Tue Apr 15 21:57:28 2014 OpenVPN 2.2.1 x86_64-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Mar 13 2014
Tue Apr 15 21:57:28 2014 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Tue Apr 15 21:57:28 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Apr 15 21:57:28 2014 Diffie-Hellman initialized with 1024 bit key
Tue Apr 15 21:57:28 2014 TLS-Auth MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 15 21:57:28 2014 Socket Buffers: R=[212992->131072] S=[212992->131072]
Tue Apr 15 21:57:28 2014 ROUTE default_gateway=192.168.1.1
Tue Apr 15 21:57:28 2014 TUN/TAP device tun0 opened
Tue Apr 15 21:57:28 2014 TUN/TAP TX queue length set to 100
Tue Apr 15 21:57:28 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Tue Apr 15 21:57:28 2014 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
Tue Apr 15 21:57:28 2014 /sbin/route add -net 192.168.0.0 netmask 255.255.255.0 gw 10.8.0.2
Tue Apr 15 21:57:28 2014 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
Tue Apr 15 21:57:28 2014 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 15 21:57:28 2014 GID set to nogroup
Tue Apr 15 21:57:28 2014 UID set to nobody
Tue Apr 15 21:57:28 2014 UDPv4 link local (bound): [undef]
Tue Apr 15 21:57:28 2014 UDPv4 link remote: [undef]
Tue Apr 15 21:57:28 2014 MULTI: multi_init called, r=256 v=256
Tue Apr 15 21:57:28 2014 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Tue Apr 15 21:57:28 2014 ifconfig_pool_read(), in='cl1,10.8.0.4', TODO: IPv6
Tue Apr 15 21:57:28 2014 succeeded -> ifconfig_pool_set()
Tue Apr 15 21:57:28 2014 IFCONFIG POOL LIST
Tue Apr 15 21:57:28 2014 cl1,10.8.0.4
Tue Apr 15 21:57:28 2014 Initialization Sequence Completed
Tue Apr 15 21:58:29 2014 MULTI: multi_create_instance called
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 Re-using SSL/TLS context
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 LZO compression initialized
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 Local Options hash (VER=V4): '530fdded'
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 15 21:58:29 2014 109.203.212.31:1194 TLS: Initial packet from [AF_INET]109.203.212.31:1194, sid=360cd2cf db91658b
Tue Apr 15 21:58:34 2014 109.203.212.31:1194 VERIFY OK: depth=1, /C=RU/ST=AltKr/L=Barnaul/O=MyCorp/OU=server/CN=server/name=server/emailAddress=mail@host.domain
Tue Apr 15 21:58:34 2014 109.203.212.31:1194 VERIFY OK: depth=0, /C=RU/ST=AltKr/L=Barnaul/O=MyCorp/OU=client/CN=cl1/name=client/emailAddress=mail@host.domain
Tue Apr 15 21:58:36 2014 109.203.212.31:1194 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Apr 15 21:58:36 2014 109.203.212.31:1194 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Apr 15 21:58:36 2014 109.203.212.31:1194 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Apr 15 21:58:36 2014 109.203.212.31:1194 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Apr 15 21:58:36 2014 109.203.212.31:1194 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Apr 15 21:58:36 2014 109.203.212.31:1194 [cl1] Peer Connection Initiated with [AF_INET]109.203.212.31:1194
Tue Apr 15 21:58:36 2014 cl1/109.203.212.31:1194 OPTIONS IMPORT: reading client specific options from: ccd/cl1
Tue Apr 15 21:58:36 2014 cl1/109.203.212.31:1194 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=707a:ee40:597f:0:15a8:8e3e:597f:0
Tue Apr 15 21:58:36 2014 cl1/109.203.212.31:1194 MULTI: Learn: 10.8.0.6 -> cl1/109.203.212.31:1194
Tue Apr 15 21:58:36 2014 cl1/109.203.212.31:1194 MULTI: primary virtual IP for cl1/109.203.212.31:1194: 10.8.0.6
Tue Apr 15 21:58:36 2014 cl1/109.203.212.31:1194 MULTI: internal route 192.168.0.0/24 -> cl1/109.203.212.31:1194
Tue Apr 15 21:58:36 2014 cl1/109.203.212.31:1194 MULTI: Learn: 192.168.0.0/24 -> cl1/109.203.212.31:1194
Tue Apr 15 21:58:38 2014 cl1/109.203.212.31:1194 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 15 21:58:38 2014 cl1/109.203.212.31:1194 send_push_reply(): safe_cap=960
Tue Apr 15 21:58:38 2014 cl1/109.203.212.31:1194 SENT CONTROL [cl1]: 'PUSH_REPLY,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,route 192.168.1.0 255.255.255.0,ifconfig 10.8.0.6 10.8.0.5' (status=1)
Tue Apr 15 22:16:41 2014 cl1/109.203.212.31:1194 TLS: new session incoming connection from [AF_INET]109.203.212.31:1194
Tue Apr 15 22:16:48 2014 cl1/109.203.212.31:1194 VERIFY OK: depth=1, /C=RU/ST=AltKr/L=Barnaul/O=MyCorp/OU=server/CN=server/name=server/emailAddress=mail@host.domain
Tue Apr 15 22:16:48 2014 cl1/109.203.212.31:1194 VERIFY OK: depth=0, /C=RU/ST=AltKr/L=Barnaul/O=MyCorp/OU=client/CN=cl1/name=client/emailAddress=mail@host.domain
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 TLS: tls_multi_process: untrusted session promoted to semi-trusted
Tue Apr 15 22:16:53 2014 cl1/109.203.212.31:1194 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Apr 15 22:16:55 2014 cl1/109.203.212.31:1194 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 15 22:16:55 2014 cl1/109.203.212.31:1194 send_push_reply(): safe_cap=960
Tue Apr 15 22:16:55 2014 cl1/109.203.212.31:1194 SENT CONTROL [cl1]: 'PUSH_REPLY,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,route 192.168.1.0 255.255.255.0,ifconfig 10.8.0.6 10.8.0.5' (status=1)
Tue Apr 15 22:16:59 2014 cl1/109.203.212.31:1194 Replay-window backtrack occurred [1]
Tue Apr 15 22:19:37 2014 MULTI: multi_create_instance called
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Re-using SSL/TLS context
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 LZO compression initialized
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Local Options hash (VER=V4): '530fdded'
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Expected Remote Options hash (VER=V4): '41690919'
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 TLS: Initial packet from [AF_INET]46.50.ххх.23:1194, sid=4ad806c6 29a57a26
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 VERIFY OK: depth=1, /C=RU/ST=AltKr/L=Barnaul/O=MyCorp/OU=server/CN=server/name=server/emailAddress=mail@host.domain
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 VERIFY OK: depth=0, /C=RU/ST=AltKr/L=Barnaul/O=MyCorp/OU=client/CN=cl1/name=client/emailAddress=mail@host.domain
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Tue Apr 15 22:19:37 2014 46.50.ххх.23:1194 [cl1] Peer Connection Initiated with [AF_INET]46.50.214.23:1194
Tue Apr 15 22:19:37 2014 MULTI: new connection by client 'cl1' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
Tue Apr 15 22:19:37 2014 OPTIONS IMPORT: reading client specific options from: ccd/cl1
Tue Apr 15 22:19:37 2014 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=9025:f240:597f:0:15a8:8e3e:597f:0
Tue Apr 15 22:19:37 2014 MULTI: Learn: 10.8.0.6 -> cl1/46.50.ххх.23:1194
Tue Apr 15 22:19:37 2014 MULTI: primary virtual IP for cl1/46.50.ххх.23:1194: 10.8.0.6
Tue Apr 15 22:19:37 2014 MULTI: internal route 192.168.0.0/24 -> cl1/46.50.ххх.23:1194
Tue Apr 15 22:19:37 2014 MULTI: Learn: 192.168.0.0/24 -> cl1/46.50.ххх.23:1194
Tue Apr 15 22:19:39 2014 cl1/46.50.ххх.23:1194 PUSH: Received control message: 'PUSH_REQUEST'
Tue Apr 15 22:19:39 2014 cl1/46.50.ххх.23:1194 send_push_reply(): safe_cap=960
Tue Apr 15 22:19:39 2014 cl1/46.50.ххх.23:1194 SENT CONTROL [cl1]: 'PUSH_REPLY,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,route 192.168.1.0 255.255.255.0,ifconfig 10.8.0.6 10.8.0.5' (status=1)