On Wed, Nov 4, 2015 at 10:32 AM, Simon Deziel <simon.dez...@gmail.com>
wrote:

> > On Wed, Nov 04, 2015 at 08:49:10AM -0500, Simon Deziel wrote:
> >> It also works on the physical box. Thanks
> >
> > Thanks for testing.  Could one of you send me an openvpn log with
> > --verb 4 that shows what is now happening on suspend/resume?
>
> ATM, I have a verb 3 log from when I disabled/enabled the TAP. I hope
> that will be enough to validate the code flow, if not, I'll try to get
> your exactly what you asked for (will have to wait till end of day here).


A log showing  suspend-resume one would be better as suspend has the
potential to break more things than disable/enable  the interface. FWIW,
here is my log..

Selva
Wed Nov 04 10:37:58 2015 us=821795 Current Parameter Settings:
Wed Nov 04 10:37:58 2015 us=821795   config = 'test-config.ovpn'
Wed Nov 04 10:37:58 2015 us=821795   mode = 0
Wed Nov 04 10:37:58 2015 us=821795   show_ciphers = DISABLED
Wed Nov 04 10:37:58 2015 us=821795   show_digests = DISABLED
Wed Nov 04 10:37:58 2015 us=821795   show_engines = DISABLED
Wed Nov 04 10:37:58 2015 us=821795   genkey = DISABLED
Wed Nov 04 10:37:58 2015 us=821795   key_pass_file = '[UNDEF]'
Wed Nov 04 10:37:58 2015 us=821795   show_tls_ciphers = DISABLED
Wed Nov 04 10:37:58 2015 us=821795   connect_retry_max = 0
Wed Nov 04 10:37:58 2015 us=821795 NOTE: --mute triggered...
Wed Nov 04 10:37:58 2015 us=821795 280 variation(s) on previous 10 message(s) suppressed by --mute
Wed Nov 04 10:37:58 2015 us=821795 OpenVPN 2.3_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [IPv6] built on Nov  3 2015
Wed Nov 04 10:37:58 2015 us=821795 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Wed Nov 04 10:37:58 2015 us=821795 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7501
Wed Nov 04 10:37:58 2015 us=946595 Control Channel Authentication: using 'testvpn_ta.key' as a OpenVPN static key file
Wed Nov 04 10:37:58 2015 us=946595 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:37:58 2015 us=946595 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:37:58 2015 us=946595 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
Wed Nov 04 10:37:58 2015 us=946595 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
Wed Nov 04 10:37:58 2015 us=946595 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Wed Nov 04 10:37:58 2015 us=946595 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Wed Nov 04 10:37:58 2015 us=946595 WARNING: nice 3 failed (function not implemented)
Wed Nov 04 10:37:58 2015 us=946595 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:37:58 2015 us=946595 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Nov 04 10:37:58 2015 us=946595 UDP link local: (not bound)
Wed Nov 04 10:37:58 2015 us=946595 UDP link remote: [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:37:58 2015 us=962195 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=5d7646c7 9d4c3fb4
Wed Nov 04 10:37:59 2015 us=40195 VERIFY OK: depth=1, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=TestDomain CA, emailAddress=se...@sansel.ca
Wed Nov 04 10:37:59 2015 us=40195 VERIFY OK: nsCertType=SERVER
Wed Nov 04 10:37:59 2015 us=40195 VERIFY OK: depth=0, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=testvpn, emailAddress=se...@sansel.ca
Wed Nov 04 10:37:59 2015 us=118196 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Nov 04 10:37:59 2015 us=118196 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:37:59 2015 us=118196 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Nov 04 10:37:59 2015 us=118196 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:37:59 2015 us=118196 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 04 10:37:59 2015 us=118196 [testvpn] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:38:00 2015 us=303798 SENT CONTROL [testvpn]: 'PUSH_REQUEST' (status=1)
Wed Nov 04 10:38:00 2015 us=319398 PUSH: Received control message: 'PUSH_REPLY,route 10.9.0.1,topology net30,ping 10,ping-restart 120,dhcp-option DNS 192.168.0.30,route 10.9.0.0 255.255.255.0,ifconfig 10.9.0.10 10.9.0.9'
Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: timers and/or timeouts modified
Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: --ifconfig/up options modified
Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: route options modified
Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Nov 04 10:38:00 2015 us=319398 ROUTE_GATEWAY xx.yy.zz.1/255.255.255.192 I=11 HWADDR=f0:bf:97:d2:xx:yy
Wed Nov 04 10:38:00 2015 us=319398 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Nov 04 10:38:00 2015 us=319398 open_tun, tt->ipv6=0
Wed Nov 04 10:38:00 2015 us=319398 TAP-WIN32 device [TestDomain-VPN] opened: \\.\Global\{23F4E8B4-921D-49BF-BF16-6EE261935547}.tap
Wed Nov 04 10:38:00 2015 us=319398 TAP-Windows Driver Version 9.21 
Wed Nov 04 10:38:00 2015 us=319398 TAP-Windows MTU=1500
Wed Nov 04 10:38:00 2015 us=334998 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {23F4E8B4-921D-49BF-BF16-6EE261935547} [DHCP-serv: 10.9.0.9, lease-time: 31536000]
Wed Nov 04 10:38:00 2015 us=334998 DHCP option string: 0604c0a8 001e
Wed Nov 04 10:38:00 2015 us=334998 Successful ARP Flush on interface [23] {23F4E8B4-921D-49BF-BF16-6EE261935547}
Wed Nov 04 10:38:05 2015 us=514207 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
Wed Nov 04 10:38:05 2015 us=514207 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9
Wed Nov 04 10:38:05 2015 us=514207 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Wed Nov 04 10:38:05 2015 us=514207 Route addition via IPAPI succeeded [adaptive]
Wed Nov 04 10:38:05 2015 us=514207 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.9
Wed Nov 04 10:38:05 2015 us=529807 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Wed Nov 04 10:38:05 2015 us=529807 Route addition via IPAPI succeeded [adaptive]
Wed Nov 04 10:38:05 2015 us=529807 Initialization Sequence Completed
Wed Nov 04 10:38:15 2015 us=30224 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:7501
Wed Nov 04 10:38:17 2015 us=120627 MANAGEMENT: CMD 'log on'
Wed Nov 04 10:38:18 2015 us=711830 MANAGEMENT: CMD 'state'
Wed Nov 04 10:38:24 2015 us=983041 TUN/TAP I/O operation aborted, restarting
Wed Nov 04 10:38:24 2015 us=983041 TCP/UDP: Closing socket
Wed Nov 04 10:38:24 2015 us=983041 C:\Windows\system32\route.exe DELETE 10.9.0.1 MASK 255.255.255.255 10.9.0.9
Wed Nov 04 10:38:24 2015 us=998641 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9
Wed Nov 04 10:38:24 2015 us=998641 Route deletion via IPAPI failed [adaptive]
Wed Nov 04 10:38:24 2015 us=998641 Route deletion fallback to route.exe
Wed Nov 04 10:38:24 2015 us=998641 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Wed Nov 04 10:38:25 2015 us=61041 C:\Windows\system32\route.exe DELETE 10.9.0.0 MASK 255.255.255.0 10.9.0.9
Wed Nov 04 10:38:25 2015 us=76641 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9
Wed Nov 04 10:38:25 2015 us=76641 Route deletion via IPAPI failed [adaptive]
Wed Nov 04 10:38:25 2015 us=76641 Route deletion fallback to route.exe
Wed Nov 04 10:38:25 2015 us=76641 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Wed Nov 04 10:38:25 2015 us=123441 Closing TUN/TAP interface
Wed Nov 04 10:38:25 2015 us=123441 SIGHUP[soft,tun-abort] received, process restarting
Wed Nov 04 10:38:25 2015 us=123441 Current Parameter Settings:
Wed Nov 04 10:38:25 2015 us=123441   config = 'test-config.ovpn'
Wed Nov 04 10:38:25 2015 us=123441   mode = 0
Wed Nov 04 10:38:25 2015 us=123441   show_ciphers = DISABLED
Wed Nov 04 10:38:25 2015 us=123441   show_digests = DISABLED
Wed Nov 04 10:38:25 2015 us=123441   show_engines = DISABLED
Wed Nov 04 10:38:25 2015 us=123441   genkey = DISABLED
Wed Nov 04 10:38:25 2015 us=123441   key_pass_file = '[UNDEF]'
Wed Nov 04 10:38:25 2015 us=123441   show_tls_ciphers = DISABLED
Wed Nov 04 10:38:25 2015 us=123441   connect_retry_max = 0
Wed Nov 04 10:38:25 2015 us=123441 NOTE: --mute triggered...
Wed Nov 04 10:38:25 2015 us=123441 280 variation(s) on previous 10 message(s) suppressed by --mute
Wed Nov 04 10:38:25 2015 us=123441 OpenVPN 2.3_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [IPv6] built on Nov  3 2015
Wed Nov 04 10:38:25 2015 us=123441 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Wed Nov 04 10:38:25 2015 us=123441 Restart pause, 10 second(s)
Wed Nov 04 10:38:42 2015 us=500000 Control Channel Authentication: using 'testvpn_ta.key' as a OpenVPN static key file
Wed Nov 04 10:38:42 2015 us=500000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:38:42 2015 us=500000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:38:42 2015 us=500000 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
Wed Nov 04 10:38:42 2015 us=500000 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
Wed Nov 04 10:38:42 2015 us=500000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Wed Nov 04 10:38:46 2015 us=400006 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Wed Nov 04 10:38:46 2015 us=400006 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:38:46 2015 us=400006 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Nov 04 10:38:46 2015 us=400006 UDP link local: (not bound)
Wed Nov 04 10:38:46 2015 us=400006 UDP link remote: [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:38:47 2015 us=320408 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=12d39e7f 3ac65932
Wed Nov 04 10:38:47 2015 us=398408 VERIFY OK: depth=1, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=TestDomain CA, emailAddress=se...@sansel.ca
Wed Nov 04 10:38:47 2015 us=398408 VERIFY OK: nsCertType=SERVER
Wed Nov 04 10:38:47 2015 us=398408 VERIFY OK: depth=0, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=testvpn, emailAddress=se...@sansel.ca
Wed Nov 04 10:38:47 2015 us=460808 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Nov 04 10:38:47 2015 us=460808 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:38:47 2015 us=460808 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Nov 04 10:38:47 2015 us=460808 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:38:47 2015 us=460808 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 04 10:38:47 2015 us=460808 [testvpn] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:38:48 2015 us=537210 SENT CONTROL [testvpn]: 'PUSH_REQUEST' (status=1)
Wed Nov 04 10:38:48 2015 us=552810 PUSH: Received control message: 'PUSH_REPLY,route 10.9.0.1,topology net30,ping 10,ping-restart 120,dhcp-option DNS 192.168.0.30,route 10.9.0.0 255.255.255.0,ifconfig 10.9.0.10 10.9.0.9'
Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: timers and/or timeouts modified
Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: --ifconfig/up options modified
Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: route options modified
Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Nov 04 10:38:48 2015 us=552810 ROUTE_GATEWAY xx.yy.zz.1/255.255.255.192 I=11 HWADDR=f0:bf:97:d2:xx:yy
Wed Nov 04 10:38:48 2015 us=552810 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Nov 04 10:38:48 2015 us=552810 open_tun, tt->ipv6=0
Wed Nov 04 10:38:48 2015 us=552810 TAP-WIN32 device [TestDomain-VPN] opened: \\.\Global\{23F4E8B4-921D-49BF-BF16-6EE261935547}.tap
Wed Nov 04 10:38:48 2015 us=552810 TAP-Windows Driver Version 9.21 
Wed Nov 04 10:38:48 2015 us=552810 TAP-Windows MTU=1500
Wed Nov 04 10:38:48 2015 us=552810 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {23F4E8B4-921D-49BF-BF16-6EE261935547} [DHCP-serv: 10.9.0.9, lease-time: 31536000]
Wed Nov 04 10:38:48 2015 us=552810 DHCP option string: 0604c0a8 001e
Wed Nov 04 10:38:48 2015 us=552810 Successful ARP Flush on interface [23] {23F4E8B4-921D-49BF-BF16-6EE261935547}
Wed Nov 04 10:38:53 2015 us=638419 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
Wed Nov 04 10:38:53 2015 us=638419 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9
Wed Nov 04 10:38:53 2015 us=638419 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Wed Nov 04 10:38:53 2015 us=638419 Route addition via IPAPI succeeded [adaptive]
Wed Nov 04 10:38:53 2015 us=638419 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.9
Wed Nov 04 10:38:53 2015 us=638419 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Wed Nov 04 10:38:53 2015 us=638419 Route addition via IPAPI succeeded [adaptive]
Wed Nov 04 10:38:53 2015 us=638419 Initialization Sequence Completed
Wed Nov 04 10:39:04 2015 us=106038 TUN/TAP I/O operation aborted, restarting
Wed Nov 04 10:39:04 2015 us=106038 TCP/UDP: Closing socket
Wed Nov 04 10:39:04 2015 us=106038 C:\Windows\system32\route.exe DELETE 10.9.0.1 MASK 255.255.255.255 10.9.0.9
Wed Nov 04 10:39:04 2015 us=121638 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9
Wed Nov 04 10:39:04 2015 us=121638 Route deletion via IPAPI failed [adaptive]
Wed Nov 04 10:39:04 2015 us=121638 Route deletion fallback to route.exe
Wed Nov 04 10:39:04 2015 us=121638 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Wed Nov 04 10:39:04 2015 us=184038 C:\Windows\system32\route.exe DELETE 10.9.0.0 MASK 255.255.255.0 10.9.0.9
Wed Nov 04 10:39:04 2015 us=184038 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9
Wed Nov 04 10:39:04 2015 us=184038 Route deletion via IPAPI failed [adaptive]
Wed Nov 04 10:39:04 2015 us=184038 Route deletion fallback to route.exe
Wed Nov 04 10:39:04 2015 us=184038 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
Wed Nov 04 10:39:04 2015 us=230838 Closing TUN/TAP interface
Wed Nov 04 10:39:04 2015 us=230838 SIGHUP[soft,tun-abort] received, process restarting
Wed Nov 04 10:39:04 2015 us=230838 Current Parameter Settings:
Wed Nov 04 10:39:04 2015 us=230838   config = 'test-config.ovpn'
Wed Nov 04 10:39:04 2015 us=230838   mode = 0
Wed Nov 04 10:39:04 2015 us=230838   show_ciphers = DISABLED
Wed Nov 04 10:39:04 2015 us=230838   show_digests = DISABLED
Wed Nov 04 10:39:04 2015 us=230838   show_engines = DISABLED
Wed Nov 04 10:39:04 2015 us=230838   genkey = DISABLED
Wed Nov 04 10:39:04 2015 us=230838   key_pass_file = '[UNDEF]'
Wed Nov 04 10:39:04 2015 us=230838   show_tls_ciphers = DISABLED
Wed Nov 04 10:39:04 2015 us=230838   connect_retry_max = 0
Wed Nov 04 10:39:04 2015 us=230838 NOTE: --mute triggered...
Wed Nov 04 10:39:04 2015 us=230838 280 variation(s) on previous 10 message(s) suppressed by --mute
Wed Nov 04 10:39:04 2015 us=230838 OpenVPN 2.3_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [IPv6] built on Nov  3 2015
Wed Nov 04 10:39:04 2015 us=230838 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
Wed Nov 04 10:39:04 2015 us=230838 Restart pause, 10 second(s)
Wed Nov 04 10:39:25 2015 us=515600 Control Channel Authentication: using 'testvpn_ta.key' as a OpenVPN static key file
Wed Nov 04 10:39:29 2015 us=415606 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:39:29 2015 us=415606 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:39:29 2015 us=415606 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ]
Wed Nov 04 10:39:29 2015 us=415606 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ]
Wed Nov 04 10:39:29 2015 us=415606 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
Wed Nov 04 10:39:29 2015 us=415606 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
Wed Nov 04 10:39:29 2015 us=415606 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:39:29 2015 us=415606 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Nov 04 10:39:29 2015 us=415606 UDP link local: (not bound)
Wed Nov 04 10:39:29 2015 us=415606 UDP link remote: [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:39:31 2015 us=490410 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=6b79fb58 8e069cd0
Wed Nov 04 10:39:31 2015 us=568410 VERIFY OK: depth=1, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=TestDomain CA, emailAddress=se...@sansel.ca
Wed Nov 04 10:39:31 2015 us=568410 VERIFY OK: nsCertType=SERVER
Wed Nov 04 10:39:31 2015 us=568410 VERIFY OK: depth=0, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=testvpn, emailAddress=se...@sansel.ca
Wed Nov 04 10:39:31 2015 us=630810 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Nov 04 10:39:31 2015 us=630810 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:39:31 2015 us=630810 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Wed Nov 04 10:39:31 2015 us=630810 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Nov 04 10:39:31 2015 us=630810 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Nov 04 10:39:31 2015 us=630810 [testvpn] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194
Wed Nov 04 10:39:32 2015 us=660412 SENT CONTROL [testvpn]: 'PUSH_REQUEST' (status=1)
Wed Nov 04 10:39:32 2015 us=660412 PUSH: Received control message: 'PUSH_REPLY,route 10.9.0.1,topology net30,ping 10,ping-restart 120,dhcp-option DNS 192.168.0.30,route 10.9.0.0 255.255.255.0,ifconfig 10.9.0.10 10.9.0.9'
Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: timers and/or timeouts modified
Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: --ifconfig/up options modified
Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: route options modified
Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Nov 04 10:39:32 2015 us=676012 ROUTE_GATEWAY xx.yy.zz.1/255.255.255.192 I=11 HWADDR=f0:bf:97:d2:xx:yy
Wed Nov 04 10:39:32 2015 us=676012 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Nov 04 10:39:32 2015 us=676012 open_tun, tt->ipv6=0
Wed Nov 04 10:39:32 2015 us=676012 TAP-WIN32 device [TestDomain-VPN] opened: \\.\Global\{23F4E8B4-921D-49BF-BF16-6EE261935547}.tap
Wed Nov 04 10:39:32 2015 us=676012 TAP-Windows Driver Version 9.21 
Wed Nov 04 10:39:32 2015 us=676012 TAP-Windows MTU=1500
Wed Nov 04 10:39:32 2015 us=676012 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {23F4E8B4-921D-49BF-BF16-6EE261935547} [DHCP-serv: 10.9.0.9, lease-time: 31536000]
Wed Nov 04 10:39:32 2015 us=676012 DHCP option string: 0604c0a8 001e
Wed Nov 04 10:39:32 2015 us=676012 Successful ARP Flush on interface [23] {23F4E8B4-921D-49BF-BF16-6EE261935547}
Wed Nov 04 10:39:37 2015 us=714821 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
Wed Nov 04 10:39:37 2015 us=714821 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9
Wed Nov 04 10:39:37 2015 us=714821 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Wed Nov 04 10:39:37 2015 us=714821 Route addition via IPAPI succeeded [adaptive]
Wed Nov 04 10:39:37 2015 us=714821 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.9
Wed Nov 04 10:39:37 2015 us=714821 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Wed Nov 04 10:39:37 2015 us=714821 Route addition via IPAPI succeeded [adaptive]
Wed Nov 04 10:39:37 2015 us=714821 Initialization Sequence Completed
Wed Nov 04 10:39:50 2015 us=382043 SIGTERM received, sending exit notification to peer
Wed Nov 04 10:39:53 2015 us=548849 TCP/UDP: Closing socket
Wed Nov 04 10:39:53 2015 us=548849 C:\Windows\system32\route.exe DELETE 10.9.0.1 MASK 255.255.255.255 10.9.0.9
Wed Nov 04 10:39:53 2015 us=548849 Route deletion via IPAPI succeeded [adaptive]
Wed Nov 04 10:39:53 2015 us=548849 C:\Windows\system32\route.exe DELETE 10.9.0.0 MASK 255.255.255.0 10.9.0.9
Wed Nov 04 10:39:53 2015 us=548849 Route deletion via IPAPI succeeded [adaptive]
Wed Nov 04 10:39:53 2015 us=548849 Closing TUN/TAP interface
Wed Nov 04 10:39:53 2015 us=548849 SIGTERM[soft,exit-with-notification] received, process exiting
------------------------------------------------------------------------------
_______________________________________________
Openvpn-users mailing list
Openvpn-users@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/openvpn-users

Reply via email to