16 - Cleaning up...
  1008. 09:23:16 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1009. 09:23:16 - Flushing log...
  1010. 09:23:16 - Ignoring write from outdated LINK
  1011. 09:23:16 - Ignoring read from outdated LINK
  1012. 09:23:16 - Cleaning up...
  1013. 09:23:17 -
  1014. 09:23:17 - --- EOF ---
  1015. 09:23:17 -
  1016. 09:23:17 - Starting tunnel...
  1017. 09:23:17 - App version: Passepartout 2.0.0 (3340)
  1018. 09:23:17 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1019. 09:23:17 - Cipher: AES-128-CBC
  1020. 09:23:17 - Digest: HMAC-SHA1
  1021. 09:23:17 - Compression framing: comp-lzo
  1022. 09:23:17 - Username authentication: false
  1023. 09:23:17 - Compression algorithm: lzo
  1024. 09:23:17 - Client verification: enabled
  1025. 09:23:17 - TLS wrapping: disabled
  1026. 09:23:17 - TLS security level: 0
  1027. 09:23:17 - Keep-alive interval: 10s
  1028. 09:23:17 - Keep-alive timeout: 1m
  1029. 09:23:17 - Renegotiation: never
  1030. 09:23:17 - Server EKU verification: disabled
  1031. 09:23:17 - Host SAN verification: disabled
  1032. 09:23:17 - Gateway: not configured
  1033. 09:23:17 - DNS: not configured
  1034. 09:23:17 - MTU: default
  1035. 09:23:17 - Debug: true
  1036. 09:23:17 - Masks private data: true
  1037. 09:23:17 - Creating link session
  1038. 09:23:17 - No resolved endpoints, will resort to DNS resolution
  1039. 09:23:17 - DNS resolve address: <masked>
  1040. 09:23:17 - Current SSID: none (disconnected from WiFi)
  1041. 09:23:17 - DNS resolved addresses: <masked>
  1042. 09:23:17 - Unrolled endpoints: <masked>
  1043. 09:23:17 - Pick current endpoint: <masked>
  1044. 09:23:17 - Will connect to <masked>:1194
  1045. 09:23:17 - Socket type is NEUDPSocket
  1046. 09:23:17 - Socket state is preparing (endpoint: <masked> -> in progress)
  1047. 09:23:17 - Socket state is ready (endpoint: <masked> -> <masked>)
  1048. 09:23:17 - Starting VPN session
  1049. 09:23:17 - Send hard reset
  1050. 09:23:17 - Negotiation key index is 0
  1051. 09:23:17 - Control: Enqueued 1 packet [0]
  1052. 09:23:17 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 0d26f211874311c1, pid: 0, [0 bytes]}
  1053. 09:23:17 - Send control packet (14 bytes): 380d26f211874311c10000000000
  1054. 09:23:17 -
  1055. 09:23:17 - --- EOF ---
  1056. 09:23:17 -
  1057. 09:23:17 - Starting tunnel...
  1058. 09:23:17 - App version: Passepartout 2.0.0 (3340)
  1059. 09:23:17 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1060. 09:23:17 - Cipher: AES-128-CBC
  1061. 09:23:17 - Digest: HMAC-SHA1
  1062. 09:23:17 - Compression framing: comp-lzo
  1063. 09:23:17 - Username authentication: false
  1064. 09:23:17 - Compression algorithm: lzo
  1065. 09:23:17 - Client verification: enabled
  1066. 09:23:17 - TLS wrapping: disabled
  1067. 09:23:17 - TLS security level: 0
  1068. 09:23:17 - Keep-alive interval: 10s
  1069. 09:23:17 - Keep-alive timeout: 1m
  1070. 09:23:17 - Renegotiation: never
  1071. 09:23:17 - Server EKU verification: disabled
  1072. 09:23:17 - Host SAN verification: disabled
  1073. 09:23:17 - Gateway: not configured
  1074. 09:23:17 - DNS: not configured
  1075. 09:23:17 - MTU: default
  1076. 09:23:17 - Debug: true
  1077. 09:23:17 - Masks private data: true
  1078. 09:23:17 - Creating link session
  1079. 09:23:17 - No resolved endpoints, will resort to DNS resolution
  1080. 09:23:17 - DNS resolve address: <masked>
  1081. 09:23:17 - DNS resolved addresses: <masked>
  1082. 09:23:17 - Unrolled endpoints: <masked>
  1083. 09:23:17 - Pick current endpoint: <masked>
  1084. 09:23:17 - Current SSID: none (disconnected from WiFi)
  1085. 09:23:17 - Will connect to <masked>:1194
  1086. 09:23:17 - Socket type is NEUDPSocket
  1087. 09:23:17 - Socket state is ready (endpoint: <masked> -> <masked>)
  1088. 09:23:17 - Starting VPN session
  1089. 09:23:17 - Send hard reset
  1090. 09:23:17 - Negotiation key index is 0
  1091. 09:23:17 - Control: Enqueued 1 packet [0]
  1092. 09:23:17 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: ff3bb7bc83624137, pid: 0, [0 bytes]}
  1093. 09:23:17 - Send control packet (14 bytes): 38ff3bb7bc836241370000000000
  1094. 09:23:17 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1095. 09:23:17 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: eccb490a1ad2ce8a, acks: {[0], ff3bb7bc83624137}, pid: 0}
  1096. 09:23:17 - Send ack for received packetId 0
  1097. 09:23:17 - Control: Write ack packet {ACK_V1 | 0, sid: ff3bb7bc83624137, acks: {[0], eccb490a1ad2ce8a}}
  1098. 09:23:17 - Control: Remote sessionId is eccb490a1ad2ce8a
  1099. 09:23:17 - Start TLS handshake
  1100. 09:23:17 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1101. 09:23:17 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1102. 09:23:17 - Ack successfully written to LINK for packetId 0
  1103. 09:23:17 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1104. 09:23:17 - Cleaning up...
  1105. 09:23:17 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1106. 09:23:17 - Flushing log...
  1107. 09:23:17 - Ignoring read from outdated LINK
  1108. 09:23:17 - Cleaning up...
  1109. 09:23:18 -
  1110. 09:23:18 - --- EOF ---
  1111. 09:23:18 -
  1112. 09:23:18 - Starting tunnel...
  1113. 09:23:18 - App version: Passepartout 2.0.0 (3340)
  1114. 09:23:18 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1115. 09:23:18 - Cipher: AES-128-CBC
  1116. 09:23:18 - Digest: HMAC-SHA1
  1117. 09:23:18 - Compression framing: comp-lzo
  1118. 09:23:18 - Username authentication: false
  1119. 09:23:18 - Compression algorithm: lzo
  1120. 09:23:18 - Client verification: enabled
  1121. 09:23:18 - TLS wrapping: disabled
  1122. 09:23:18 - TLS security level: 0
  1123. 09:23:18 - Keep-alive interval: 10s
  1124. 09:23:18 - Keep-alive timeout: 1m
  1125. 09:23:18 - Renegotiation: never
  1126. 09:23:18 - Server EKU verification: disabled
  1127. 09:23:18 - Host SAN verification: disabled
  1128. 09:23:18 - Gateway: not configured
  1129. 09:23:18 - DNS: not configured
  1130. 09:23:18 - MTU: default
  1131. 09:23:18 - Debug: true
  1132. 09:23:18 - Masks private data: true
  1133. 09:23:18 - Creating link session
  1134. 09:23:18 - No resolved endpoints, will resort to DNS resolution
  1135. 09:23:18 - DNS resolve address: <masked>
  1136. 09:23:18 - Current SSID: none (disconnected from WiFi)
  1137. 09:23:18 - DNS resolved addresses: <masked>
  1138. 09:23:18 - Unrolled endpoints: <masked>
  1139. 09:23:18 - Pick current endpoint: <masked>
  1140. 09:23:18 - Will connect to <masked>:1194
  1141. 09:23:18 - Socket type is NEUDPSocket
  1142. 09:23:18 - Socket state is ready (endpoint: <masked> -> <masked>)
  1143. 09:23:18 - Starting VPN session
  1144. 09:23:18 - Send hard reset
  1145. 09:23:18 - Negotiation key index is 0
  1146. 09:23:18 - Control: Enqueued 1 packet [0]
  1147. 09:23:18 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 3a322721c0c47615, pid: 0, [0 bytes]}
  1148. 09:23:18 - Send control packet (14 bytes): 383a322721c0c476150000000000
  1149. 09:23:18 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1150. 09:23:18 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 98995ca5b3d1c9df, acks: {[0], 3a322721c0c47615}, pid: 0}
  1151. 09:23:18 - Send ack for received packetId 0
  1152. 09:23:18 - Control: Write ack packet {ACK_V1 | 0, sid: 3a322721c0c47615, acks: {[0], 98995ca5b3d1c9df}}
  1153. 09:23:18 - Control: Remote sessionId is 98995ca5b3d1c9df
  1154. 09:23:18 - Start TLS handshake
  1155. 09:23:18 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1156. 09:23:18 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1157. 09:23:18 - Ack successfully written to LINK for packetId 0
  1158. 09:23:18 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1159. 09:23:18 - Cleaning up...
  1160. 09:23:18 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1161. 09:23:18 - Flushing log...
  1162. 09:23:18 - Ignoring read from outdated LINK
  1163. 09:23:18 - Cleaning up...
  1164. 09:23:18 -
  1165. 09:23:18 - --- EOF ---
  1166. 09:23:18 -
  1167. 09:23:18 - Starting tunnel...
  1168. 09:23:18 - App version: Passepartout 2.0.0 (3340)
  1169. 09:23:18 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1170. 09:23:18 - Cipher: AES-128-CBC
  1171. 09:23:18 - Digest: HMAC-SHA1
  1172. 09:23:18 - Compression framing: comp-lzo
  1173. 09:23:18 - Username authentication: false
  1174. 09:23:18 - Compression algorithm: lzo
  1175. 09:23:18 - Client verification: enabled
  1176. 09:23:18 - TLS wrapping: disabled
  1177. 09:23:18 - TLS security level: 0
  1178. 09:23:18 - Keep-alive interval: 10s
  1179. 09:23:18 - Keep-alive timeout: 1m
  1180. 09:23:18 - Renegotiation: never
  1181. 09:23:18 - Server EKU verification: disabled
  1182. 09:23:18 - Host SAN verification: disabled
  1183. 09:23:18 - Gateway: not configured
  1184. 09:23:18 - DNS: not configured
  1185. 09:23:18 - MTU: default
  1186. 09:23:18 - Debug: true
  1187. 09:23:18 - Masks private data: true
  1188. 09:23:18 - Creating link session
  1189. 09:23:18 - No resolved endpoints, will resort to DNS resolution
  1190. 09:23:18 - DNS resolve address: <masked>
  1191. 09:23:18 - Current SSID: none (disconnected from WiFi)
  1192. 09:23:18 - DNS resolved addresses: <masked>
  1193. 09:23:18 - Unrolled endpoints: <masked>
  1194. 09:23:18 - Pick current endpoint: <masked>
  1195. 09:23:18 - Will connect to <masked>:1194
  1196. 09:23:18 - Socket type is NEUDPSocket
  1197. 09:23:18 - Socket state is ready (endpoint: <masked> -> <masked>)
  1198. 09:23:18 - Starting VPN session
  1199. 09:23:18 - Send hard reset
  1200. 09:23:18 - Negotiation key index is 0
  1201. 09:23:18 - Control: Enqueued 1 packet [0]
  1202. 09:23:18 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: f55d6125a0c237ee, pid: 0, [0 bytes]}
  1203. 09:23:18 - Send control packet (14 bytes): 38f55d6125a0c237ee0000000000
  1204. 09:23:18 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1205. 09:23:18 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 1a281deedf9d77da, acks: {[0], f55d6125a0c237ee}, pid: 0}
  1206. 09:23:18 - Send ack for received packetId 0
  1207. 09:23:18 - Control: Write ack packet {ACK_V1 | 0, sid: f55d6125a0c237ee, acks: {[0], 1a281deedf9d77da}}
  1208. 09:23:18 - Control: Remote sessionId is 1a281deedf9d77da
  1209. 09:23:18 - Start TLS handshake
  1210. 09:23:18 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1211. 09:23:18 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1212. 09:23:18 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1213. 09:23:18 - Cleaning up...
  1214. 09:23:18 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1215. 09:23:18 - Flushing log...
  1216. 09:23:18 - Ignoring read from outdated LINK
  1217. 09:23:18 - Ignoring write from outdated LINK
  1218. 09:23:18 - Cleaning up...
  1219. 09:23:19 -
  1220. 09:23:19 - --- EOF ---
  1221. 09:23:19 -
  1222. 09:23:19 - Starting tunnel...
  1223. 09:23:19 - App version: Passepartout 2.0.0 (3340)
  1224. 09:23:19 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1225. 09:23:19 - Cipher: AES-128-CBC
  1226. 09:23:19 - Digest: HMAC-SHA1
  1227. 09:23:19 - Compression framing: comp-lzo
  1228. 09:23:19 - Username authentication: false
  1229. 09:23:19 - Compression algorithm: lzo
  1230. 09:23:19 - Client verification: enabled
  1231. 09:23:19 - TLS wrapping: disabled
  1232. 09:23:19 - TLS security level: 0
  1233. 09:23:19 - Keep-alive interval: 10s
  1234. 09:23:19 - Keep-alive timeout: 1m
  1235. 09:23:19 - Renegotiation: never
  1236. 09:23:19 - Server EKU verification: disabled
  1237. 09:23:19 - Host SAN verification: disabled
  1238. 09:23:19 - Gateway: not configured
  1239. 09:23:19 - DNS: not configured
  1240. 09:23:19 - MTU: default
  1241. 09:23:19 - Debug: true
  1242. 09:23:19 - Masks private data: true
  1243. 09:23:19 - Creating link session
  1244. 09:23:19 - No resolved endpoints, will resort to DNS resolution
  1245. 09:23:19 - DNS resolve address: <masked>
  1246. 09:23:19 - Current SSID: none (disconnected from WiFi)
  1247. 09:23:19 - DNS resolved addresses: <masked>
  1248. 09:23:19 - Unrolled endpoints: <masked>
  1249. 09:23:19 - Pick current endpoint: <masked>
  1250. 09:23:19 - Will connect to <masked>:1194
  1251. 09:23:19 - Socket type is NEUDPSocket
  1252. 09:23:19 - Socket state is ready (endpoint: <masked> -> <masked>)
  1253. 09:23:19 - Starting VPN session
  1254. 09:23:19 - Send hard reset
  1255. 09:23:19 - Negotiation key index is 0
  1256. 09:23:19 - Control: Enqueued 1 packet [0]
  1257. 09:23:19 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 67d01917b404bd9e, pid: 0, [0 bytes]}
  1258. 09:23:19 - Send control packet (14 bytes): 3867d01917b404bd9e0000000000
  1259. 09:23:19 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1260. 09:23:19 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: fde8d6f0bc77f217, acks: {[0], 67d01917b404bd9e}, pid: 0}
  1261. 09:23:19 - Send ack for received packetId 0
  1262. 09:23:19 - Control: Write ack packet {ACK_V1 | 0, sid: 67d01917b404bd9e, acks: {[0], fde8d6f0bc77f217}}
  1263. 09:23:19 - Control: Remote sessionId is fde8d6f0bc77f217
  1264. 09:23:19 - Start TLS handshake
  1265. 09:23:19 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1266. 09:23:19 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1267. 09:23:19 - Ack successfully written to LINK for packetId 0
  1268. 09:23:19 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1269. 09:23:19 - Cleaning up...
  1270. 09:23:19 -
  1271. 09:23:19 - --- EOF ---
  1272. 09:23:19 -
  1273. 09:23:19 - Starting tunnel...
  1274. 09:23:19 - App version: Passepartout 2.0.0 (3340)
  1275. 09:23:19 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1276. 09:23:19 - Cipher: AES-128-CBC
  1277. 09:23:19 - Digest: HMAC-SHA1
  1278. 09:23:19 - Compression framing: comp-lzo
  1279. 09:23:19 - Username authentication: false
  1280. 09:23:19 - Compression algorithm: lzo
  1281. 09:23:19 - Client verification: enabled
  1282. 09:23:19 - TLS wrapping: disabled
  1283. 09:23:19 - TLS security level: 0
  1284. 09:23:19 - Keep-alive interval: 10s
  1285. 09:23:19 - Keep-alive timeout: 1m
  1286. 09:23:19 - Renegotiation: never
  1287. 09:23:19 - Server EKU verification: disabled
  1288. 09:23:19 - Host SAN verification: disabled
  1289. 09:23:19 - Gateway: not configured
  1290. 09:23:19 - DNS: not configured
  1291. 09:23:19 - MTU: default
  1292. 09:23:19 - Debug: true
  1293. 09:23:19 - Masks private data: true
  1294. 09:23:19 - Creating link session
  1295. 09:23:19 - No resolved endpoints, will resort to DNS resolution
  1296. 09:23:19 - DNS resolve address: <masked>
  1297. 09:23:19 - Current SSID: none (disconnected from WiFi)
  1298. 09:23:19 - DNS resolved addresses: <masked>
  1299. 09:23:19 - Unrolled endpoints: <masked>
  1300. 09:23:19 - Pick current endpoint: <masked>
  1301. 09:23:19 - Will connect to <masked>:1194
  1302. 09:23:19 - Socket type is NEUDPSocket
  1303. 09:23:19 - Socket state is ready (endpoint: <masked> -> <masked>)
  1304. 09:23:19 - Starting VPN session
  1305. 09:23:19 - Send hard reset
  1306. 09:23:19 - Negotiation key index is 0
  1307. 09:23:19 - Control: Enqueued 1 packet [0]
  1308. 09:23:19 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 17d7593c5f22bdb7, pid: 0, [0 bytes]}
  1309. 09:23:19 - Send control packet (14 bytes): 3817d7593c5f22bdb70000000000
  1310. 09:23:19 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1311. 09:23:19 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 48696a51db4d9515, acks: {[0], 17d7593c5f22bdb7}, pid: 0}
  1312. 09:23:19 - Send ack for received packetId 0
  1313. 09:23:19 - Control: Write ack packet {ACK_V1 | 0, sid: 17d7593c5f22bdb7, acks: {[0], 48696a51db4d9515}}
  1314. 09:23:19 - Control: Remote sessionId is 48696a51db4d9515
  1315. 09:23:19 - Start TLS handshake
  1316. 09:23:19 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1317. 09:23:19 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1318. 09:23:19 - Ack successfully written to LINK for packetId 0
  1319. 09:23:19 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1320. 09:23:19 - Cleaning up...
  1321. 09:23:19 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1322. 09:23:19 - Flushing log...
  1323. 09:23:19 - Ignoring read from outdated LINK
  1324. 09:23:19 - Cleaning up...
  1325. 09:23:19 -
  1326. 09:23:19 - --- EOF ---
  1327. 09:23:20 -
  1328. 09:23:20 - Starting tunnel...
  1329. 09:23:20 - App version: Passepartout 2.0.0 (3340)
  1330. 09:23:20 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1331. 09:23:20 - Cipher: AES-128-CBC
  1332. 09:23:20 - Digest: HMAC-SHA1
  1333. 09:23:20 - Compression framing: comp-lzo
  1334. 09:23:20 - Username authentication: false
  1335. 09:23:20 - Compression algorithm: lzo
  1336. 09:23:20 - Client verification: enabled
  1337. 09:23:20 - TLS wrapping: disabled
  1338. 09:23:20 - TLS security level: 0
  1339. 09:23:20 - Keep-alive interval: 10s
  1340. 09:23:20 - Keep-alive timeout: 1m
  1341. 09:23:20 - Renegotiation: never
  1342. 09:23:20 - Server EKU verification: disabled
  1343. 09:23:20 - Host SAN verification: disabled
  1344. 09:23:20 - Gateway: not configured
  1345. 09:23:20 - DNS: not configured
  1346. 09:23:20 - MTU: default
  1347. 09:23:20 - Debug: true
  1348. 09:23:20 - Masks private data: true
  1349. 09:23:20 - Creating link session
  1350. 09:23:20 - No resolved endpoints, will resort to DNS resolution
  1351. 09:23:20 - DNS resolve address: <masked>
  1352. 09:23:20 - Current SSID: none (disconnected from WiFi)
  1353. 09:23:20 - DNS resolved addresses: <masked>
  1354. 09:23:20 - Unrolled endpoints: <masked>
  1355. 09:23:20 - Pick current endpoint: <masked>
  1356. 09:23:20 - Will connect to <masked>:1194
  1357. 09:23:20 - Socket type is NEUDPSocket
  1358. 09:23:20 - Socket state is ready (endpoint: <masked> -> <masked>)
  1359. 09:23:20 - Starting VPN session
  1360. 09:23:20 - Send hard reset
  1361. 09:23:20 - Negotiation key index is 0
  1362. 09:23:20 - Control: Enqueued 1 packet [0]
  1363. 09:23:20 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 3398f7e41384202c, pid: 0, [0 bytes]}
  1364. 09:23:20 - Send control packet (14 bytes): 383398f7e41384202c0000000000
  1365. 09:23:20 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1366. 09:23:20 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 21b2cc963d8b8831, acks: {[0], 3398f7e41384202c}, pid: 0}
  1367. 09:23:20 - Send ack for received packetId 0
  1368. 09:23:20 - Control: Write ack packet {ACK_V1 | 0, sid: 3398f7e41384202c, acks: {[0], 21b2cc963d8b8831}}
  1369. 09:23:20 - Control: Remote sessionId is 21b2cc963d8b8831
  1370. 09:23:20 - Start TLS handshake
  1371. 09:23:20 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1372. 09:23:20 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1373. 09:23:20 - Ack successfully written to LINK for packetId 0
  1374. 09:23:20 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1375. 09:23:20 - Cleaning up...
  1376. 09:23:20 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1377. 09:23:20 - Flushing log...
  1378. 09:23:20 - Ignoring read from outdated LINK
  1379. 09:23:20 - Cleaning up...
  1380. 09:23:20 -
  1381. 09:23:20 - --- EOF ---
  1382. 09:23:20 -
  1383. 09:23:20 - Starting tunnel...
  1384. 09:23:20 - App version: Passepartout 2.0.0 (3340)
  1385. 09:23:20 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1386. 09:23:20 - Cipher: AES-128-CBC
  1387. 09:23:20 - Digest: HMAC-SHA1
  1388. 09:23:20 - Compression framing: comp-lzo
  1389. 09:23:20 - Username authentication: false
  1390. 09:23:20 - Compression algorithm: lzo
  1391. 09:23:20 - Client verification: enabled
  1392. 09:23:20 - TLS wrapping: disabled
  1393. 09:23:20 - TLS security level: 0
  1394. 09:23:20 - Keep-alive interval: 10s
  1395. 09:23:20 - Keep-alive timeout: 1m
  1396. 09:23:20 - Renegotiation: never
  1397. 09:23:20 - Server EKU verification: disabled
  1398. 09:23:20 - Host SAN verification: disabled
  1399. 09:23:20 - Gateway: not configured
  1400. 09:23:20 - DNS: not configured
  1401. 09:23:20 - MTU: default
  1402. 09:23:20 - Debug: true
  1403. 09:23:20 - Masks private data: true
  1404. 09:23:20 - Creating link session
  1405. 09:23:20 - No resolved endpoints, will resort to DNS resolution
  1406. 09:23:20 - DNS resolve address: <masked>
  1407. 09:23:20 - Current SSID: none (disconnected from WiFi)
  1408. 09:23:20 - DNS resolved addresses: <masked>
  1409. 09:23:20 - Unrolled endpoints: <masked>
  1410. 09:23:20 - Pick current endpoint: <masked>
  1411. 09:23:20 - Will connect to <masked>:1194
  1412. 09:23:20 - Socket type is NEUDPSocket
  1413. 09:23:20 - Socket state is ready (endpoint: <masked> -> <masked>)
  1414. 09:23:20 - Starting VPN session
  1415. 09:23:20 - Send hard reset
  1416. 09:23:20 - Negotiation key index is 0
  1417. 09:23:20 - Control: Enqueued 1 packet [0]
  1418. 09:23:20 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 53b7326db13a65d8, pid: 0, [0 bytes]}
  1419. 09:23:20 - Send control packet (14 bytes): 3853b7326db13a65d80000000000
  1420. 09:23:20 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1421. 09:23:20 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 16c41f2da91be1d9, acks: {[0], 53b7326db13a65d8}, pid: 0}
  1422. 09:23:20 - Send ack for received packetId 0
  1423. 09:23:20 - Control: Write ack packet {ACK_V1 | 0, sid: 53b7326db13a65d8, acks: {[0], 16c41f2da91be1d9}}
  1424. 09:23:20 - Control: Remote sessionId is 16c41f2da91be1d9
  1425. 09:23:20 - Start TLS handshake
  1426. 09:23:20 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1427. 09:23:20 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1428. 09:23:20 - Ack successfully written to LINK for packetId 0
  1429. 09:23:20 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1430. 09:23:20 - Cleaning up...
  1431. 09:23:20 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1432. 09:23:20 - Flushing log...
  1433. 09:23:20 - Ignoring read from outdated LINK
  1434. 09:23:20 - Cleaning up...
  1435. 09:23:21 -
  1436. 09:23:21 - --- EOF ---
  1437. 09:23:21 -
  1438. 09:23:21 - Starting tunnel...
  1439. 09:23:21 - App version: Passepartout 2.0.0 (3340)
  1440. 09:23:21 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1441. 09:23:21 - Cipher: AES-128-CBC
  1442. 09:23:21 - Digest: HMAC-SHA1
  1443. 09:23:21 - Compression framing: comp-lzo
  1444. 09:23:21 - Username authentication: false
  1445. 09:23:21 - Compression algorithm: lzo
  1446. 09:23:21 - Client verification: enabled
  1447. 09:23:21 - TLS wrapping: disabled
  1448. 09:23:21 - TLS security level: 0
  1449. 09:23:21 - Keep-alive interval: 10s
  1450. 09:23:21 - Keep-alive timeout: 1m
  1451. 09:23:21 - Renegotiation: never
  1452. 09:23:21 - Server EKU verification: disabled
  1453. 09:23:21 - Host SAN verification: disabled
  1454. 09:23:21 - Gateway: not configured
  1455. 09:23:21 - DNS: not configured
  1456. 09:23:21 - MTU: default
  1457. 09:23:21 - Debug: true
  1458. 09:23:21 - Masks private data: true
  1459. 09:23:21 - Creating link session
  1460. 09:23:21 - No resolved endpoints, will resort to DNS resolution
  1461. 09:23:21 - DNS resolve address: <masked>
  1462. 09:23:21 - DNS resolved addresses: <masked>
  1463. 09:23:21 - Unrolled endpoints: <masked>
  1464. 09:23:21 - Current SSID: none (disconnected from WiFi)
  1465. 09:23:21 - Pick current endpoint: <masked>
  1466. 09:23:21 - Will connect to <masked>:1194
  1467. 09:23:21 - Socket type is NEUDPSocket
  1468. 09:23:21 - Socket state is ready (endpoint: <masked> -> <masked>)
  1469. 09:23:21 - Starting VPN session
  1470. 09:23:21 - Send hard reset
  1471. 09:23:21 - Negotiation key index is 0
  1472. 09:23:21 - Control: Enqueued 1 packet [0]
  1473. 09:23:21 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 48ffd5a40c43b8ba, pid: 0, [0 bytes]}
  1474. 09:23:21 - Send control packet (14 bytes): 3848ffd5a40c43b8ba0000000000
  1475. 09:23:21 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1476. 09:23:21 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 683806e982f941c7, acks: {[0], 48ffd5a40c43b8ba}, pid: 0}
  1477. 09:23:21 - Send ack for received packetId 0
  1478. 09:23:21 - Control: Write ack packet {ACK_V1 | 0, sid: 48ffd5a40c43b8ba, acks: {[0], 683806e982f941c7}}
  1479. 09:23:21 - Control: Remote sessionId is 683806e982f941c7
  1480. 09:23:21 - Start TLS handshake
  1481. 09:23:21 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1482. 09:23:21 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1483. 09:23:21 - Ack successfully written to LINK for packetId 0
  1484. 09:23:21 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1485. 09:23:21 - Cleaning up...
  1486. 09:23:21 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1487. 09:23:21 - Flushing log...
  1488. 09:23:21 - Ignoring read from outdated LINK
  1489. 09:23:21 - Cleaning up...
  1490. 09:23:21 -
  1491. 09:23:21 - --- EOF ---
  1492. 09:23:21 -
  1493. 09:23:21 - Starting tunnel...
  1494. 09:23:21 - App version: Passepartout 2.0.0 (3340)
  1495. 09:23:21 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1496. 09:23:21 - Cipher: AES-128-CBC
  1497. 09:23:21 - Digest: HMAC-SHA1
  1498. 09:23:21 - Compression framing: comp-lzo
  1499. 09:23:21 - Username authentication: false
  1500. 09:23:21 - Compression algorithm: lzo
  1501. 09:23:21 - Client verification: enabled
  1502. 09:23:21 - TLS wrapping: disabled
  1503. 09:23:21 - TLS security level: 0
  1504. 09:23:21 - Keep-alive interval: 10s
  1505. 09:23:21 - Keep-alive timeout: 1m
  1506. 09:23:21 - Renegotiation: never
  1507. 09:23:21 - Server EKU verification: disabled
  1508. 09:23:21 - Host SAN verification: disabled
  1509. 09:23:21 - Gateway: not configured
  1510. 09:23:21 - DNS: not configured
  1511. 09:23:21 - MTU: default
  1512. 09:23:21 - Debug: true
  1513. 09:23:21 - Masks private data: true
  1514. 09:23:21 - Creating link session
  1515. 09:23:21 - No resolved endpoints, will resort to DNS resolution
  1516. 09:23:21 - DNS resolve address: <masked>
  1517. 09:23:21 - Current SSID: none (disconnected from WiFi)
  1518. 09:23:21 - DNS resolved addresses: <masked>
  1519. 09:23:21 - Unrolled endpoints: <masked>
  1520. 09:23:21 - Pick current endpoint: <masked>
  1521. 09:23:21 - Will connect to <masked>:1194
  1522. 09:23:21 - Socket type is NEUDPSocket
  1523. 09:23:21 - Socket state is ready (endpoint: <masked> -> <masked>)
  1524. 09:23:21 - Starting VPN session
  1525. 09:23:21 - Send hard reset
  1526. 09:23:21 - Negotiation key index is 0
  1527. 09:23:21 - Control: Enqueued 1 packet [0]
  1528. 09:23:21 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: c82ab671252f31d5, pid: 0, [0 bytes]}
  1529. 09:23:21 - Send control packet (14 bytes): 38c82ab671252f31d50000000000
  1530. 09:23:21 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1531. 09:23:21 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 40d2417289c4bd00, acks: {[0], c82ab671252f31d5}, pid: 0}
  1532. 09:23:21 - Send ack for received packetId 0
  1533. 09:23:21 - Control: Write ack packet {ACK_V1 | 0, sid: c82ab671252f31d5, acks: {[0], 40d2417289c4bd00}}
  1534. 09:23:21 - Control: Remote sessionId is 40d2417289c4bd00
  1535. 09:23:21 - Start TLS handshake
  1536. 09:23:21 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1537. 09:23:21 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1538. 09:23:21 - Ack successfully written to LINK for packetId 0
  1539. 09:23:21 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1540. 09:23:21 - Cleaning up...
  1541. 09:23:21 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1542. 09:23:21 - Flushing log...
  1543. 09:23:21 - Ignoring read from outdated LINK
  1544. 09:23:21 - Cleaning up...
  1545. 09:23:22 -
  1546. 09:23:22 - --- EOF ---
  1547. 09:23:22 -
  1548. 09:23:22 - Starting tunnel...
  1549. 09:23:22 - App version: Passepartout 2.0.0 (3340)
  1550. 09:23:22 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1551. 09:23:22 - Cipher: AES-128-CBC
  1552. 09:23:22 - Digest: HMAC-SHA1
  1553. 09:23:22 - Compression framing: comp-lzo
  1554. 09:23:22 - Username authentication: false
  1555. 09:23:22 - Compression algorithm: lzo
  1556. 09:23:22 - Client verification: enabled
  1557. 09:23:22 - TLS wrapping: disabled
  1558. 09:23:22 - TLS security level: 0
  1559. 09:23:22 - Keep-alive interval: 10s
  1560. 09:23:22 - Keep-alive timeout: 1m
  1561. 09:23:22 - Renegotiation: never
  1562. 09:23:22 - Server EKU verification: disabled
  1563. 09:23:22 - Host SAN verification: disabled
  1564. 09:23:22 - Gateway: not configured
  1565. 09:23:22 - DNS: not configured
  1566. 09:23:22 - MTU: default
  1567. 09:23:22 - Debug: true
  1568. 09:23:22 - Masks private data: true
  1569. 09:23:22 - Creating link session
  1570. 09:23:22 - No resolved endpoints, will resort to DNS resolution
  1571. 09:23:22 - DNS resolve address: <masked>
  1572. 09:23:22 - Current SSID: none (disconnected from WiFi)
  1573. 09:23:22 - DNS resolved addresses: <masked>
  1574. 09:23:22 - Unrolled endpoints: <masked>
  1575. 09:23:22 - Pick current endpoint: <masked>
  1576. 09:23:22 - Will connect to <masked>:1194
  1577. 09:23:22 - Socket type is NEUDPSocket
  1578. 09:23:22 - Socket state is preparing (endpoint: <masked> -> in progress)
  1579. 09:23:22 - Socket state is ready (endpoint: <masked> -> <masked>)
  1580. 09:23:22 - Starting VPN session
  1581. 09:23:22 - Send hard reset
  1582. 09:23:22 - Negotiation key index is 0
  1583. 09:23:22 - Control: Enqueued 1 packet [0]
  1584. 09:23:22 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 9f5e34ddf7b4ffe2, pid: 0, [0 bytes]}
  1585. 09:23:22 - Send control packet (14 bytes): 389f5e34ddf7b4ffe20000000000
  1586. 09:23:22 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1587. 09:23:22 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 4ee6af05e779fa7e, acks: {[0], 9f5e34ddf7b4ffe2}, pid: 0}
  1588. 09:23:22 - Send ack for received packetId 0
  1589. 09:23:22 - Control: Write ack packet {ACK_V1 | 0, sid: 9f5e34ddf7b4ffe2, acks: {[0], 4ee6af05e779fa7e}}
  1590. 09:23:22 - Control: Remote sessionId is 4ee6af05e779fa7e
  1591. 09:23:22 - Start TLS handshake
  1592. 09:23:22 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1593. 09:23:22 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1594. 09:23:22 - Ack successfully written to LINK for packetId 0
  1595. 09:23:22 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1596. 09:23:22 - Cleaning up...
  1597. 09:23:22 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1598. 09:23:22 - Flushing log...
  1599. 09:23:22 - Ignoring read from outdated LINK
  1600. 09:23:22 - Cleaning up...
  1601. 09:23:22 -
  1602. 09:23:22 - --- EOF ---
  1603. 09:23:22 -
  1604. 09:23:22 - Starting tunnel...
  1605. 09:23:22 - App version: Passepartout 2.0.0 (3340)
  1606. 09:23:22 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1607. 09:23:22 - Cipher: AES-128-CBC
  1608. 09:23:22 - Digest: HMAC-SHA1
  1609. 09:23:22 - Compression framing: comp-lzo
  1610. 09:23:22 - Username authentication: false
  1611. 09:23:22 - Compression algorithm: lzo
  1612. 09:23:22 - Client verification: enabled
  1613. 09:23:22 - TLS wrapping: disabled
  1614. 09:23:22 - TLS security level: 0
  1615. 09:23:22 - Keep-alive interval: 10s
  1616. 09:23:22 - Keep-alive timeout: 1m
  1617. 09:23:22 - Renegotiation: never
  1618. 09:23:22 - Server EKU verification: disabled
  1619. 09:23:22 - Host SAN verification: disabled
  1620. 09:23:22 - Gateway: not configured
  1621. 09:23:22 - DNS: not configured
  1622. 09:23:22 - MTU: default
  1623. 09:23:22 - Debug: true
  1624. 09:23:22 - Masks private data: true
  1625. 09:23:22 - Creating link session
  1626. 09:23:22 - No resolved endpoints, will resort to DNS resolution
  1627. 09:23:22 - DNS resolve address: <masked>
  1628. 09:23:22 - Current SSID: none (disconnected from WiFi)
  1629. 09:23:22 - DNS resolved addresses: <masked>
  1630. 09:23:22 - Unrolled endpoints: <masked>
  1631. 09:23:22 - Pick current endpoint: <masked>
  1632. 09:23:22 - Will connect to <masked>:1194
  1633. 09:23:22 - Socket type is NEUDPSocket
  1634. 09:23:22 - Socket state is ready (endpoint: <masked> -> <masked>)
  1635. 09:23:22 - Starting VPN session
  1636. 09:23:22 - Send hard reset
  1637. 09:23:22 - Negotiation key index is 0
  1638. 09:23:22 - Control: Enqueued 1 packet [0]
  1639. 09:23:22 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: b5f3b9e49929899b, pid: 0, [0 bytes]}
  1640. 09:23:22 - Send control packet (14 bytes): 38b5f3b9e49929899b0000000000
  1641. 09:23:22 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1642. 09:23:22 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 817527092d66971d, acks: {[0], b5f3b9e49929899b}, pid: 0}
  1643. 09:23:22 - Send ack for received packetId 0
  1644. 09:23:22 - Control: Write ack packet {ACK_V1 | 0, sid: b5f3b9e49929899b, acks: {[0], 817527092d66971d}}
  1645. 09:23:22 - Control: Remote sessionId is 817527092d66971d
  1646. 09:23:22 - Start TLS handshake
  1647. 09:23:22 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1648. 09:23:22 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1649. 09:23:22 - Ack successfully written to LINK for packetId 0
  1650. 09:23:22 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1651. 09:23:22 - Cleaning up...
  1652. 09:23:22 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1653. 09:23:22 - Flushing log...
  1654. 09:23:22 - Ignoring read from outdated LINK
  1655. 09:23:22 - Cleaning up...
  1656. 09:23:23 -
  1657. 09:23:23 - --- EOF ---
  1658. 09:23:23 -
  1659. 09:23:23 - Starting tunnel...
  1660. 09:23:23 - App version: Passepartout 2.0.0 (3340)
  1661. 09:23:23 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1662. 09:23:23 - Cipher: AES-128-CBC
  1663. 09:23:23 - Digest: HMAC-SHA1
  1664. 09:23:23 - Compression framing: comp-lzo
  1665. 09:23:23 - Username authentication: false
  1666. 09:23:23 - Compression algorithm: lzo
  1667. 09:23:23 - Client verification: enabled
  1668. 09:23:23 - TLS wrapping: disabled
  1669. 09:23:23 - TLS security level: 0
  1670. 09:23:23 - Keep-alive interval: 10s
  1671. 09:23:23 - Keep-alive timeout: 1m
  1672. 09:23:23 - Renegotiation: never
  1673. 09:23:23 - Server EKU verification: disabled
  1674. 09:23:23 - Host SAN verification: disabled
  1675. 09:23:23 - Gateway: not configured
  1676. 09:23:23 - DNS: not configured
  1677. 09:23:23 - MTU: default
  1678. 09:23:23 - Debug: true
  1679. 09:23:23 - Masks private data: true
  1680. 09:23:23 - Creating link session
  1681. 09:23:23 - No resolved endpoints, will resort to DNS resolution
  1682. 09:23:23 - DNS resolve address: <masked>
  1683. 09:23:23 - Current SSID: none (disconnected from WiFi)
  1684. 09:23:23 - DNS resolved addresses: <masked>
  1685. 09:23:23 - Unrolled endpoints: <masked>
  1686. 09:23:23 - Pick current endpoint: <masked>
  1687. 09:23:23 - Will connect to <masked>:1194
  1688. 09:23:23 - Socket type is NEUDPSocket
  1689. 09:23:23 - Socket state is preparing (endpoint: <masked> -> in progress)
  1690. 09:23:23 - Starting VPN session
  1691. 09:23:23 - Send hard reset
  1692. 09:23:23 - Negotiation key index is 0
  1693. 09:23:23 - Control: Enqueued 1 packet [0]
  1694. 09:23:23 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: e7577ffb92856f3b, pid: 0, [0 bytes]}
  1695. 09:23:23 - Send control packet (14 bytes): 38e7577ffb92856f3b0000000000
  1696. 09:23:23 - Socket state is ready (endpoint: <masked> -> <masked>)
  1697. 09:23:23 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1698. 09:23:23 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 75833762275459de, acks: {[0], e7577ffb92856f3b}, pid: 0}
  1699. 09:23:23 - Send ack for received packetId 0
  1700. 09:23:23 - Control: Write ack packet {ACK_V1 | 0, sid: e7577ffb92856f3b, acks: {[0], 75833762275459de}}
  1701. 09:23:23 - Control: Remote sessionId is 75833762275459de
  1702. 09:23:23 - Start TLS handshake
  1703. 09:23:23 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1704. 09:23:23 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1705. 09:23:23 - Ack successfully written to LINK for packetId 0
  1706. 09:23:23 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1707. 09:23:23 - Cleaning up...
  1708. 09:23:23 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1709. 09:23:23 - Flushing log...
  1710. 09:23:23 - Ignoring read from outdated LINK
  1711. 09:23:23 - Cleaning up...
  1712. 09:25:26 -
  1713. 09:25:26 - --- EOF ---
  1714. 09:25:26 -
  1715. 09:25:26 - Starting tunnel...
  1716. 09:25:26 - App version: Passepartout 2.0.0 (3340)
  1717. 09:25:26 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1718. 09:25:26 - Cipher: AES-128-CBC
  1719. 09:25:26 - Digest: HMAC-SHA1
  1720. 09:25:26 - Compression framing: comp-lzo
  1721. 09:25:26 - Username authentication: false
  1722. 09:25:26 - Compression algorithm: lzo
  1723. 09:25:26 - Client verification: enabled
  1724. 09:25:26 - TLS wrapping: disabled
  1725. 09:25:26 - TLS security level: 0
  1726. 09:25:26 - Keep-alive interval: 10s
  1727. 09:25:26 - Keep-alive timeout: 1m
  1728. 09:25:26 - Renegotiation: never
  1729. 09:25:26 - Server EKU verification: disabled
  1730. 09:25:26 - Host SAN verification: disabled
  1731. 09:25:26 - Gateway: not configured
  1732. 09:25:26 - DNS: not configured
  1733. 09:25:26 - MTU: default
  1734. 09:25:26 - Debug: true
  1735. 09:25:26 - Masks private data: true
  1736. 09:25:26 - Creating link session
  1737. 09:25:26 - No resolved endpoints, will resort to DNS resolution
  1738. 09:25:26 - DNS resolve address: <masked>
  1739. 09:25:26 - DNS resolved addresses: <masked>
  1740. 09:25:26 - Unrolled endpoints: <masked>
  1741. 09:25:26 - Pick current endpoint: <masked>
  1742. 09:25:26 - Will connect to <masked>:1194
  1743. 09:25:26 - Socket type is NEUDPSocket
  1744. 09:25:26 - Current SSID: none (disconnected from WiFi)
  1745. 09:25:26 - Socket state is preparing (endpoint: <masked> -> in progress)
  1746. 09:25:26 - Socket state is ready (endpoint: <masked> -> <masked>)
  1747. 09:25:26 - Starting VPN session
  1748. 09:25:26 - Send hard reset
  1749. 09:25:26 - Negotiation key index is 0
  1750. 09:25:26 - Control: Enqueued 1 packet [0]
  1751. 09:25:26 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 6224abb168af2021, pid: 0, [0 bytes]}
  1752. 09:25:26 - Send control packet (14 bytes): 386224abb168af20210000000000
  1753. 09:25:26 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1754. 09:25:26 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: f62fc102f0eb079b, acks: {[0], 6224abb168af2021}, pid: 0}
  1755. 09:25:26 - Send ack for received packetId 0
  1756. 09:25:26 - Control: Write ack packet {ACK_V1 | 0, sid: 6224abb168af2021, acks: {[0], f62fc102f0eb079b}}
  1757. 09:25:26 - Control: Remote sessionId is f62fc102f0eb079b
  1758. 09:25:26 - Start TLS handshake
  1759. 09:25:26 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1760. 09:25:26 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1761. 09:25:26 - Ack successfully written to LINK for packetId 0
  1762. 09:25:26 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1763. 09:25:26 - Cleaning up...
  1764. 09:25:26 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1765. 09:25:26 - Flushing log...
  1766. 09:25:26 - Ignoring read from outdated LINK
  1767. 09:25:26 - Cleaning up...
  1768. 09:25:26 -
  1769. 09:25:26 - --- EOF ---
  1770. 09:25:26 -
  1771. 09:25:26 - Starting tunnel...
  1772. 09:25:26 - App version: Passepartout 2.0.0 (3340)
  1773. 09:25:26 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1774. 09:25:26 - Cipher: AES-128-CBC
  1775. 09:25:26 - Digest: HMAC-SHA1
  1776. 09:25:26 - Compression framing: comp-lzo
  1777. 09:25:26 - Username authentication: false
  1778. 09:25:26 - Compression algorithm: lzo
  1779. 09:25:26 - Client verification: enabled
  1780. 09:25:26 - TLS wrapping: disabled
  1781. 09:25:26 - TLS security level: 0
  1782. 09:25:26 - Keep-alive interval: 10s
  1783. 09:25:26 - Keep-alive timeout: 1m
  1784. 09:25:26 - Renegotiation: never
  1785. 09:25:26 - Server EKU verification: disabled
  1786. 09:25:26 - Host SAN verification: disabled
  1787. 09:25:26 - Gateway: not configured
  1788. 09:25:26 - DNS: not configured
  1789. 09:25:26 - MTU: default
  1790. 09:25:26 - Debug: true
  1791. 09:25:26 - Masks private data: true
  1792. 09:25:26 - Creating link session
  1793. 09:25:26 - No resolved endpoints, will resort to DNS resolution
  1794. 09:25:26 - DNS resolve address: <masked>
  1795. 09:25:26 - Current SSID: none (disconnected from WiFi)
  1796. 09:25:26 - DNS resolved addresses: <masked>
  1797. 09:25:26 - Unrolled endpoints: <masked>
  1798. 09:25:26 - Pick current endpoint: <masked>
  1799. 09:25:26 - Will connect to <masked>:1194
  1800. 09:25:26 - Socket type is NEUDPSocket
  1801. 09:25:26 - Socket state is ready (endpoint: <masked> -> <masked>)
  1802. 09:25:26 - Starting VPN session
  1803. 09:25:26 - Send hard reset
  1804. 09:25:26 - Negotiation key index is 0
  1805. 09:25:26 - Control: Enqueued 1 packet [0]
  1806. 09:25:26 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: f356651dc231bdd6, pid: 0, [0 bytes]}
  1807. 09:25:26 - Send control packet (14 bytes): 38f356651dc231bdd60000000000
  1808. 09:25:27 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1809. 09:25:27 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 8d33f9441eefdec6, acks: {[0], f356651dc231bdd6}, pid: 0}
  1810. 09:25:27 - Send ack for received packetId 0
  1811. 09:25:27 - Control: Write ack packet {ACK_V1 | 0, sid: f356651dc231bdd6, acks: {[0], 8d33f9441eefdec6}}
  1812. 09:25:27 - Control: Remote sessionId is 8d33f9441eefdec6
  1813. 09:25:27 - Start TLS handshake
  1814. 09:25:27 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1815. 09:25:27 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1816. 09:25:27 - Ack successfully written to LINK for packetId 0
  1817. 09:25:27 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1818. 09:25:27 - Cleaning up...
  1819. 09:25:27 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1820. 09:25:27 - Flushing log...
  1821. 09:25:27 - Ignoring read from outdated LINK
  1822. 09:25:27 - Cleaning up...
  1823. 09:25:27 -
  1824. 09:25:27 - --- EOF ---
  1825. 09:25:27 -
  1826. 09:25:27 - Starting tunnel...
  1827. 09:25:27 - App version: Passepartout 2.0.0 (3340)
  1828. 09:25:27 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1829. 09:25:27 - Cipher: AES-128-CBC
  1830. 09:25:27 - Digest: HMAC-SHA1
  1831. 09:25:27 - Compression framing: comp-lzo
  1832. 09:25:27 - Username authentication: false
  1833. 09:25:27 - Compression algorithm: lzo
  1834. 09:25:27 - Client verification: enabled
  1835. 09:25:27 - TLS wrapping: disabled
  1836. 09:25:27 - TLS security level: 0
  1837. 09:25:27 - Keep-alive interval: 10s
  1838. 09:25:27 - Keep-alive timeout: 1m
  1839. 09:25:27 - Renegotiation: never
  1840. 09:25:27 - Server EKU verification: disabled
  1841. 09:25:27 - Host SAN verification: disabled
  1842. 09:25:27 - Gateway: not configured
  1843. 09:25:27 - DNS: not configured
  1844. 09:25:27 - MTU: default
  1845. 09:25:27 - Debug: true
  1846. 09:25:27 - Masks private data: true
  1847. 09:25:27 - Creating link session
  1848. 09:25:27 - No resolved endpoints, will resort to DNS resolution
  1849. 09:25:27 - DNS resolve address: <masked>
  1850. 09:25:27 - Current SSID: none (disconnected from WiFi)
  1851. 09:25:27 - DNS resolved addresses: <masked>
  1852. 09:25:27 - Unrolled endpoints: <masked>
  1853. 09:25:27 - Pick current endpoint: <masked>
  1854. 09:25:27 - Will connect to <masked>:1194
  1855. 09:25:27 - Socket type is NEUDPSocket
  1856. 09:25:27 - Socket state is ready (endpoint: <masked> -> <masked>)
  1857. 09:25:27 - Starting VPN session
  1858. 09:25:27 - Send hard reset
  1859. 09:25:27 - Negotiation key index is 0
  1860. 09:25:27 - Control: Enqueued 1 packet [0]
  1861. 09:25:27 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 90309efad0aa3482, pid: 0, [0 bytes]}
  1862. 09:25:27 - Send control packet (14 bytes): 3890309efad0aa34820000000000
  1863. 09:25:27 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1864. 09:25:27 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 4fdfeff40674cbab, acks: {[0], 90309efad0aa3482}, pid: 0}
  1865. 09:25:27 - Send ack for received packetId 0
  1866. 09:25:27 - Control: Write ack packet {ACK_V1 | 0, sid: 90309efad0aa3482, acks: {[0], 4fdfeff40674cbab}}
  1867. 09:25:27 - Control: Remote sessionId is 4fdfeff40674cbab
  1868. 09:25:27 - Start TLS handshake
  1869. 09:25:27 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1870. 09:25:27 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1871. 09:25:27 - Ack successfully written to LINK for packetId 0
  1872. 09:25:27 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1873. 09:25:27 - Cleaning up...
  1874. 09:25:27 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1875. 09:25:27 - Flushing log...
  1876. 09:25:27 - Ignoring read from outdated LINK
  1877. 09:25:27 - Cleaning up...
  1878. 09:25:27 -
  1879. 09:25:27 - --- EOF ---
  1880. 09:25:27 -
  1881. 09:25:27 - Starting tunnel...
  1882. 09:25:27 - App version: Passepartout 2.0.0 (3340)
  1883. 09:25:27 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1884. 09:25:27 - Cipher: AES-128-CBC
  1885. 09:25:27 - Digest: HMAC-SHA1
  1886. 09:25:27 - Compression framing: comp-lzo
  1887. 09:25:27 - Username authentication: false
  1888. 09:25:27 - Compression algorithm: lzo
  1889. 09:25:27 - Client verification: enabled
  1890. 09:25:27 - TLS wrapping: disabled
  1891. 09:25:27 - TLS security level: 0
  1892. 09:25:27 - Keep-alive interval: 10s
  1893. 09:25:27 - Keep-alive timeout: 1m
  1894. 09:25:27 - Renegotiation: never
  1895. 09:25:27 - Server EKU verification: disabled
  1896. 09:25:27 - Host SAN verification: disabled
  1897. 09:25:27 - Gateway: not configured
  1898. 09:25:27 - DNS: not configured
  1899. 09:25:27 - MTU: default
  1900. 09:25:27 - Debug: true
  1901. 09:25:27 - Masks private data: true
  1902. 09:25:27 - Creating link session
  1903. 09:25:27 - No resolved endpoints, will resort to DNS resolution
  1904. 09:25:27 - DNS resolve address: <masked>
  1905. 09:25:27 - Current SSID: none (disconnected from WiFi)
  1906. 09:25:27 - DNS resolved addresses: <masked>
  1907. 09:25:27 - Unrolled endpoints: <masked>
  1908. 09:25:27 - Pick current endpoint: <masked>
  1909. 09:25:27 - Will connect to <masked>:1194
  1910. 09:25:27 - Socket type is NEUDPSocket
  1911. 09:25:27 - Socket state is ready (endpoint: <masked> -> <masked>)
  1912. 09:25:27 - Starting VPN session
  1913. 09:25:27 - Send hard reset
  1914. 09:25:27 - Negotiation key index is 0
  1915. 09:25:27 - Control: Enqueued 1 packet [0]
  1916. 09:25:27 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: feadd873ad893279, pid: 0, [0 bytes]}
  1917. 09:25:27 - Send control packet (14 bytes): 38feadd873ad8932790000000000
  1918. 09:25:27 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1919. 09:25:27 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 4dc60527a10ea724, acks: {[0], feadd873ad893279}, pid: 0}
  1920. 09:25:27 - Send ack for received packetId 0
  1921. 09:25:27 - Control: Write ack packet {ACK_V1 | 0, sid: feadd873ad893279, acks: {[0], 4dc60527a10ea724}}
  1922. 09:25:27 - Control: Remote sessionId is 4dc60527a10ea724
  1923. 09:25:27 - Start TLS handshake
  1924. 09:25:27 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1925. 09:25:27 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1926. 09:25:27 - Ack successfully written to LINK for packetId 0
  1927. 09:25:27 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1928. 09:25:27 - Cleaning up...
  1929. 09:25:27 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1930. 09:25:27 - Flushing log...
  1931. 09:25:27 - Ignoring read from outdated LINK
  1932. 09:25:27 - Cleaning up...
  1933. 09:26:26 -
  1934. 09:26:26 - --- EOF ---
  1935. 09:26:26 -
  1936. 09:26:26 - Starting tunnel...
  1937. 09:26:26 - App version: Passepartout 2.0.0 (3340)
  1938. 09:26:26 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1939. 09:26:26 - Cipher: AES-128-CBC
  1940. 09:26:26 - Digest: HMAC-SHA1
  1941. 09:26:26 - Compression framing: comp-lzo
  1942. 09:26:26 - Username authentication: false
  1943. 09:26:26 - Compression algorithm: lzo
  1944. 09:26:26 - Client verification: enabled
  1945. 09:26:26 - TLS wrapping: disabled
  1946. 09:26:26 - TLS security level: 0
  1947. 09:26:26 - Keep-alive interval: 10s
  1948. 09:26:26 - Keep-alive timeout: 1m
  1949. 09:26:26 - Renegotiation: never
  1950. 09:26:26 - Server EKU verification: disabled
  1951. 09:26:26 - Host SAN verification: disabled
  1952. 09:26:26 - Gateway: not configured
  1953. 09:26:26 - DNS: not configured
  1954. 09:26:26 - MTU: default
  1955. 09:26:26 - Debug: true
  1956. 09:26:26 - Masks private data: true
  1957. 09:26:26 - Creating link session
  1958. 09:26:26 - No resolved endpoints, will resort to DNS resolution
  1959. 09:26:26 - DNS resolve address: <masked>
  1960. 09:26:26 - DNS resolved addresses: <masked>
  1961. 09:26:26 - Unrolled endpoints: <masked>
  1962. 09:26:26 - Pick current endpoint: <masked>
  1963. 09:26:26 - Will connect to <masked>:1194
  1964. 09:26:26 - Socket type is NEUDPSocket
  1965. 09:26:26 - Socket state is preparing (endpoint: <masked> -> in progress)
  1966. 09:26:26 - Current SSID: none (disconnected from WiFi)
  1967. 09:26:26 - Socket state is ready (endpoint: <masked> -> <masked>)
  1968. 09:26:26 - Starting VPN session
  1969. 09:26:26 - Send hard reset
  1970. 09:26:26 - Negotiation key index is 0
  1971. 09:26:26 - Control: Enqueued 1 packet [0]
  1972. 09:26:26 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 6595149cc9add648, pid: 0, [0 bytes]}
  1973. 09:26:26 - Send control packet (14 bytes): 386595149cc9add6480000000000
  1974. 09:26:26 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  1975. 09:26:26 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: ad7b0039b51eedd6, acks: {[0], 6595149cc9add648}, pid: 0}
  1976. 09:26:26 - Send ack for received packetId 0
  1977. 09:26:26 - Control: Write ack packet {ACK_V1 | 0, sid: 6595149cc9add648, acks: {[0], ad7b0039b51eedd6}}
  1978. 09:26:26 - Control: Remote sessionId is ad7b0039b51eedd6
  1979. 09:26:26 - Start TLS handshake
  1980. 09:26:26 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1981. 09:26:26 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  1982. 09:26:26 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  1983. 09:26:26 - Cleaning up...
  1984. 09:26:26 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  1985. 09:26:26 - Flushing log...
  1986. 09:26:26 - Ignoring write from outdated LINK
  1987. 09:26:26 - Ignoring read from outdated LINK
  1988. 09:26:26 - Cleaning up...
  1989. 09:26:26 -
  1990. 09:26:26 - --- EOF ---
  1991. 09:26:26 -
  1992. 09:26:26 - Starting tunnel...
  1993. 09:26:26 - App version: Passepartout 2.0.0 (3340)
  1994. 09:26:26 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  1995. 09:26:26 - Cipher: AES-128-CBC
  1996. 09:26:26 - Digest: HMAC-SHA1
  1997. 09:26:26 - Compression framing: comp-lzo
  1998. 09:26:26 - Username authentication: false
  1999. 09:26:26 - Compression algorithm: lzo
  2000. 09:26:26 - Client verification: enabled
  2001. 09:26:26 - TLS wrapping: disabled
  2002. 09:26:26 - TLS security level: 0
  2003. 09:26:26 - Keep-alive interval: 10s
  2004. 09:26:26 - Keep-alive timeout: 1m
  2005. 09:26:26 - Renegotiation: never
  2006. 09:26:26 - Server EKU verification: disabled
  2007. 09:26:26 - Host SAN verification: disabled
  2008. 09:26:26 - Gateway: not configured
  2009. 09:26:26 - DNS: not configured
  2010. 09:26:26 - MTU: default
  2011. 09:26:26 - Debug: true
  2012. 09:26:26 - Masks private data: true
  2013. 09:26:26 - Creating link session
  2014. 09:26:26 - No resolved endpoints, will resort to DNS resolution
  2015. 09:26:26 - DNS resolve address: <masked>
  2016. 09:26:26 - Current SSID: none (disconnected from WiFi)
  2017. 09:26:26 - DNS resolved addresses: <masked>
  2018. 09:26:26 - Unrolled endpoints: <masked>
  2019. 09:26:26 - Pick current endpoint: <masked>
  2020. 09:26:26 - Will connect to <masked>:1194
  2021. 09:26:26 - Socket type is NEUDPSocket
  2022. 09:26:26 - Socket state is preparing (endpoint: <masked> -> in progress)
  2023. 09:26:26 - Socket state is ready (endpoint: <masked> -> <masked>)
  2024. 09:26:26 - Starting VPN session
  2025. 09:26:26 - Send hard reset
  2026. 09:26:26 - Negotiation key index is 0
  2027. 09:26:26 - Control: Enqueued 1 packet [0]
  2028. 09:26:26 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: 4bf478856be9355a, pid: 0, [0 bytes]}
  2029. 09:26:26 - Send control packet (14 bytes): 384bf478856be9355a0000000000
  2030. 09:26:26 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  2031. 09:26:26 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 069fb652edb9ae59, acks: {[0], 4bf478856be9355a}, pid: 0}
  2032. 09:26:26 - Send ack for received packetId 0
  2033. 09:26:26 - Control: Write ack packet {ACK_V1 | 0, sid: 4bf478856be9355a, acks: {[0], 069fb652edb9ae59}}
  2034. 09:26:26 - Control: Remote sessionId is 069fb652edb9ae59
  2035. 09:26:26 - Start TLS handshake
  2036. 09:26:26 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  2037. 09:26:26 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  2038. 09:26:26 - Ack successfully written to LINK for packetId 0
  2039. 09:26:26 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  2040. 09:26:26 - Cleaning up...
  2041. 09:26:26 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  2042. 09:26:26 - Flushing log...
  2043. 09:26:26 - Ignoring read from outdated LINK
  2044. 09:26:26 - Cleaning up...
  2045. 09:26:27 -
  2046. 09:26:27 - --- EOF ---
  2047. 09:26:27 -
  2048. 09:26:27 - Starting tunnel...
  2049. 09:26:27 - App version: Passepartout 2.0.0 (3340)
  2050. 09:26:27 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  2051. 09:26:27 - Cipher: AES-128-CBC
  2052. 09:26:27 - Digest: HMAC-SHA1
  2053. 09:26:27 - Compression framing: comp-lzo
  2054. 09:26:27 - Username authentication: false
  2055. 09:26:27 - Compression algorithm: lzo
  2056. 09:26:27 - Client verification: enabled
  2057. 09:26:27 - TLS wrapping: disabled
  2058. 09:26:27 - TLS security level: 0
  2059. 09:26:27 - Keep-alive interval: 10s
  2060. 09:26:27 - Keep-alive timeout: 1m
  2061. 09:26:27 - Renegotiation: never
  2062. 09:26:27 - Server EKU verification: disabled
  2063. 09:26:27 - Host SAN verification: disabled
  2064. 09:26:27 - Gateway: not configured
  2065. 09:26:27 - DNS: not configured
  2066. 09:26:27 - MTU: default
  2067. 09:26:27 - Debug: true
  2068. 09:26:27 - Masks private data: true
  2069. 09:26:27 - Creating link session
  2070. 09:26:27 - No resolved endpoints, will resort to DNS resolution
  2071. 09:26:27 - DNS resolve address: <masked>
  2072. 09:26:27 - Current SSID: none (disconnected from WiFi)
  2073. 09:26:27 - DNS resolved addresses: <masked>
  2074. 09:26:27 - Unrolled endpoints: <masked>
  2075. 09:26:27 - Pick current endpoint: <masked>
  2076. 09:26:27 - Will connect to <masked>:1194
  2077. 09:26:27 - Socket type is NEUDPSocket
  2078. 09:26:27 - Socket state is ready (endpoint: <masked> -> <masked>)
  2079. 09:26:27 - Starting VPN session
  2080. 09:26:27 - Send hard reset
  2081. 09:26:27 - Negotiation key index is 0
  2082. 09:26:27 - Control: Enqueued 1 packet [0]
  2083. 09:26:27 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: b0a3501c8cf0f957, pid: 0, [0 bytes]}
  2084. 09:26:27 - Send control packet (14 bytes): 38b0a3501c8cf0f9570000000000
  2085. 09:26:27 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  2086. 09:26:27 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: f3b27cdcd2dccb0a, acks: {[0], b0a3501c8cf0f957}, pid: 0}
  2087. 09:26:27 - Send ack for received packetId 0
  2088. 09:26:27 - Control: Write ack packet {ACK_V1 | 0, sid: b0a3501c8cf0f957, acks: {[0], f3b27cdcd2dccb0a}}
  2089. 09:26:27 - Control: Remote sessionId is f3b27cdcd2dccb0a
  2090. 09:26:27 - Start TLS handshake
  2091. 09:26:27 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  2092. 09:26:27 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  2093. 09:26:27 - Ack successfully written to LINK for packetId 0
  2094. 09:26:27 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  2095. 09:26:27 - Cleaning up...
  2096. 09:26:27 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  2097. 09:26:27 - Flushing log...
  2098. 09:26:27 - Ignoring read from outdated LINK
  2099. 09:26:27 - Cleaning up...
  2100. 09:26:27 -
  2101. 09:26:27 - --- EOF ---
  2102. 09:26:27 -
  2103. 09:26:27 - Starting tunnel...
  2104. 09:26:27 - App version: Passepartout 2.0.0 (3340)
  2105. 09:26:27 - Remotes: [<masked>:UDP:1194, <masked>:UDP:1194]
  2106. 09:26:27 - Cipher: AES-128-CBC
  2107. 09:26:27 - Digest: HMAC-SHA1
  2108. 09:26:27 - Compression framing: comp-lzo
  2109. 09:26:27 - Username authentication: false
  2110. 09:26:27 - Compression algorithm: lzo
  2111. 09:26:27 - Client verification: enabled
  2112. 09:26:27 - TLS wrapping: disabled
  2113. 09:26:27 - TLS security level: 0
  2114. 09:26:27 - Keep-alive interval: 10s
  2115. 09:26:27 - Keep-alive timeout: 1m
  2116. 09:26:27 - Renegotiation: never
  2117. 09:26:27 - Server EKU verification: disabled
  2118. 09:26:27 - Host SAN verification: disabled
  2119. 09:26:27 - Gateway: not configured
  2120. 09:26:27 - DNS: not configured
  2121. 09:26:27 - MTU: default
  2122. 09:26:27 - Debug: true
  2123. 09:26:27 - Masks private data: true
  2124. 09:26:27 - Creating link session
  2125. 09:26:27 - No resolved endpoints, will resort to DNS resolution
  2126. 09:26:27 - DNS resolve address: <masked>
  2127. 09:26:27 - DNS resolved addresses: <masked>
  2128. 09:26:27 - Current SSID: none (disconnected from WiFi)
  2129. 09:26:27 - Unrolled endpoints: <masked>
  2130. 09:26:27 - Pick current endpoint: <masked>
  2131. 09:26:27 - Will connect to <masked>:1194
  2132. 09:26:27 - Socket type is NEUDPSocket
  2133. 09:26:27 - Socket state is ready (endpoint: <masked> -> <masked>)
  2134. 09:26:27 - Starting VPN session
  2135. 09:26:27 - Send hard reset
  2136. 09:26:27 - Negotiation key index is 0
  2137. 09:26:27 - Control: Enqueued 1 packet [0]
  2138. 09:26:27 - Control: Write control packet {HARD_RESET_CLIENT_V2 | 0, sid: aa9b4beef704b291, pid: 0, [0 bytes]}
  2139. 09:26:27 - Send control packet (14 bytes): 38aa9b4beef704b2910000000000
  2140. 09:26:27 - Control: Try read packet with code HARD_RESET_SERVER_V2 and key 0
  2141. 09:26:27 - Control: Read packet {HARD_RESET_SERVER_V2 | 0, sid: 8be10b53ed791858, acks: {[0], aa9b4beef704b291}, pid: 0}
  2142. 09:26:27 - Send ack for received packetId 0
  2143. 09:26:27 - Control: Write ack packet {ACK_V1 | 0, sid: aa9b4beef704b291, acks: {[0], 8be10b53ed791858}}
  2144. 09:26:27 - Control: Remote sessionId is 8be10b53ed791858
  2145. 09:26:27 - Start TLS handshake
  2146. 09:26:27 - Trigger shutdown (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  2147. 09:26:27 - Session did stop with error: Error Domain=TunnelKitOpenVPN Code=204 "(null)"
  2148. 09:26:27 - Ack successfully written to LINK for packetId 0
  2149. 09:26:27 - Socket state is cancelled (endpoint: <masked> -> <masked>)
  2150. 09:26:27 - Cleaning up...
  2151. 09:26:27 - Tunnel did stop (error: Error Domain=TunnelKitOpenVPN Code=204 "(null)")
  2152. 09:26:27 - Flushing log...
  2153. 09:26:27 - Ignoring read from outdated LINK
  2154. 09:26:27 - Cleaning up...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement