Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2015-10-28 09:54:05 official build 0.6.43 running on motorola XT1095 (MSM8974), Android 5.1.1 (LMY48W) API 22, ABI armeabi-v7a, (motorola/victara_tmo/victara:5.1/LPE23.32-21.3/5:user/release-keys)
- 2015-10-28 09:54:05 Building configuration…
- 2015-10-28 09:54:08 started Socket Thread
- 2015-10-28 09:54:08 Network Status: CONNECTED to WIFI "EmployeeHotspot"
- 2015-10-28 09:54:08 Current Parameter Settings:
- 2015-10-28 09:54:08 config = '/data/data/de.blinkt.openvpn/cache/android.conf'
- 2015-10-28 09:54:08 mode = 0
- 2015-10-28 09:54:08 show_ciphers = DISABLED
- 2015-10-28 09:54:08 show_digests = DISABLED
- 2015-10-28 09:54:08 show_engines = DISABLED
- 2015-10-28 09:54:08 genkey = DISABLED
- 2015-10-28 09:54:08 key_pass_file = '[UNDEF]'
- 2015-10-28 09:54:08 show_tls_ciphers = DISABLED
- 2015-10-28 09:54:08 connect_retry_max = 50
- 2015-10-28 09:54:08 Connection profiles [0]:
- 2015-10-28 09:54:08 proto = udp
- 2015-10-28 09:54:08 local = '[UNDEF]'
- 2015-10-28 09:54:08 local_port = '1194'
- 2015-10-28 09:54:08 remote = 'craftyguy.net'
- 2015-10-28 09:54:08 remote_port = '1194'
- 2015-10-28 09:54:08 remote_float = ENABLED
- 2015-10-28 09:54:08 bind_defined = DISABLED
- 2015-10-28 09:54:08 bind_local = ENABLED
- 2015-10-28 09:54:08 bind_ipv6_only = DISABLED
- 2015-10-28 09:54:08 connect_retry_seconds = 5
- 2015-10-28 09:54:08 connect_timeout = 150
- 2015-10-28 09:54:08 socks_proxy_server = '[UNDEF]'
- 2015-10-28 09:54:08 socks_proxy_port = '[UNDEF]'
- 2015-10-28 09:54:08 socks_proxy_retry = DISABLED
- 2015-10-28 09:54:08 tun_mtu = 1500
- 2015-10-28 09:54:08 tun_mtu_defined = ENABLED
- 2015-10-28 09:54:08 link_mtu = 1500
- 2015-10-28 09:54:08 link_mtu_defined = DISABLED
- 2015-10-28 09:54:08 tun_mtu_extra = 0
- 2015-10-28 09:54:08 tun_mtu_extra_defined = DISABLED
- 2015-10-28 09:54:08 mtu_discover_type = -1
- 2015-10-28 09:54:08 fragment = 0
- 2015-10-28 09:54:08 mssfix = 1450
- 2015-10-28 09:54:08 explicit_exit_notification = 0
- 2015-10-28 09:54:08 Connection profiles END
- 2015-10-28 09:54:08 remote_random = DISABLED
- 2015-10-28 09:54:08 ipchange = '[UNDEF]'
- 2015-10-28 09:54:08 dev = 'tun'
- 2015-10-28 09:54:08 dev_type = '[UNDEF]'
- 2015-10-28 09:54:08 dev_node = '[UNDEF]'
- 2015-10-28 09:54:08 lladdr = '[UNDEF]'
- 2015-10-28 09:54:08 topology = 1
- 2015-10-28 09:54:08 tun_ipv6 = DISABLED
- 2015-10-28 09:54:08 ifconfig_local = '[UNDEF]'
- 2015-10-28 09:54:08 ifconfig_remote_netmask = '[UNDEF]'
- 2015-10-28 09:54:08 ifconfig_noexec = DISABLED
- 2015-10-28 09:54:08 ifconfig_nowarn = ENABLED
- 2015-10-28 09:54:08 ifconfig_ipv6_local = '[UNDEF]'
- 2015-10-28 09:54:08 ifconfig_ipv6_netbits = 0
- 2015-10-28 09:54:08 ifconfig_ipv6_remote = '[UNDEF]'
- 2015-10-28 09:54:08 shaper = 0
- 2015-10-28 09:54:08 mtu_test = 0
- 2015-10-28 09:54:08 mlock = DISABLED
- 2015-10-28 09:54:08 keepalive_ping = 0
- 2015-10-28 09:54:08 keepalive_timeout = 0
- 2015-10-28 09:54:08 inactivity_timeout = 0
- 2015-10-28 09:54:08 ping_send_timeout = 0
- 2015-10-28 09:54:08 ping_rec_timeout = 0
- 2015-10-28 09:54:08 ping_rec_timeout_action = 0
- 2015-10-28 09:54:08 ping_timer_remote = DISABLED
- 2015-10-28 09:54:08 remap_sigusr1 = 0
- 2015-10-28 09:54:08 persist_tun = ENABLED
- 2015-10-28 09:54:08 persist_local_ip = DISABLED
- 2015-10-28 09:54:08 persist_remote_ip = DISABLED
- 2015-10-28 09:54:08 persist_key = DISABLED
- 2015-10-28 09:54:08 passtos = DISABLED
- 2015-10-28 09:54:08 resolve_retry_seconds = 60
- 2015-10-28 09:54:08 resolve_in_advance = ENABLED
- 2015-10-28 09:54:08 username = '[UNDEF]'
- 2015-10-28 09:54:08 groupname = '[UNDEF]'
- 2015-10-28 09:54:08 chroot_dir = '[UNDEF]'
- 2015-10-28 09:54:08 cd_dir = '[UNDEF]'
- 2015-10-28 09:54:08 writepid = '[UNDEF]'
- 2015-10-28 09:54:08 up_script = '[UNDEF]'
- 2015-10-28 09:54:08 down_script = '[UNDEF]'
- 2015-10-28 09:54:08 down_pre = DISABLED
- 2015-10-28 09:54:08 up_restart = DISABLED
- 2015-10-28 09:54:08 up_delay = DISABLED
- 2015-10-28 09:54:08 daemon = DISABLED
- 2015-10-28 09:54:08 inetd = 0
- 2015-10-28 09:54:08 log = DISABLED
- 2015-10-28 09:54:08 suppress_timestamps = DISABLED
- 2015-10-28 09:54:08 machine_readable_output = ENABLED
- 2015-10-28 09:54:08 nice = 0
- 2015-10-28 09:54:08 verbosity = 4
- 2015-10-28 09:54:08 mute = 0
- 2015-10-28 09:54:08 gremlin = 0
- 2015-10-28 09:54:08 status_file = '[UNDEF]'
- 2015-10-28 09:54:08 status_file_version = 1
- 2015-10-28 09:54:08 status_file_update_freq = 60
- 2015-10-28 09:54:08 occ = ENABLED
- 2015-10-28 09:54:08 rcvbuf = 0
- 2015-10-28 09:54:08 sndbuf = 0
- 2015-10-28 09:54:08 sockflags = 0
- 2015-10-28 09:54:08 fast_io = DISABLED
- 2015-10-28 09:54:08 comp.alg = 0
- 2015-10-28 09:54:08 comp.flags = 0
- 2015-10-28 09:54:08 route_script = '[UNDEF]'
- 2015-10-28 09:54:08 route_default_gateway = '[UNDEF]'
- 2015-10-28 09:54:08 route_default_metric = 0
- 2015-10-28 09:54:08 route_noexec = DISABLED
- 2015-10-28 09:54:08 route_delay = 0
- 2015-10-28 09:54:08 route_delay_window = 30
- 2015-10-28 09:54:08 route_delay_defined = DISABLED
- 2015-10-28 09:54:08 route_nopull = DISABLED
- 2015-10-28 09:54:08 route_gateway_via_dhcp = DISABLED
- 2015-10-28 09:54:08 allow_pull_fqdn = DISABLED
- 2015-10-28 09:54:08 route 0.0.0.0/0.0.0.0/vpn_gateway/nil
- 2015-10-28 09:54:08 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'
- 2015-10-28 09:54:08 management_port = 'unix'
- 2015-10-28 09:54:08 management_user_pass = '[UNDEF]'
- 2015-10-28 09:54:08 management_log_history_cache = 250
- 2015-10-28 09:54:08 management_echo_buffer_size = 100
- 2015-10-28 09:54:08 management_write_peer_info_file = '[UNDEF]'
- 2015-10-28 09:54:08 management_client_user = '[UNDEF]'
- 2015-10-28 09:54:08 management_client_group = '[UNDEF]'
- 2015-10-28 09:54:08 management_flags = 4902
- 2015-10-28 09:54:08 shared_secret_file = '[UNDEF]'
- 2015-10-28 09:54:08 key_direction = 2
- 2015-10-28 09:54:08 ciphername_defined = ENABLED
- 2015-10-28 09:54:08 ciphername = 'aes-256-cbc'
- 2015-10-28 09:54:08 authname_defined = ENABLED
- 2015-10-28 09:54:08 authname = 'SHA1'
- 2015-10-28 09:54:08 prng_hash = 'SHA1'
- 2015-10-28 09:54:08 prng_nonce_secret_len = 16
- 2015-10-28 09:54:08 keysize = 0
- 2015-10-28 09:54:08 engine = DISABLED
- 2015-10-28 09:54:08 replay = ENABLED
- 2015-10-28 09:54:08 mute_replay_warnings = DISABLED
- 2015-10-28 09:54:08 replay_window = 64
- 2015-10-28 09:54:08 replay_time = 15
- 2015-10-28 09:54:08 packet_id_file = '[UNDEF]'
- 2015-10-28 09:54:08 use_iv = ENABLED
- 2015-10-28 09:54:08 test_crypto = DISABLED
- 2015-10-28 09:54:08 tls_server = DISABLED
- 2015-10-28 09:54:08 tls_client = ENABLED
- 2015-10-28 09:54:08 key_method = 2
- 2015-10-28 09:54:08 ca_file = '[[INLINE]]'
- 2015-10-28 09:54:08 ca_path = '[UNDEF]'
- 2015-10-28 09:54:08 dh_file = '[UNDEF]'
- 2015-10-28 09:54:08 cert_file = '[[INLINE]]'
- 2015-10-28 09:54:08 extra_certs_file = '[[INLINE]]'
- 2015-10-28 09:54:08 "priv_key_file" = EXTERNAL_PRIVATE_KEY
- 2015-10-28 09:54:08 pkcs12_file = '[UNDEF]'
- 2015-10-28 09:54:08 cipher_list = '[UNDEF]'
- 2015-10-28 09:54:08 tls_verify = '[UNDEF]'
- 2015-10-28 09:54:08 tls_export_cert = '[UNDEF]'
- 2015-10-28 09:54:08 verify_x509_type = 0
- 2015-10-28 09:54:08 verify_x509_name = '[UNDEF]'
- 2015-10-28 09:54:08 crl_file = '[UNDEF]'
- 2015-10-28 09:54:08 ns_cert_type = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 160
- 2015-10-28 09:54:08 remote_cert_ku[i] = 136
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_ku[i] = 0
- 2015-10-28 09:54:08 remote_cert_eku = 'TLS Web Server Authentication'
- 2015-10-28 09:54:08 ssl_flags = 0
- 2015-10-28 09:54:08 tls_timeout = 2
- 2015-10-28 09:54:08 renegotiate_bytes = 0
- 2015-10-28 09:54:08 renegotiate_packets = 0
- 2015-10-28 09:54:08 renegotiate_seconds = 3600
- 2015-10-28 09:54:08 handshake_window = 60
- 2015-10-28 09:54:08 transition_window = 3600
- 2015-10-28 09:54:08 single_session = DISABLED
- 2015-10-28 09:54:08 push_peer_info = DISABLED
- 2015-10-28 09:54:08 tls_exit = DISABLED
- 2015-10-28 09:54:08 tls_auth_file = '[[INLINE]]'
- 2015-10-28 09:54:08 client = ENABLED
- 2015-10-28 09:54:08 pull = ENABLED
- 2015-10-28 09:54:08 auth_user_pass_file = '[UNDEF]'
- 2015-10-28 09:54:08 OpenVPN 2.4-icsopenvpn [git:icsopenvpn_642-62c7d5f90844609f] android-14-armeabi-v7a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH] [IPv6] built on Oct 25 2015
- 2015-10-28 09:54:08 library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.09
- 2015-10-28 09:54:08 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket
- 2015-10-28 09:54:08 MANAGEMENT: CMD 'hold release'
- 2015-10-28 09:54:08 MANAGEMENT: CMD 'bytecount 2'
- 2015-10-28 09:54:08 MANAGEMENT: CMD 'state on'
- 2015-10-28 09:54:08 MANAGEMENT: CMD 'proxy NONE'
- 2015-10-28 09:54:09 Control Channel Authentication: tls-auth using INLINE static key file
- 2015-10-28 09:54:09 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:54:09 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:54:09 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2015-10-28 09:54:09 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
- 2015-10-28 09:54:09 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
- 2015-10-28 09:54:09 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
- 2015-10-28 09:54:09 TCP/UDP: Preserving recently used remote address: [AF_INET]50.43.46.77:1194
- 2015-10-28 09:54:09 Socket Buffers: R=[163840->163840] S=[163840->163840]
- 2015-10-28 09:54:09 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2015-10-28 09:54:09 UDP link local (bound): [AF_INET][undef]:1194
- 2015-10-28 09:54:09 UDP link remote: [AF_INET]50.43.46.77:1194
- 2015-10-28 09:54:09 MANAGEMENT: >STATE:1446051249,WAIT,,,
- 2015-10-28 09:54:09 MANAGEMENT: >STATE:1446051249,AUTH,,,
- 2015-10-28 09:54:09 TLS: Initial packet from [AF_INET]50.43.46.77:1194, sid=b1dc089c e88e0ad1
- 2015-10-28 09:54:15 VERIFY OK: depth=1, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=craftyguy.net CA, name=EasyRSA, emailAddress=admin@craftyguy.net
- 2015-10-28 09:54:15 Validating certificate key usage
- 2015-10-28 09:54:15 ++ Certificate has key usage 00a0, expects 00a0
- 2015-10-28 09:54:15 VERIFY KU OK
- 2015-10-28 09:54:15 Validating certificate extended key usage
- 2015-10-28 09:54:15 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2015-10-28 09:54:15 VERIFY EKU OK
- 2015-10-28 09:54:15 VERIFY OK: depth=0, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=server, name=EasyRSA, emailAddress=admin@craftyguy.net
- 2015-10-28 09:54:15 MANAGEMENT: CMD 'rsa-sig'
- 2015-10-28 09:54:16 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2015-10-28 09:54:16 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:54:16 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2015-10-28 09:54:16 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:54:16 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2015-10-28 09:54:16 [server] Peer Connection Initiated with [AF_INET]50.43.46.77:1194
- 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,GET_CONFIG,,,
- 2015-10-28 09:54:17 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2015-10-28 09:54:17 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DOMAIN craftyguy.net,dhcp-option DNS 192.168.1.1,redirect-gateway def1,route 1.0.0.1,topology net30,ping 120,ping-restart 600,ifconfig 1.0.0.6 1.0.0.5'
- 2015-10-28 09:54:17 OPTIONS IMPORT: timers and/or timeouts modified
- 2015-10-28 09:54:17 OPTIONS IMPORT: --ifconfig/up options modified
- 2015-10-28 09:54:17 OPTIONS IMPORT: route options modified
- 2015-10-28 09:54:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2015-10-28 09:54:17 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00
- 2015-10-28 09:54:17 GDG6: remote_host_ipv6=n/a
- 2015-10-28 09:54:17 ROUTE6: default_gateway=UNDEF
- 2015-10-28 09:54:17 OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
- 2015-10-28 09:54:17 OpenVPN ROUTE: failed to parse/resolve route for host/network: ::/0
- 2015-10-28 09:54:17 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,ASSIGN_IP,,1.0.0.6,
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,ADD_ROUTES,,,
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2015-10-28 09:54:17 Opening tun interface:
- 2015-10-28 09:54:17 Local IPv4: 1.0.0.6/30 IPv6: null MTU: 1500
- 2015-10-28 09:54:17 DNS Server: 192.168.1.1, Domain: craftyguy.net
- 2015-10-28 09:54:17 Routes: 0.0.0.0/0, 1.0.0.1/32, 1.0.0.4/30, 192.168.1.0/24
- 2015-10-28 09:54:17 Routes excluded: 10.246.68.118/21
- 2015-10-28 09:54:17 VpnService routes installed: 0.0.0.0/5, 8.0.0.0/7, 10.0.0.0/9, 10.128.0.0/10, 10.192.0.0/11, 10.224.0.0/12, 10.240.0.0/14, 10.244.0.0/15, 10.246.0.0/18, 10.246.72.0/21, 10.246.80.0/20, 10.246.96.0/19, 10.246.128.0/17, 10.247.0.0/16, 10.248.0.0/13, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/1
- 2015-10-28 09:54:17 Disallowed VPN apps:
- 2015-10-28 09:54:17 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2015-10-28 09:54:17 Initialization Sequence Completed
- 2015-10-28 09:54:17 MANAGEMENT: >STATE:1446051257,CONNECTED,SUCCESS,1.0.0.6,50.43.46.77
- 2015-10-28 09:55:05 Network Status: not connected
- 2015-10-28 09:55:05 write UDP []: Network is unreachable (code=101)
- 2015-10-28 09:55:06 MANAGEMENT: CMD 'network-change'
- 2015-10-28 09:55:06 TCP/UDP: Closing socket
- 2015-10-28 09:55:06 SIGUSR1[hard,] received, process restarting
- 2015-10-28 09:55:06 MANAGEMENT: >STATE:1446051306,RECONNECTING,SIGUSR1,,
- 2015-10-28 09:55:06 MANAGEMENT: CMD 'hold release'
- 2015-10-28 09:55:06 Network Status: CONNECTED LTE to MOBILE fast.t-mobile.com
- 2015-10-28 09:55:06 MANAGEMENT: CMD 'bytecount 2'
- 2015-10-28 09:55:06 MANAGEMENT: CMD 'state on'
- 2015-10-28 09:55:06 MANAGEMENT: CMD 'proxy NONE'
- 2015-10-28 09:55:07 Control Channel Authentication: tls-auth using INLINE static key file
- 2015-10-28 09:55:07 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:55:07 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:55:07 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2015-10-28 09:55:07 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
- 2015-10-28 09:55:07 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
- 2015-10-28 09:55:07 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
- 2015-10-28 09:55:07 TCP/UDP: Preserving recently used remote address: [AF_INET]50.43.46.77:1194
- 2015-10-28 09:55:07 Socket Buffers: R=[163840->163840] S=[163840->163840]
- 2015-10-28 09:55:07 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2015-10-28 09:55:07 UDP link local (bound): [AF_INET][undef]:1194
- 2015-10-28 09:55:07 UDP link remote: [AF_INET]50.43.46.77:1194
- 2015-10-28 09:55:07 MANAGEMENT: >STATE:1446051307,WAIT,,,
- 2015-10-28 09:55:07 MANAGEMENT: >STATE:1446051307,AUTH,,,
- 2015-10-28 09:55:07 TLS: Initial packet from [AF_INET]50.43.46.77:1194, sid=1baed206 137d7e44
- 2015-10-28 09:55:08 MANAGEMENT: CMD 'network-change'
- 2015-10-28 09:55:08 TCP/UDP: Closing socket
- 2015-10-28 09:55:08 Network Status: CONNECTED to WIFI "EmployeeHotspot"
- 2015-10-28 09:55:08 SIGUSR1[hard,] received, process restarting
- 2015-10-28 09:55:08 MANAGEMENT: >STATE:1446051308,RECONNECTING,SIGUSR1,,
- 2015-10-28 09:55:11 MANAGEMENT: CMD 'hold release'
- 2015-10-28 09:55:11 MANAGEMENT: CMD 'bytecount 2'
- 2015-10-28 09:55:11 MANAGEMENT: CMD 'state on'
- 2015-10-28 09:55:11 MANAGEMENT: CMD 'proxy NONE'
- 2015-10-28 09:55:12 Control Channel Authentication: tls-auth using INLINE static key file
- 2015-10-28 09:55:12 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:55:12 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:55:12 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2015-10-28 09:55:12 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
- 2015-10-28 09:55:12 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
- 2015-10-28 09:55:12 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
- 2015-10-28 09:55:12 TCP/UDP: Preserving recently used remote address: [AF_INET]50.43.46.77:1194
- 2015-10-28 09:55:12 Socket Buffers: R=[163840->163840] S=[163840->163840]
- 2015-10-28 09:55:12 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2015-10-28 09:55:12 UDP link local (bound): [AF_INET][undef]:1194
- 2015-10-28 09:55:12 UDP link remote: [AF_INET]50.43.46.77:1194
- 2015-10-28 09:55:12 MANAGEMENT: >STATE:1446051312,WAIT,,,
- 2015-10-28 09:55:12 MANAGEMENT: >STATE:1446051312,AUTH,,,
- 2015-10-28 09:55:13 TLS: Initial packet from [AF_INET]50.43.46.77:1194, sid=91733b41 13d3253d
- 2015-10-28 09:55:13 VERIFY OK: depth=1, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=craftyguy.net CA, name=EasyRSA, emailAddress=admin@craftyguy.net
- 2015-10-28 09:55:13 Validating certificate key usage
- 2015-10-28 09:55:13 ++ Certificate has key usage 00a0, expects 00a0
- 2015-10-28 09:55:13 VERIFY KU OK
- 2015-10-28 09:55:13 Validating certificate extended key usage
- 2015-10-28 09:55:13 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2015-10-28 09:55:13 VERIFY EKU OK
- 2015-10-28 09:55:13 VERIFY OK: depth=0, C=US, ST=OR, L=Hillsboro, O=craftyguy.net, OU=home, CN=server, name=EasyRSA, emailAddress=admin@craftyguy.net
- 2015-10-28 09:55:13 MANAGEMENT: CMD 'rsa-sig'
- 2015-10-28 09:55:14 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:14 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:14 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2015-10-28 09:55:14 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:55:14 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- 2015-10-28 09:55:14 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2015-10-28 09:55:15 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:16 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:18 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:19 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2015-10-28 09:55:19 [server] Peer Connection Initiated with [AF_INET]50.43.46.77:1194
- 2015-10-28 09:55:22 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,GET_CONFIG,,,
- 2015-10-28 09:55:22 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2015-10-28 09:55:22 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DOMAIN craftyguy.net,dhcp-option DNS 192.168.1.1,redirect-gateway def1,route 1.0.0.1,topology net30,ping 120,ping-restart 600,ifconfig 1.0.0.6 1.0.0.5'
- 2015-10-28 09:55:22 OPTIONS IMPORT: timers and/or timeouts modified
- 2015-10-28 09:55:22 OPTIONS IMPORT: --ifconfig/up options modified
- 2015-10-28 09:55:22 OPTIONS IMPORT: route options modified
- 2015-10-28 09:55:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2015-10-28 09:55:22 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00
- 2015-10-28 09:55:22 GDG6: remote_host_ipv6=n/a
- 2015-10-28 09:55:22 ROUTE6: default_gateway=UNDEF
- 2015-10-28 09:55:22 OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options
- 2015-10-28 09:55:22 OpenVPN ROUTE: failed to parse/resolve route for host/network: ::/0
- 2015-10-28 09:55:22 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,ASSIGN_IP,,1.0.0.6,
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,ADD_ROUTES,,,
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2015-10-28 09:55:22 Opening tun interface:
- 2015-10-28 09:55:22 Local IPv4: 1.0.0.6/30 IPv6: null MTU: 1500
- 2015-10-28 09:55:22 DNS Server: 192.168.1.1, Domain: craftyguy.net
- 2015-10-28 09:55:22 Routes: 0.0.0.0/0, 1.0.0.1/32, 1.0.0.4/30, 192.168.1.0/24
- 2015-10-28 09:55:22 Routes excluded: 10.246.68.118/21
- 2015-10-28 09:55:22 VpnService routes installed: 0.0.0.0/5, 8.0.0.0/7, 10.0.0.0/9, 10.128.0.0/10, 10.192.0.0/11, 10.224.0.0/12, 10.240.0.0/14, 10.244.0.0/15, 10.246.0.0/18, 10.246.72.0/21, 10.246.80.0/20, 10.246.96.0/19, 10.246.128.0/17, 10.247.0.0/16, 10.248.0.0/13, 11.0.0.0/8, 12.0.0.0/6, 16.0.0.0/4, 32.0.0.0/3, 64.0.0.0/2, 128.0.0.0/1
- 2015-10-28 09:55:22 Disallowed VPN apps:
- 2015-10-28 09:55:22 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2015-10-28 09:55:22 Initialization Sequence Completed
- 2015-10-28 09:55:22 MANAGEMENT: >STATE:1446051322,CONNECTED,SUCCESS,1.0.0.6,50.43.46.77
- 2015-10-28 09:55:22 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:23 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
- 2015-10-28 09:55:26 TLS Error: Unroutable control packet received from [AF_INET]50.43.46.77:1194 (si=3 op=P_CONTROL_V1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement