Advertisement
Guest User

Untitled

a guest
Oct 28th, 2015
159
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 23.29 KB | None | 0 0
  1. 2015-10-28 09:54:05 official build 0.6.43 running on motorola XT1095 (MSM8974), Android 5.1.1 (LMY48W) API 22, ABI armeabi-v7a, (motorola/victara_tmo/victara:5.1/LPE23.32-21.3/5:user/release-keys)
  2. 2015-10-28 09:54:05 Building configuration…
  3. 2015-10-28 09:54:08 started Socket Thread
  4. 2015-10-28 09:54:08 Network Status: CONNECTED to WIFI "EmployeeHotspot"
  5. 2015-10-28 09:54:08 Current Parameter Settings:
  6. 2015-10-28 09:54:08 config = '/data/data/de.blinkt.openvpn/cache/android.conf'
  7. 2015-10-28 09:54:08 mode = 0
  8. 2015-10-28 09:54:08 show_ciphers = DISABLED
  9. 2015-10-28 09:54:08 show_digests = DISABLED
  10. 2015-10-28 09:54:08 show_engines = DISABLED
  11. 2015-10-28 09:54:08 genkey = DISABLED
  12. 2015-10-28 09:54:08 key_pass_file = '[UNDEF]'
  13. 2015-10-28 09:54:08 show_tls_ciphers = DISABLED
  14. 2015-10-28 09:54:08 connect_retry_max = 50
  15. 2015-10-28 09:54:08 Connection profiles [0]:
  16. 2015-10-28 09:54:08 proto = udp
  17. 2015-10-28 09:54:08 local = '[UNDEF]'
  18. 2015-10-28 09:54:08 local_port = '1194'
  19. 2015-10-28 09:54:08 remote = 'craftyguy.net'
  20. 2015-10-28 09:54:08 remote_port = '1194'
  21. 2015-10-28 09:54:08 remote_float = ENABLED
  22. 2015-10-28 09:54:08 bind_defined = DISABLED
  23. 2015-10-28 09:54:08 bind_local = ENABLED
  24. 2015-10-28 09:54:08 bind_ipv6_only = DISABLED
  25. 2015-10-28 09:54:08 connect_retry_seconds = 5
  26. 2015-10-28 09:54:08 connect_timeout = 150
  27. 2015-10-28 09:54:08 socks_proxy_server = '[UNDEF]'
  28. 2015-10-28 09:54:08 socks_proxy_port = '[UNDEF]'
  29. 2015-10-28 09:54:08 socks_proxy_retry = DISABLED
  30. 2015-10-28 09:54:08 tun_mtu = 1500
  31. 2015-10-28 09:54:08 tun_mtu_defined = ENABLED
  32. 2015-10-28 09:54:08 link_mtu = 1500
  33. 2015-10-28 09:54:08 link_mtu_defined = DISABLED
  34. 2015-10-28 09:54:08 tun_mtu_extra = 0
  35. 2015-10-28 09:54:08 tun_mtu_extra_defined = DISABLED
  36. 2015-10-28 09:54:08 mtu_discover_type = -1
  37. 2015-10-28 09:54:08 fragment = 0
  38. 2015-10-28 09:54:08 mssfix = 1450
  39. 2015-10-28 09:54:08 explicit_exit_notification = 0
  40. 2015-10-28 09:54:08 Connection profiles END
  41. 2015-10-28 09:54:08 remote_random = DISABLED
  42. 2015-10-28 09:54:08 ipchange = '[UNDEF]'
  43. 2015-10-28 09:54:08 dev = 'tun'
  44. 2015-10-28 09:54:08 dev_type = '[UNDEF]'
  45. 2015-10-28 09:54:08 dev_node = '[UNDEF]'
  46. 2015-10-28 09:54:08 lladdr = '[UNDEF]'
  47. 2015-10-28 09:54:08 topology = 1
  48. 2015-10-28 09:54:08 tun_ipv6 = DISABLED
  49. 2015-10-28 09:54:08 ifconfig_local = '[UNDEF]'
  50. 2015-10-28 09:54:08 ifconfig_remote_netmask = '[UNDEF]'
  51. 2015-10-28 09:54:08 ifconfig_noexec = DISABLED
  52. 2015-10-28 09:54:08 ifconfig_nowarn = ENABLED
  53. 2015-10-28 09:54:08 ifconfig_ipv6_local = '[UNDEF]'
  54. 2015-10-28 09:54:08 ifconfig_ipv6_netbits = 0
  55. 2015-10-28 09:54:08 ifconfig_ipv6_remote = '[UNDEF]'
  56. 2015-10-28 09:54:08 shaper = 0
  57. 2015-10-28 09:54:08 mtu_test = 0
  58. 2015-10-28 09:54:08 mlock = DISABLED
  59. 2015-10-28 09:54:08 keepalive_ping = 0
  60. 2015-10-28 09:54:08 keepalive_timeout = 0
  61. 2015-10-28 09:54:08 inactivity_timeout = 0
  62. 2015-10-28 09:54:08 ping_send_timeout = 0
  63. 2015-10-28 09:54:08 ping_rec_timeout = 0
  64. 2015-10-28 09:54:08 ping_rec_timeout_action = 0
  65. 2015-10-28 09:54:08 ping_timer_remote = DISABLED
  66. 2015-10-28 09:54:08 remap_sigusr1 = 0
  67. 2015-10-28 09:54:08 persist_tun = ENABLED
  68. 2015-10-28 09:54:08 persist_local_ip = DISABLED
  69. 2015-10-28 09:54:08 persist_remote_ip = DISABLED
  70. 2015-10-28 09:54:08 persist_key = DISABLED
  71. 2015-10-28 09:54:08 passtos = DISABLED
  72. 2015-10-28 09:54:08 resolve_retry_seconds = 60
  73. 2015-10-28 09:54:08 resolve_in_advance = ENABLED
  74. 2015-10-28 09:54:08 username = '[UNDEF]'
  75. 2015-10-28 09:54:08 groupname = '[UNDEF]'
  76. 2015-10-28 09:54:08 chroot_dir = '[UNDEF]'
  77. 2015-10-28 09:54:08 cd_dir = '[UNDEF]'
  78. 2015-10-28 09:54:08 writepid = '[UNDEF]'
  79. 2015-10-28 09:54:08 up_script = '[UNDEF]'
  80. 2015-10-28 09:54:08 down_script = '[UNDEF]'
  81. 2015-10-28 09:54:08 down_pre = DISABLED
  82. 2015-10-28 09:54:08 up_restart = DISABLED
  83. 2015-10-28 09:54:08 up_delay = DISABLED
  84. 2015-10-28 09:54:08 daemon = DISABLED
  85. 2015-10-28 09:54:08 inetd = 0
  86. 2015-10-28 09:54:08 log = DISABLED
  87. 2015-10-28 09:54:08 suppress_timestamps = DISABLED
  88. 2015-10-28 09:54:08 machine_readable_output = ENABLED
  89. 2015-10-28 09:54:08 nice = 0
  90. 2015-10-28 09:54:08 verbosity = 4
  91. 2015-10-28 09:54:08 mute = 0
  92. 2015-10-28 09:54:08 gremlin = 0
  93. 2015-10-28 09:54:08 status_file = '[UNDEF]'
  94. 2015-10-28 09:54:08 status_file_version = 1
  95. 2015-10-28 09:54:08 status_file_update_freq = 60
  96. 2015-10-28 09:54:08 occ = ENABLED
  97. 2015-10-28 09:54:08 rcvbuf = 0
  98. 2015-10-28 09:54:08 sndbuf = 0
  99. 2015-10-28 09:54:08 sockflags = 0
  100. 2015-10-28 09:54:08 fast_io = DISABLED
  101. 2015-10-28 09:54:08 comp.alg = 0
  102. 2015-10-28 09:54:08 comp.flags = 0
  103. 2015-10-28 09:54:08 route_script = '[UNDEF]'
  104. 2015-10-28 09:54:08 route_default_gateway = '[UNDEF]'
  105. 2015-10-28 09:54:08 route_default_metric = 0
  106. 2015-10-28 09:54:08 route_noexec = DISABLED
  107. 2015-10-28 09:54:08 route_delay = 0
  108. 2015-10-28 09:54:08 route_delay_window = 30
  109. 2015-10-28 09:54:08 route_delay_defined = DISABLED
  110. 2015-10-28 09:54:08 route_nopull = DISABLED
  111. 2015-10-28 09:54:08 route_gateway_via_dhcp = DISABLED
  112. 2015-10-28 09:54:08 allow_pull_fqdn = DISABLED
  113. 2015-10-28 09:54:08 route 0.0.0.0/0.0.0.0/vpn_gateway/nil
  114. 2015-10-28 09:54:08 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'
  115. 2015-10-28 09:54:08 management_port = 'unix'
  116. 2015-10-28 09:54:08 management_user_pass = '[UNDEF]'
  117. 2015-10-28 09:54:08 management_log_history_cache = 250
  118. 2015-10-28 09:54:08 management_echo_buffer_size = 100
  119. 2015-10-28 09:54:08 management_write_peer_info_file = '[UNDEF]'
  120. 2015-10-28 09:54:08 management_client_user = '[UNDEF]'
  121. 2015-10-28 09:54:08 management_client_group = '[UNDEF]'
  122. 2015-10-28 09:54:08 management_flags = 4902
  123. 2015-10-28 09:54:08 shared_secret_file = '[UNDEF]'
  124. 2015-10-28 09:54:08 key_direction = 2
  125. 2015-10-28 09:54:08 ciphername_defined = ENABLED
  126. 2015-10-28 09:54:08 ciphername = 'aes-256-cbc'
  127. 2015-10-28 09:54:08 authname_defined = ENABLED
  128. 2015-10-28 09:54:08 authname = 'SHA1'
  129. 2015-10-28 09:54:08 prng_hash = 'SHA1'
  130. 2015-10-28 09:54:08 prng_nonce_secret_len = 16
  131. 2015-10-28 09:54:08 keysize = 0
  132. 2015-10-28 09:54:08 engine = DISABLED
  133. 2015-10-28 09:54:08 replay = ENABLED
  134. 2015-10-28 09:54:08 mute_replay_warnings = DISABLED
  135. 2015-10-28 09:54:08 replay_window = 64
  136. 2015-10-28 09:54:08 replay_time = 15
  137. 2015-10-28 09:54:08 packet_id_file = '[UNDEF]'
  138. 2015-10-28 09:54:08 use_iv = ENABLED
  139. 2015-10-28 09:54:08 test_crypto = DISABLED
  140. 2015-10-28 09:54:08 tls_server = DISABLED
  141. 2015-10-28 09:54:08 tls_client = ENABLED
  142. 2015-10-28 09:54:08 key_method = 2
  143. 2015-10-28 09:54:08 ca_file = '[[INLINE]]'
  144. 2015-10-28 09:54:08 ca_path = '[UNDEF]'
  145. 2015-10-28 09:54:08 dh_file = '[UNDEF]'
  146. 2015-10-28 09:54:08 cert_file = '[[INLINE]]'
  147. 2015-10-28 09:54:08 extra_certs_file = '[[INLINE]]'
  148. 2015-10-28 09:54:08 "priv_key_file" = EXTERNAL_PRIVATE_KEY
  149. 2015-10-28 09:54:08 pkcs12_file = '[UNDEF]'
  150. 2015-10-28 09:54:08 cipher_list = '[UNDEF]'
  151. 2015-10-28 09:54:08 tls_verify = '[UNDEF]'
  152. 2015-10-28 09:54:08 tls_export_cert = '[UNDEF]'
  153. 2015-10-28 09:54:08 verify_x509_type = 0
  154. 2015-10-28 09:54:08 verify_x509_name = '[UNDEF]'
  155. 2015-10-28 09:54:08 crl_file = '[UNDEF]'
  156. 2015-10-28 09:54:08 ns_cert_type = 0
  157. 2015-10-28 09:54:08 remote_cert_ku[i] = 160
  158. 2015-10-28 09:54:08 remote_cert_ku[i] = 136
  159. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  160. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  161. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  162. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  163. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  164. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  165. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  166. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  167. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  168. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  169. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  170. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  171. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  172. 2015-10-28 09:54:08 remote_cert_ku[i] = 0
  173. 2015-10-28 09:54:08 remote_cert_eku = 'TLS Web Server Authentication'
  174. 2015-10-28 09:54:08 ssl_flags = 0
  175. 2015-10-28 09:54:08 tls_timeout = 2
  176. 2015-10-28 09:54:08 renegotiate_bytes = 0
  177. 2015-10-28 09:54:08 renegotiate_packets = 0
  178. 2015-10-28 09:54:08 renegotiate_seconds = 3600
  179. 2015-10-28 09:54:08 handshake_window = 60
  180. 2015-10-28 09:54:08 transition_window = 3600
  181. 2015-10-28 09:54:08 single_session = DISABLED
  182. 2015-10-28 09:54:08 push_peer_info = DISABLED
  183. 2015-10-28 09:54:08 tls_exit = DISABLED
  184. 2015-10-28 09:54:08 tls_auth_file = '[[INLINE]]'
  185. 2015-10-28 09:54:08 client = ENABLED
  186. 2015-10-28 09:54:08 pull = ENABLED
  187. 2015-10-28 09:54:08 auth_user_pass_file = '[UNDEF]'
  188. 2015-10-28 09:54:08 OpenVPN 2.4-icsopenvpn [git:icsopenvpn_642-62c7d5f90844609f] android-14-armeabi-v7a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH] [IPv6] built on Oct 25 2015
  189. 2015-10-28 09:54:08 library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.09
  190. 2015-10-28 09:54:08 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket
  191. 2015-10-28 09:54:08 MANAGEMENT: CMD 'hold release'
  192. 2015-10-28 09:54:08 MANAGEMENT: CMD 'bytecount 2'
  193. 2015-10-28 09:54:08 MANAGEMENT: CMD 'state on'
  194. 2015-10-28 09:54:08 MANAGEMENT: CMD 'proxy NONE'
  195. 2015-10-28 09:54:09 Control Channel Authentication: tls-auth using INLINE static key file
  196. 2015-10-28 09:54:09 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  197. 2015-10-28 09:54:09 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  198. 2015-10-28 09:54:09 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  199. 2015-10-28 09:54:09 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
  200. 2015-10-28 09:54:09 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  201. 2015-10-28 09:54:09 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  202. 2015-10-28 09:54:09 TCP/UDP: Preserving recently used remote address: [AF_INET]50.43.46.77:1194
  203. 2015-10-28 09:54:09 Socket Buffers: R=[163840->163840] S=[163840->163840]
  204. 2015-10-28 09:54:09 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  205. 2015-10-28 09:54:09 UDP link local (bound): [AF_INET][undef]:1194
  206. 2015-10-28 09:54:09 UDP link remote: [AF_INET]50.43.46.77:1194
  207. 2015-10-28 09:54:09 MANAGEMENT: >STATE:1446051249,WAIT,,,
  208. 2015-10-28 09:54:09 MANAGEMENT: >STATE:1446051249,AUTH,,,
  209. 2015-10-28 09:54:09 TLS: Initial packet from [AF_INET]50.43.46.77:1194, sid=b1dc089c e88e0ad1
  210. 2015-10-28 09:54:15 VERIFY OK: depth=1, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=craftyguy.net CA, name=EasyRSA, emailAddress=admin@craftyguy.net
  211. 2015-10-28 09:54:15 Validating certificate key usage
  212. 2015-10-28 09:54:15 ++ Certificate has key usage 00a0, expects 00a0
  213. 2015-10-28 09:54:15 VERIFY KU OK
  214. 2015-10-28 09:54:15 Validating certificate extended key usage
  215. 2015-10-28 09:54:15 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  216. 2015-10-28 09:54:15 VERIFY EKU OK
  217. 2015-10-28 09:54:15 VERIFY OK: depth=0, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=server, name=EasyRSA, emailAddress=admin@craftyguy.net
  218. 2015-10-28 09:54:15 MANAGEMENT: CMD 'rsa-sig'
  219. 2015-10-28 09:54:16 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  220. 2015-10-28 09:54:16 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  221. 2015-10-28 09:54:16 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  222. 2015-10-28 09:54:16 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  223. 2015-10-28 09:54:16 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  224. 2015-10-28 09:54:16 [server] Peer Connection Initiated with [AF_INET]50.43.46.77:1194
  225. 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,GET_CONFIG,,,
  226. 2015-10-28 09:54:17 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  227. 2015-10-28 09:54:17 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DOMAIN craftyguy.net,dhcp-option DNS 192.168.1.1,redirect-gateway def1,route 1.0.0.1,topology net30,ping 120,ping-restart 600,ifconfig 1.0.0.6 1.0.0.5'
  228. 2015-10-28 09:54:17 OPTIONS IMPORT: timers and/or timeouts modified
  229. 2015-10-28 09:54:17 OPTIONS IMPORT: --ifconfig/up options modified
  230. 2015-10-28 09:54:17 OPTIONS IMPORT: route options modified
  231. 2015-10-28 09:54:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  232. 2015-10-28 09:54:17 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00
  233. 2015-10-28 09:54:17 GDG6: remote_host_ipv6=n/a
  234. 2015-10-28 09:54:17 ROUTE6: default_gateway=UNDEF
  235. 2015-10-28 09:54:17 OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
  236. 2015-10-28 09:54:17 OpenVPN ROUTE: failed to parse/resolve route for host/network: ::/0
  237. 2015-10-28 09:54:17 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  238. 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,ASSIGN_IP,,1.0.0.6,
  239. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  240. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  241. 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,ADD_ROUTES,,,
  242. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  243. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  244. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  245. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  246. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  247. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  248. 2015-10-28 09:54:17 Opening tun interface:
  249. 2015-10-28 09:54:17 Local IPv4: 1.0.0.6/30 IPv6: null MTU: 1500
  250. 2015-10-28 09:54:17 DNS Server: 192.168.1.1, Domain: craftyguy.net
  251. 2015-10-28 09:54:17 Routes: 0.0.0.0/0, 1.0.0.1/32, 1.0.0.4/30, 192.168.1.0/24
  252. 2015-10-28 09:54:17 Routes excluded: 10.246.68.118/21
  253. 2015-10-28 09:54:17 VpnService routes installed: 0.0.0.0/5, 8.0.0.0/7, 10.0.0.0/9, 10.128.0.0/10, 10.192.0.0/11, 10.224.0.0/12, 10.240.0.0/14, 10.244.0.0/15, 10.246.0.0/18, 10.246.72.0/21, 10.246.80.0/20, 10.246.96.0/19, 10.246.128.0/17, 10.247.0.0/16, 10.248.0.0/13, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/1
  254. 2015-10-28 09:54:17 Disallowed VPN apps:
  255. 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  256. 2015-10-28 09:54:17 Initialization Sequence Completed
  257. 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,CONNECTED,SUCCESS,1.0.0.6,50.43.46.77
  258. 2015-10-28 09:55:05 Network Status: not connected
  259. 2015-10-28 09:55:05 write UDP []: Network is unreachable (code=101)
  260. 2015-10-28 09:55:06 MANAGEMENT: CMD 'network-change'
  261. 2015-10-28 09:55:06 TCP/UDP: Closing socket
  262. 2015-10-28 09:55:06 SIGUSR1[hard,] received, process restarting
  263. 2015-10-28 09:55:06 MANAGEMENT: >STATE:1446051306,RECONNECTING,SIGUSR1,,
  264. 2015-10-28 09:55:06 MANAGEMENT: CMD 'hold release'
  265. 2015-10-28 09:55:06 Network Status: CONNECTED LTE to MOBILE fast.t-mobile.com
  266. 2015-10-28 09:55:06 MANAGEMENT: CMD 'bytecount 2'
  267. 2015-10-28 09:55:06 MANAGEMENT: CMD 'state on'
  268. 2015-10-28 09:55:06 MANAGEMENT: CMD 'proxy NONE'
  269. 2015-10-28 09:55:07 Control Channel Authentication: tls-auth using INLINE static key file
  270. 2015-10-28 09:55:07 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  271. 2015-10-28 09:55:07 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  272. 2015-10-28 09:55:07 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  273. 2015-10-28 09:55:07 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
  274. 2015-10-28 09:55:07 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  275. 2015-10-28 09:55:07 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  276. 2015-10-28 09:55:07 TCP/UDP: Preserving recently used remote address: [AF_INET]50.43.46.77:1194
  277. 2015-10-28 09:55:07 Socket Buffers: R=[163840->163840] S=[163840->163840]
  278. 2015-10-28 09:55:07 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  279. 2015-10-28 09:55:07 UDP link local (bound): [AF_INET][undef]:1194
  280. 2015-10-28 09:55:07 UDP link remote: [AF_INET]50.43.46.77:1194
  281. 2015-10-28 09:55:07 MANAGEMENT: >STATE:1446051307,WAIT,,,
  282. 2015-10-28 09:55:07 MANAGEMENT: >STATE:1446051307,AUTH,,,
  283. 2015-10-28 09:55:07 TLS: Initial packet from [AF_INET]50.43.46.77:1194, sid=1baed206 137d7e44
  284. 2015-10-28 09:55:08 MANAGEMENT: CMD 'network-change'
  285. 2015-10-28 09:55:08 TCP/UDP: Closing socket
  286. 2015-10-28 09:55:08 Network Status: CONNECTED to WIFI "EmployeeHotspot"
  287. 2015-10-28 09:55:08 SIGUSR1[hard,] received, process restarting
  288. 2015-10-28 09:55:08 MANAGEMENT: >STATE:1446051308,RECONNECTING,SIGUSR1,,
  289. 2015-10-28 09:55:11 MANAGEMENT: CMD 'hold release'
  290. 2015-10-28 09:55:11 MANAGEMENT: CMD 'bytecount 2'
  291. 2015-10-28 09:55:11 MANAGEMENT: CMD 'state on'
  292. 2015-10-28 09:55:11 MANAGEMENT: CMD 'proxy NONE'
  293. 2015-10-28 09:55:12 Control Channel Authentication: tls-auth using INLINE static key file
  294. 2015-10-28 09:55:12 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  295. 2015-10-28 09:55:12 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  296. 2015-10-28 09:55:12 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  297. 2015-10-28 09:55:12 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
  298. 2015-10-28 09:55:12 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  299. 2015-10-28 09:55:12 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  300. 2015-10-28 09:55:12 TCP/UDP: Preserving recently used remote address: [AF_INET]50.43.46.77:1194
  301. 2015-10-28 09:55:12 Socket Buffers: R=[163840->163840] S=[163840->163840]
  302. 2015-10-28 09:55:12 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  303. 2015-10-28 09:55:12 UDP link local (bound): [AF_INET][undef]:1194
  304. 2015-10-28 09:55:12 UDP link remote: [AF_INET]50.43.46.77:1194
  305. 2015-10-28 09:55:12 MANAGEMENT: >STATE:1446051312,WAIT,,,
  306. 2015-10-28 09:55:12 MANAGEMENT: >STATE:1446051312,AUTH,,,
  307. 2015-10-28 09:55:13 TLS: Initial packet from [AF_INET]50.43.46.77:1194, sid=91733b41 13d3253d
  308. 2015-10-28 09:55:13 VERIFY OK: depth=1, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=craftyguy.net CA, name=EasyRSA, emailAddress=admin@craftyguy.net
  309. 2015-10-28 09:55:13 Validating certificate key usage
  310. 2015-10-28 09:55:13 ++ Certificate has key usage 00a0, expects 00a0
  311. 2015-10-28 09:55:13 VERIFY KU OK
  312. 2015-10-28 09:55:13 Validating certificate extended key usage
  313. 2015-10-28 09:55:13 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  314. 2015-10-28 09:55:13 VERIFY EKU OK
  315. 2015-10-28 09:55:13 VERIFY OK: depth=0, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=server, name=EasyRSA, emailAddress=admin@craftyguy.net
  316. 2015-10-28 09:55:13 MANAGEMENT: CMD 'rsa-sig'
  317. 2015-10-28 09:55:14 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  318. 2015-10-28 09:55:14 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  319. 2015-10-28 09:55:14 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  320. 2015-10-28 09:55:14 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  321. 2015-10-28 09:55:14 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  322. 2015-10-28 09:55:14 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  323. 2015-10-28 09:55:15 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  324. 2015-10-28 09:55:16 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  325. 2015-10-28 09:55:18 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  326. 2015-10-28 09:55:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  327. 2015-10-28 09:55:19 [server] Peer Connection Initiated with [AF_INET]50.43.46.77:1194
  328. 2015-10-28 09:55:22 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  329. 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,GET_CONFIG,,,
  330. 2015-10-28 09:55:22 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  331. 2015-10-28 09:55:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DOMAIN craftyguy.net,dhcp-option DNS 192.168.1.1,redirect-gateway def1,route 1.0.0.1,topology net30,ping 120,ping-restart 600,ifconfig 1.0.0.6 1.0.0.5'
  332. 2015-10-28 09:55:22 OPTIONS IMPORT: timers and/or timeouts modified
  333. 2015-10-28 09:55:22 OPTIONS IMPORT: --ifconfig/up options modified
  334. 2015-10-28 09:55:22 OPTIONS IMPORT: route options modified
  335. 2015-10-28 09:55:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  336. 2015-10-28 09:55:22 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00
  337. 2015-10-28 09:55:22 GDG6: remote_host_ipv6=n/a
  338. 2015-10-28 09:55:22 ROUTE6: default_gateway=UNDEF
  339. 2015-10-28 09:55:22 OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
  340. 2015-10-28 09:55:22 OpenVPN ROUTE: failed to parse/resolve route for host/network: ::/0
  341. 2015-10-28 09:55:22 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  342. 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,ASSIGN_IP,,1.0.0.6,
  343. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  344. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  345. 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,ADD_ROUTES,,,
  346. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  347. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  348. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  349. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  350. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  351. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  352. 2015-10-28 09:55:22 Opening tun interface:
  353. 2015-10-28 09:55:22 Local IPv4: 1.0.0.6/30 IPv6: null MTU: 1500
  354. 2015-10-28 09:55:22 DNS Server: 192.168.1.1, Domain: craftyguy.net
  355. 2015-10-28 09:55:22 Routes: 0.0.0.0/0, 1.0.0.1/32, 1.0.0.4/30, 192.168.1.0/24
  356. 2015-10-28 09:55:22 Routes excluded: 10.246.68.118/21
  357. 2015-10-28 09:55:22 VpnService routes installed: 0.0.0.0/5, 8.0.0.0/7, 10.0.0.0/9, 10.128.0.0/10, 10.192.0.0/11, 10.224.0.0/12, 10.240.0.0/14, 10.244.0.0/15, 10.246.0.0/18, 10.246.72.0/21, 10.246.80.0/20, 10.246.96.0/19, 10.246.128.0/17, 10.247.0.0/16, 10.248.0.0/13, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/1
  358. 2015-10-28 09:55:22 Disallowed VPN apps:
  359. 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  360. 2015-10-28 09:55:22 Initialization Sequence Completed
  361. 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,CONNECTED,SUCCESS,1.0.0.6,50.43.46.77
  362. 2015-10-28 09:55:22 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  363. 2015-10-28 09:55:23 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
  364. 2015-10-28 09:55:26 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement