Advertisement
Guest User

Untitled

a guest
Feb 20th, 2020
249
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 18.88 KB | None | 0 0
  1. default 00:42:11.609747+0000 RemoteConnectionManager nw_socket_handle_socket_event [C16.1:2] Socket received CONNRESET event
  2. default 00:42:11.609797+0000 RemoteConnectionManager nw_socket_handle_socket_event [C16.1:2] Socket received DISCONNECTED event
  3. error 00:42:11.609853+0000 RemoteConnectionManager nw_socket_handle_socket_event <private> Socket SO_ERROR [54: Connection reset by peer]
  4. default 00:42:11.609903+0000 RemoteConnectionManager nw_protocol_boringssl_error(1674) [C16.1:1][0x100629000] Lower protocol stack error post TLS handshake: 54
  5. default 00:42:11.610296+0000 RemoteConnectionManager nw_flow_disconnected [C16.1 IPv4#a2d6f3ad:65533 ready socket-flow (satisfied (Path is satisfied), interface: en0, ipv4, dns)] Output protocol disconnected
  6. error 00:42:11.610382+0000 RemoteConnectionManager nw_read_request_report [C16] Receive failed with error "Connection reset by peer"
  7. default 00:42:11.610538+0000 RemoteConnectionManager nw_protocol_boringssl_input_finished(1700) [C16.1:1][0x100629000] state: 2
  8. default 00:42:11.610639+0000 RemoteConnectionManager nw_protocol_boringssl_remove_input_handler(1012) [C16.1:1][0x100629000] nw_protocol_boringssl_remove_input_handler forced true
  9. default 00:42:11.610801+0000 RemoteConnectionManager nw_protocol_boringssl_remove_input_handler(1030) [C16.1:1][0x100629000] Transferring nw_protocol_boringssl_t handle back into ARC for autorelease
  10. default 00:42:11.611814+0000 RemoteConnectionManager nw_connection_report_state_with_handler_on_nw_queue [C16] reporting state failed error Connection reset by peer
  11. default 00:42:11.612102+0000 RemoteConnectionManager [C16 388F45F0-0664-4736-89C1-E09EBCA07648 Hostname#34e37a98:65533 tcp, tls, indefinite] cancel
  12. default 00:42:11.612375+0000 RemoteConnectionManager [C16 388F45F0-0664-4736-89C1-E09EBCA07648 Hostname#34e37a98:65533 tcp, tls, indefinite] cancelled
  13. [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533]
  14. Connected Path: satisfied (Path is satisfied), interface: en0, ipv4, dns
  15. Duration: 4711.287s, DNS @0.000s took 0.001s, TCP @0.001s took 0.132s
  16. bytes in/out: 0/0, packets in/out: 0/0, rtt: 0.000s, retransmitted packets: 0, out-of-order packets: 0
  17. default 00:42:11.612445+0000 RemoteConnectionManager 0.000s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] path:start
  18. default 00:42:11.612494+0000 RemoteConnectionManager 0.000s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] path:satisfied
  19. default 00:42:11.612539+0000 RemoteConnectionManager 0.000s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] resolver:start_dns
  20. default 00:42:11.612581+0000 RemoteConnectionManager 0.001s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] resolver:receive_dns
  21. default 00:42:11.612627+0000 RemoteConnectionManager 0.001s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] path:start
  22. default 00:42:11.612720+0000 RemoteConnectionManager 0.001s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] path:satisfied
  23. default 00:42:11.612798+0000 RemoteConnectionManager 0.001s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:start_connect
  24. default 00:42:11.612962+0000 RemoteConnectionManager 0.133s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:finish_transport
  25. default 00:42:11.613066+0000 RemoteConnectionManager 0.133s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:finish_transport
  26. default 00:42:11.613161+0000 RemoteConnectionManager 0.327s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:finish_connect
  27. default 00:42:11.613193+0000 RemoteConnectionManager 0.327s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:finish_connect
  28. default 00:42:11.613261+0000 RemoteConnectionManager 0.327s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:changed_viability
  29. default 00:42:11.613325+0000 RemoteConnectionManager 0.327s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:changed_viability
  30. default 00:42:11.613363+0000 RemoteConnectionManager 4711.286s [C16.1 4E196605-3901-495D-9D7A-23687CE830FE 192.168.1.231:55779<->IPv4#a2d6f3ad:65533 socket-flow path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:disconnect Connection reset by peer
  31. default 00:42:11.613392+0000 RemoteConnectionManager 4711.286s [C16 F7C63B7E-3263-4147-9716-02CDEBF67AA7 Hostname#34e37a98:65533 resolver path=satisfied (Path is satisfied), interface: en0, ipv4, dns] flow:disconnect
  32. default 00:42:11.613414+0000 RemoteConnectionManager 4711.287s [C16] path:cancel
  33. default 00:42:11.613750+0000 RemoteConnectionManager nw_connection_report_state_with_handler_on_nw_queue [C16] reporting state cancelled error Connection reset by peer
  34. default 00:42:11.622694+0000 Textual -[IRCConnection warmProcess]_block_invoke [151:0]: Invalidation handler called
  35. default 00:42:31.616396+0000 RemoteConnectionManager [C21 0948A3E4-E4E2-43BB-A152-3062B30E281D Hostname#34e37a98:65533 tcp, tls, indefinite] start
  36. default 00:42:31.616939+0000 RemoteConnectionManager nw_connection_report_state_with_handler_on_nw_queue [C21] reporting state preparing
  37. default 00:42:31.713428+0000 RemoteConnectionManager nw_socket_handle_socket_event [C21.1:2] Socket received CONNECTED event
  38. default 00:42:31.713546+0000 RemoteConnectionManager nw_flow_connected [C21.1 IPv4#a2d6f3ad:65533 in_progress socket-flow (satisfied (Path is satisfied), interface: en0, ipv4, dns)] Transport protocol connected
  39. default 00:42:31.713763+0000 RemoteConnectionManager boringssl_context_set_handshake_config(1470) [0x1006319a0] set tls_handshake_config_standard
  40. default 00:42:31.713843+0000 RemoteConnectionManager boringssl_context_set_min_version(324) [0x1006319a0] set 0x0301
  41. default 00:42:31.713922+0000 RemoteConnectionManager boringssl_context_set_max_version(308) [0x1006319a0] set 0x0304
  42. default 00:42:31.714030+0000 RemoteConnectionManager boringssl_context_set_cipher_suites(842) [0x1006319a0] Ciphersuite string: TLS_AES_128_GCM_SHA256:TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-CHACHA20-POLY1305:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-AES256-SHA:AES256-SHA:AES128-SHA:ECDHE-ECDSA-DES-CBC3-SHA:ECDHE-RSA-DES-CBC3-SHA:DES-CBC3-SHA
  43. default 00:42:31.714133+0000 RemoteConnectionManager boringssl_context_set_remote_address(2554) [0x1006319a0] Saving remote IPv4 address
  44. default 00:42:31.714186+0000 RemoteConnectionManager boringssl_session_install_association_state(1258) [0x1006319a0] Client session cache hit
  45. default 00:42:31.714237+0000 RemoteConnectionManager boringssl_session_set_peer_hostname(1154) [0x1006319a0] SNI <private>
  46. default 00:42:31.714281+0000 RemoteConnectionManager boringssl_context_set_min_version(324) [C21.1:1][0x1006319a0] set 0x0301
  47. default 00:42:31.714309+0000 RemoteConnectionManager boringssl_context_set_session_ticket_enabled(439) [C21.1:1][0x1006319a0] set false
  48. default 00:42:31.714333+0000 RemoteConnectionManager boringssl_context_set_false_start(409) [C21.1:1][0x1006319a0] set false
  49. default 00:42:31.714356+0000 RemoteConnectionManager boringssl_context_set_enforce_ev(399) [C21.1:1][0x1006319a0] set false
  50. default 00:42:31.714483+0000 RemoteConnectionManager boringssl_context_set_ats_enforced(1285) [C21.1:1][0x1006319a0] set false
  51. default 00:42:31.714521+0000 RemoteConnectionManager boringssl_context_set_ats_minimum_rsa_key_size(1294) [C21.1:1][0x1006319a0] set 0
  52. default 00:42:31.714613+0000 RemoteConnectionManager boringssl_context_set_ats_minimum_ecdsa_key_size(1303) [C21.1:1][0x1006319a0] set 0
  53. default 00:42:31.714658+0000 RemoteConnectionManager boringssl_context_set_ats_minimum_signature_algorithm(1313) [C21.1:1][0x1006319a0] set 0
  54. default 00:42:31.714705+0000 RemoteConnectionManager boringssl_context_set_cipher_suites(842) [C21.1:1][0x1006319a0] Ciphersuite string: TLS_AES_256_GCM_SHA384:TLS_CHACHA20_POLY1305_SHA256:TLS_AES_128_GCM_SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA
  55. default 00:42:31.714823+0000 RemoteConnectionManager nw_protocol_boringssl_begin_connection(497) [C21.1:1][0x1006319a0] early data disabled
  56. default 00:42:31.714871+0000 RemoteConnectionManager boringssl_context_info_handler(1969) [C21.1:1][0x1006319a0] Client handshake started
  57. default 00:42:31.715034+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Writing SSL3_RT_HANDSHAKE 512 bytes
  58. default 00:42:31.715107+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client enter_early_data
  59. default 00:42:31.715163+0000 RemoteConnectionManager boringssl_context_add_handshake_message_pending(577) [C21.1:1][0x1006319a0] Adding message(1)
  60. default 00:42:31.715390+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_server_hello
  61. default 00:42:31.715490+0000 RemoteConnectionManager boringssl_context_add_handshake_message_pending(577) [C21.1:1][0x1006319a0] Adding message(2)
  62. default 00:42:31.715636+0000 RemoteConnectionManager boringssl_session_handshake_incomplete(170) [C21.1:1][0x1006319a0] Handshake incomplete: waiting for data to read [2]
  63. default 00:42:31.715765+0000 RemoteConnectionManager boringssl_session_handshake_incomplete(170) [C21.1:1][0x1006319a0] Handshake incomplete: waiting for data to read [2]
  64. default 00:42:31.807393+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Reading SSL3_RT_HANDSHAKE 89 bytes
  65. default 00:42:31.807537+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_server_certificate
  66. default 00:42:31.807576+0000 RemoteConnectionManager boringssl_context_add_handshake_message_pending(577) [C21.1:1][0x1006319a0] Adding message(2)
  67. default 00:42:31.807627+0000 RemoteConnectionManager boringssl_session_handshake_incomplete(170) [C21.1:1][0x1006319a0] Handshake incomplete: waiting for data to read [2]
  68. default 00:42:31.809844+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Reading SSL3_RT_HANDSHAKE 2548 bytes
  69. default 00:42:31.809959+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_certificate_status
  70. default 00:42:31.809995+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client verify_server_certificate
  71. default 00:42:31.810141+0000 RemoteConnectionManager boringssl_context_copy_peer_sct_list(1002) [C21.1:1][0x1006319a0] SSL_get0_signed_cert_timestamp_list returned no SCT extension data
  72. default 00:42:31.810360+0000 RemoteConnectionManager boringssl_helper_create_sec_trust_with_certificates(607) [C21.1:1][0x1006319a0] SecTrustCreateWithCertificates result: 0
  73. default 00:42:31.810425+0000 RemoteConnectionManager boringssl_helper_create_sec_trust_with_certificates(614) [C21.1:1][0x1006319a0] No TLS-provided OCSP response
  74. default 00:42:31.810467+0000 RemoteConnectionManager boringssl_helper_create_sec_trust_with_certificates(621) [C21.1:1][0x1006319a0] No TLS-provided SCTs
  75. default 00:42:31.810576+0000 RemoteConnectionManager boringssl_context_certificate_verify_callback(2070) [C21.1:1][0x1006319a0] Asyncing for verify block
  76. default 00:42:31.810643+0000 RemoteConnectionManager boringssl_session_handshake_incomplete(170) [C21.1:1][0x1006319a0] Handshake incomplete: certificate evaluation result pending [16]
  77. default 00:42:31.824270+0000 RemoteConnectionManager boringssl_context_certificate_verify_callback_block_invoke_3(2079) [C21.1:1][0x1006319a0] Returning from verify block
  78. default 00:42:31.824448+0000 RemoteConnectionManager boringssl_context_certificate_verify_callback(2046) [C21.1:1][0x1006319a0] Setting trust result to ssl_verify_ok
  79. default 00:42:31.824470+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_server_key_exchange
  80. default 00:42:31.824497+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Reading SSL3_RT_HANDSHAKE 333 bytes
  81. default 00:42:31.824649+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_certificate_request
  82. default 00:42:31.824673+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Reading SSL3_RT_HANDSHAKE 4 bytes
  83. default 00:42:31.824696+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_server_hello_done
  84. default 00:42:31.824716+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client send_client_certificate
  85. default 00:42:31.824736+0000 RemoteConnectionManager boringssl_context_add_handshake_message_pending(577) [C21.1:1][0x1006319a0] Adding message(14)
  86. default 00:42:31.824758+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client send_client_key_exchange
  87. default 00:42:31.825041+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Writing SSL3_RT_HANDSHAKE 70 bytes
  88. default 00:42:31.825077+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client send_client_certificate_verify
  89. default 00:42:31.825097+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client send_client_finished
  90. default 00:42:31.825117+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Writing SSL3_RT_CHANGE_CIPHER_SPEC 1 bytes
  91. default 00:42:31.825154+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Writing SSL3_RT_HANDSHAKE 16 bytes
  92. default 00:42:31.825174+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client finish_flight
  93. default 00:42:31.825277+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_session_ticket
  94. default 00:42:31.825321+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client process_change_cipher_spec
  95. default 00:42:31.825355+0000 RemoteConnectionManager boringssl_session_handshake_incomplete(170) [C21.1:1][0x1006319a0] Handshake incomplete: waiting for data to read [2]
  96. default 00:42:31.825378+0000 RemoteConnectionManager boringssl_session_handshake_incomplete(170) [C21.1:1][0x1006319a0] Handshake incomplete: waiting for data to read [2]
  97. default 00:42:31.915863+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Reading SSL3_RT_CHANGE_CIPHER_SPEC 1 bytes
  98. default 00:42:31.915966+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client read_server_finished
  99. default 00:42:31.916023+0000 RemoteConnectionManager boringssl_context_message_handler(2257) [C21.1:1][0x1006319a0] Reading SSL3_RT_HANDSHAKE 16 bytes
  100. default 00:42:31.916137+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client finish_client_handshake
  101. default 00:42:31.916188+0000 RemoteConnectionManager boringssl_context_new_session_handler(1116) [C21.1:1][0x1006319a0] New session available
  102. default 00:42:31.916264+0000 RemoteConnectionManager boringssl_context_info_handler(1982) [C21.1:1][0x1006319a0] Client handshake state: TLS client done
  103. default 00:42:31.916457+0000 RemoteConnectionManager boringssl_context_copy_peer_sct_list(1002) [C21.1:1][0x1006319a0] SSL_get0_signed_cert_timestamp_list returned no SCT extension data
  104. default 00:42:31.916671+0000 RemoteConnectionManager boringssl_helper_create_sec_trust_with_certificates(607) [C21.1:1][0x1006319a0] SecTrustCreateWithCertificates result: 0
  105. default 00:42:31.916778+0000 RemoteConnectionManager boringssl_helper_create_sec_trust_with_certificates(614) [C21.1:1][0x1006319a0] No TLS-provided OCSP response
  106. default 00:42:31.916860+0000 RemoteConnectionManager boringssl_helper_create_sec_trust_with_certificates(621) [C21.1:1][0x1006319a0] No TLS-provided SCTs
  107. default 00:42:31.917239+0000 RemoteConnectionManager boringssl_context_add_handshake_message_pending(577) [C21.1:1][0x1006319a0] Adding message(20)
  108. default 00:42:31.917288+0000 RemoteConnectionManager boringssl_context_info_handler(1973) [C21.1:1][0x1006319a0] Client handshake done
  109. default 00:42:31.917368+0000 RemoteConnectionManager nw_protocol_boringssl_signal_connected(701) [C21.1:1][0x1006319a0] TLS connected [version(0x0303) ciphersuite(0xc02f) group(0x0017) peer_key(0x0601) alpn() resumed(0) offered_ticket(0) false_started(0) ocsp(0) sct(0)]
  110. default 00:42:31.917481+0000 RemoteConnectionManager nw_flow_connected [C21.1 IPv4#a2d6f3ad:65533 in_progress socket-flow (satisfied (Path is satisfied), interface: en0, ipv4, dns)] Output protocol connected
  111. default 00:42:31.917906+0000 RemoteConnectionManager nw_connection_report_state_with_handler_on_nw_queue [C21] reporting state ready
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement