On Wed, Nov 4, 2015 at 10:32 AM, Simon Deziel <simon.dez...@gmail.com> wrote:
> > On Wed, Nov 04, 2015 at 08:49:10AM -0500, Simon Deziel wrote: > >> It also works on the physical box. Thanks > > > > Thanks for testing. Could one of you send me an openvpn log with > > --verb 4 that shows what is now happening on suspend/resume? > > ATM, I have a verb 3 log from when I disabled/enabled the TAP. I hope > that will be enough to validate the code flow, if not, I'll try to get > your exactly what you asked for (will have to wait till end of day here). A log showing suspend-resume one would be better as suspend has the potential to break more things than disable/enable the interface. FWIW, here is my log.. Selva
Wed Nov 04 10:37:58 2015 us=821795 Current Parameter Settings: Wed Nov 04 10:37:58 2015 us=821795 config = 'test-config.ovpn' Wed Nov 04 10:37:58 2015 us=821795 mode = 0 Wed Nov 04 10:37:58 2015 us=821795 show_ciphers = DISABLED Wed Nov 04 10:37:58 2015 us=821795 show_digests = DISABLED Wed Nov 04 10:37:58 2015 us=821795 show_engines = DISABLED Wed Nov 04 10:37:58 2015 us=821795 genkey = DISABLED Wed Nov 04 10:37:58 2015 us=821795 key_pass_file = '[UNDEF]' Wed Nov 04 10:37:58 2015 us=821795 show_tls_ciphers = DISABLED Wed Nov 04 10:37:58 2015 us=821795 connect_retry_max = 0 Wed Nov 04 10:37:58 2015 us=821795 NOTE: --mute triggered... Wed Nov 04 10:37:58 2015 us=821795 280 variation(s) on previous 10 message(s) suppressed by --mute Wed Nov 04 10:37:58 2015 us=821795 OpenVPN 2.3_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [IPv6] built on Nov 3 2015 Wed Nov 04 10:37:58 2015 us=821795 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08 Wed Nov 04 10:37:58 2015 us=821795 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7501 Wed Nov 04 10:37:58 2015 us=946595 Control Channel Authentication: using 'testvpn_ta.key' as a OpenVPN static key file Wed Nov 04 10:37:58 2015 us=946595 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:37:58 2015 us=946595 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:37:58 2015 us=946595 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ] Wed Nov 04 10:37:58 2015 us=946595 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ] Wed Nov 04 10:37:58 2015 us=946595 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client' Wed Nov 04 10:37:58 2015 us=946595 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server' Wed Nov 04 10:37:58 2015 us=946595 WARNING: nice 3 failed (function not implemented) Wed Nov 04 10:37:58 2015 us=946595 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:37:58 2015 us=946595 Socket Buffers: R=[8192->8192] S=[8192->8192] Wed Nov 04 10:37:58 2015 us=946595 UDP link local: (not bound) Wed Nov 04 10:37:58 2015 us=946595 UDP link remote: [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:37:58 2015 us=962195 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=5d7646c7 9d4c3fb4 Wed Nov 04 10:37:59 2015 us=40195 VERIFY OK: depth=1, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=TestDomain CA, emailAddress=se...@sansel.ca Wed Nov 04 10:37:59 2015 us=40195 VERIFY OK: nsCertType=SERVER Wed Nov 04 10:37:59 2015 us=40195 VERIFY OK: depth=0, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=testvpn, emailAddress=se...@sansel.ca Wed Nov 04 10:37:59 2015 us=118196 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed Nov 04 10:37:59 2015 us=118196 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:37:59 2015 us=118196 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed Nov 04 10:37:59 2015 us=118196 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:37:59 2015 us=118196 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Wed Nov 04 10:37:59 2015 us=118196 [testvpn] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:38:00 2015 us=303798 SENT CONTROL [testvpn]: 'PUSH_REQUEST' (status=1) Wed Nov 04 10:38:00 2015 us=319398 PUSH: Received control message: 'PUSH_REPLY,route 10.9.0.1,topology net30,ping 10,ping-restart 120,dhcp-option DNS 192.168.0.30,route 10.9.0.0 255.255.255.0,ifconfig 10.9.0.10 10.9.0.9' Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: timers and/or timeouts modified Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: --ifconfig/up options modified Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: route options modified Wed Nov 04 10:38:00 2015 us=319398 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Nov 04 10:38:00 2015 us=319398 ROUTE_GATEWAY xx.yy.zz.1/255.255.255.192 I=11 HWADDR=f0:bf:97:d2:xx:yy Wed Nov 04 10:38:00 2015 us=319398 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed Nov 04 10:38:00 2015 us=319398 open_tun, tt->ipv6=0 Wed Nov 04 10:38:00 2015 us=319398 TAP-WIN32 device [TestDomain-VPN] opened: \\.\Global\{23F4E8B4-921D-49BF-BF16-6EE261935547}.tap Wed Nov 04 10:38:00 2015 us=319398 TAP-Windows Driver Version 9.21 Wed Nov 04 10:38:00 2015 us=319398 TAP-Windows MTU=1500 Wed Nov 04 10:38:00 2015 us=334998 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {23F4E8B4-921D-49BF-BF16-6EE261935547} [DHCP-serv: 10.9.0.9, lease-time: 31536000] Wed Nov 04 10:38:00 2015 us=334998 DHCP option string: 0604c0a8 001e Wed Nov 04 10:38:00 2015 us=334998 Successful ARP Flush on interface [23] {23F4E8B4-921D-49BF-BF16-6EE261935547} Wed Nov 04 10:38:05 2015 us=514207 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up Wed Nov 04 10:38:05 2015 us=514207 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9 Wed Nov 04 10:38:05 2015 us=514207 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Wed Nov 04 10:38:05 2015 us=514207 Route addition via IPAPI succeeded [adaptive] Wed Nov 04 10:38:05 2015 us=514207 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.9 Wed Nov 04 10:38:05 2015 us=529807 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Wed Nov 04 10:38:05 2015 us=529807 Route addition via IPAPI succeeded [adaptive] Wed Nov 04 10:38:05 2015 us=529807 Initialization Sequence Completed Wed Nov 04 10:38:15 2015 us=30224 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:7501 Wed Nov 04 10:38:17 2015 us=120627 MANAGEMENT: CMD 'log on' Wed Nov 04 10:38:18 2015 us=711830 MANAGEMENT: CMD 'state' Wed Nov 04 10:38:24 2015 us=983041 TUN/TAP I/O operation aborted, restarting Wed Nov 04 10:38:24 2015 us=983041 TCP/UDP: Closing socket Wed Nov 04 10:38:24 2015 us=983041 C:\Windows\system32\route.exe DELETE 10.9.0.1 MASK 255.255.255.255 10.9.0.9 Wed Nov 04 10:38:24 2015 us=998641 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9 Wed Nov 04 10:38:24 2015 us=998641 Route deletion via IPAPI failed [adaptive] Wed Nov 04 10:38:24 2015 us=998641 Route deletion fallback to route.exe Wed Nov 04 10:38:24 2015 us=998641 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem Wed Nov 04 10:38:25 2015 us=61041 C:\Windows\system32\route.exe DELETE 10.9.0.0 MASK 255.255.255.0 10.9.0.9 Wed Nov 04 10:38:25 2015 us=76641 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9 Wed Nov 04 10:38:25 2015 us=76641 Route deletion via IPAPI failed [adaptive] Wed Nov 04 10:38:25 2015 us=76641 Route deletion fallback to route.exe Wed Nov 04 10:38:25 2015 us=76641 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem Wed Nov 04 10:38:25 2015 us=123441 Closing TUN/TAP interface Wed Nov 04 10:38:25 2015 us=123441 SIGHUP[soft,tun-abort] received, process restarting Wed Nov 04 10:38:25 2015 us=123441 Current Parameter Settings: Wed Nov 04 10:38:25 2015 us=123441 config = 'test-config.ovpn' Wed Nov 04 10:38:25 2015 us=123441 mode = 0 Wed Nov 04 10:38:25 2015 us=123441 show_ciphers = DISABLED Wed Nov 04 10:38:25 2015 us=123441 show_digests = DISABLED Wed Nov 04 10:38:25 2015 us=123441 show_engines = DISABLED Wed Nov 04 10:38:25 2015 us=123441 genkey = DISABLED Wed Nov 04 10:38:25 2015 us=123441 key_pass_file = '[UNDEF]' Wed Nov 04 10:38:25 2015 us=123441 show_tls_ciphers = DISABLED Wed Nov 04 10:38:25 2015 us=123441 connect_retry_max = 0 Wed Nov 04 10:38:25 2015 us=123441 NOTE: --mute triggered... Wed Nov 04 10:38:25 2015 us=123441 280 variation(s) on previous 10 message(s) suppressed by --mute Wed Nov 04 10:38:25 2015 us=123441 OpenVPN 2.3_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [IPv6] built on Nov 3 2015 Wed Nov 04 10:38:25 2015 us=123441 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08 Wed Nov 04 10:38:25 2015 us=123441 Restart pause, 10 second(s) Wed Nov 04 10:38:42 2015 us=500000 Control Channel Authentication: using 'testvpn_ta.key' as a OpenVPN static key file Wed Nov 04 10:38:42 2015 us=500000 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:38:42 2015 us=500000 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:38:42 2015 us=500000 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ] Wed Nov 04 10:38:42 2015 us=500000 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ] Wed Nov 04 10:38:42 2015 us=500000 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client' Wed Nov 04 10:38:46 2015 us=400006 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server' Wed Nov 04 10:38:46 2015 us=400006 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:38:46 2015 us=400006 Socket Buffers: R=[8192->8192] S=[8192->8192] Wed Nov 04 10:38:46 2015 us=400006 UDP link local: (not bound) Wed Nov 04 10:38:46 2015 us=400006 UDP link remote: [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:38:47 2015 us=320408 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=12d39e7f 3ac65932 Wed Nov 04 10:38:47 2015 us=398408 VERIFY OK: depth=1, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=TestDomain CA, emailAddress=se...@sansel.ca Wed Nov 04 10:38:47 2015 us=398408 VERIFY OK: nsCertType=SERVER Wed Nov 04 10:38:47 2015 us=398408 VERIFY OK: depth=0, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=testvpn, emailAddress=se...@sansel.ca Wed Nov 04 10:38:47 2015 us=460808 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed Nov 04 10:38:47 2015 us=460808 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:38:47 2015 us=460808 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed Nov 04 10:38:47 2015 us=460808 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:38:47 2015 us=460808 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Wed Nov 04 10:38:47 2015 us=460808 [testvpn] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:38:48 2015 us=537210 SENT CONTROL [testvpn]: 'PUSH_REQUEST' (status=1) Wed Nov 04 10:38:48 2015 us=552810 PUSH: Received control message: 'PUSH_REPLY,route 10.9.0.1,topology net30,ping 10,ping-restart 120,dhcp-option DNS 192.168.0.30,route 10.9.0.0 255.255.255.0,ifconfig 10.9.0.10 10.9.0.9' Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: timers and/or timeouts modified Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: --ifconfig/up options modified Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: route options modified Wed Nov 04 10:38:48 2015 us=552810 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Nov 04 10:38:48 2015 us=552810 ROUTE_GATEWAY xx.yy.zz.1/255.255.255.192 I=11 HWADDR=f0:bf:97:d2:xx:yy Wed Nov 04 10:38:48 2015 us=552810 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed Nov 04 10:38:48 2015 us=552810 open_tun, tt->ipv6=0 Wed Nov 04 10:38:48 2015 us=552810 TAP-WIN32 device [TestDomain-VPN] opened: \\.\Global\{23F4E8B4-921D-49BF-BF16-6EE261935547}.tap Wed Nov 04 10:38:48 2015 us=552810 TAP-Windows Driver Version 9.21 Wed Nov 04 10:38:48 2015 us=552810 TAP-Windows MTU=1500 Wed Nov 04 10:38:48 2015 us=552810 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {23F4E8B4-921D-49BF-BF16-6EE261935547} [DHCP-serv: 10.9.0.9, lease-time: 31536000] Wed Nov 04 10:38:48 2015 us=552810 DHCP option string: 0604c0a8 001e Wed Nov 04 10:38:48 2015 us=552810 Successful ARP Flush on interface [23] {23F4E8B4-921D-49BF-BF16-6EE261935547} Wed Nov 04 10:38:53 2015 us=638419 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up Wed Nov 04 10:38:53 2015 us=638419 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9 Wed Nov 04 10:38:53 2015 us=638419 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Wed Nov 04 10:38:53 2015 us=638419 Route addition via IPAPI succeeded [adaptive] Wed Nov 04 10:38:53 2015 us=638419 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.9 Wed Nov 04 10:38:53 2015 us=638419 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Wed Nov 04 10:38:53 2015 us=638419 Route addition via IPAPI succeeded [adaptive] Wed Nov 04 10:38:53 2015 us=638419 Initialization Sequence Completed Wed Nov 04 10:39:04 2015 us=106038 TUN/TAP I/O operation aborted, restarting Wed Nov 04 10:39:04 2015 us=106038 TCP/UDP: Closing socket Wed Nov 04 10:39:04 2015 us=106038 C:\Windows\system32\route.exe DELETE 10.9.0.1 MASK 255.255.255.255 10.9.0.9 Wed Nov 04 10:39:04 2015 us=121638 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9 Wed Nov 04 10:39:04 2015 us=121638 Route deletion via IPAPI failed [adaptive] Wed Nov 04 10:39:04 2015 us=121638 Route deletion fallback to route.exe Wed Nov 04 10:39:04 2015 us=121638 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem Wed Nov 04 10:39:04 2015 us=184038 C:\Windows\system32\route.exe DELETE 10.9.0.0 MASK 255.255.255.0 10.9.0.9 Wed Nov 04 10:39:04 2015 us=184038 Warning: route gateway is not reachable on any active network adapters: 10.9.0.9 Wed Nov 04 10:39:04 2015 us=184038 Route deletion via IPAPI failed [adaptive] Wed Nov 04 10:39:04 2015 us=184038 Route deletion fallback to route.exe Wed Nov 04 10:39:04 2015 us=184038 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem Wed Nov 04 10:39:04 2015 us=230838 Closing TUN/TAP interface Wed Nov 04 10:39:04 2015 us=230838 SIGHUP[soft,tun-abort] received, process restarting Wed Nov 04 10:39:04 2015 us=230838 Current Parameter Settings: Wed Nov 04 10:39:04 2015 us=230838 config = 'test-config.ovpn' Wed Nov 04 10:39:04 2015 us=230838 mode = 0 Wed Nov 04 10:39:04 2015 us=230838 show_ciphers = DISABLED Wed Nov 04 10:39:04 2015 us=230838 show_digests = DISABLED Wed Nov 04 10:39:04 2015 us=230838 show_engines = DISABLED Wed Nov 04 10:39:04 2015 us=230838 genkey = DISABLED Wed Nov 04 10:39:04 2015 us=230838 key_pass_file = '[UNDEF]' Wed Nov 04 10:39:04 2015 us=230838 show_tls_ciphers = DISABLED Wed Nov 04 10:39:04 2015 us=230838 connect_retry_max = 0 Wed Nov 04 10:39:04 2015 us=230838 NOTE: --mute triggered... Wed Nov 04 10:39:04 2015 us=230838 280 variation(s) on previous 10 message(s) suppressed by --mute Wed Nov 04 10:39:04 2015 us=230838 OpenVPN 2.3_git x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [IPv6] built on Nov 3 2015 Wed Nov 04 10:39:04 2015 us=230838 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08 Wed Nov 04 10:39:04 2015 us=230838 Restart pause, 10 second(s) Wed Nov 04 10:39:25 2015 us=515600 Control Channel Authentication: using 'testvpn_ta.key' as a OpenVPN static key file Wed Nov 04 10:39:29 2015 us=415606 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:39:29 2015 us=415606 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:39:29 2015 us=415606 Control Channel MTU parms [ L:1557 D:1184 EF:66 EB:0 ET:0 EL:3 ] Wed Nov 04 10:39:29 2015 us=415606 Data Channel MTU parms [ L:1557 D:1450 EF:57 EB:395 ET:0 EL:3 ] Wed Nov 04 10:39:29 2015 us=415606 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client' Wed Nov 04 10:39:29 2015 us=415606 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server' Wed Nov 04 10:39:29 2015 us=415606 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:39:29 2015 us=415606 Socket Buffers: R=[8192->8192] S=[8192->8192] Wed Nov 04 10:39:29 2015 us=415606 UDP link local: (not bound) Wed Nov 04 10:39:29 2015 us=415606 UDP link remote: [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:39:31 2015 us=490410 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=6b79fb58 8e069cd0 Wed Nov 04 10:39:31 2015 us=568410 VERIFY OK: depth=1, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=TestDomain CA, emailAddress=se...@sansel.ca Wed Nov 04 10:39:31 2015 us=568410 VERIFY OK: nsCertType=SERVER Wed Nov 04 10:39:31 2015 us=568410 VERIFY OK: depth=0, C=CA, ST=ON, L=AbccbA, O=TestDomain, OU=IT, CN=testvpn, emailAddress=se...@sansel.ca Wed Nov 04 10:39:31 2015 us=630810 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed Nov 04 10:39:31 2015 us=630810 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:39:31 2015 us=630810 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Wed Nov 04 10:39:31 2015 us=630810 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Wed Nov 04 10:39:31 2015 us=630810 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Wed Nov 04 10:39:31 2015 us=630810 [testvpn] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194 Wed Nov 04 10:39:32 2015 us=660412 SENT CONTROL [testvpn]: 'PUSH_REQUEST' (status=1) Wed Nov 04 10:39:32 2015 us=660412 PUSH: Received control message: 'PUSH_REPLY,route 10.9.0.1,topology net30,ping 10,ping-restart 120,dhcp-option DNS 192.168.0.30,route 10.9.0.0 255.255.255.0,ifconfig 10.9.0.10 10.9.0.9' Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: timers and/or timeouts modified Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: --ifconfig/up options modified Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: route options modified Wed Nov 04 10:39:32 2015 us=660412 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Wed Nov 04 10:39:32 2015 us=676012 ROUTE_GATEWAY xx.yy.zz.1/255.255.255.192 I=11 HWADDR=f0:bf:97:d2:xx:yy Wed Nov 04 10:39:32 2015 us=676012 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Wed Nov 04 10:39:32 2015 us=676012 open_tun, tt->ipv6=0 Wed Nov 04 10:39:32 2015 us=676012 TAP-WIN32 device [TestDomain-VPN] opened: \\.\Global\{23F4E8B4-921D-49BF-BF16-6EE261935547}.tap Wed Nov 04 10:39:32 2015 us=676012 TAP-Windows Driver Version 9.21 Wed Nov 04 10:39:32 2015 us=676012 TAP-Windows MTU=1500 Wed Nov 04 10:39:32 2015 us=676012 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.10/255.255.255.252 on interface {23F4E8B4-921D-49BF-BF16-6EE261935547} [DHCP-serv: 10.9.0.9, lease-time: 31536000] Wed Nov 04 10:39:32 2015 us=676012 DHCP option string: 0604c0a8 001e Wed Nov 04 10:39:32 2015 us=676012 Successful ARP Flush on interface [23] {23F4E8B4-921D-49BF-BF16-6EE261935547} Wed Nov 04 10:39:37 2015 us=714821 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up Wed Nov 04 10:39:37 2015 us=714821 C:\Windows\system32\route.exe ADD 10.9.0.1 MASK 255.255.255.255 10.9.0.9 Wed Nov 04 10:39:37 2015 us=714821 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Wed Nov 04 10:39:37 2015 us=714821 Route addition via IPAPI succeeded [adaptive] Wed Nov 04 10:39:37 2015 us=714821 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.9 Wed Nov 04 10:39:37 2015 us=714821 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Wed Nov 04 10:39:37 2015 us=714821 Route addition via IPAPI succeeded [adaptive] Wed Nov 04 10:39:37 2015 us=714821 Initialization Sequence Completed Wed Nov 04 10:39:50 2015 us=382043 SIGTERM received, sending exit notification to peer Wed Nov 04 10:39:53 2015 us=548849 TCP/UDP: Closing socket Wed Nov 04 10:39:53 2015 us=548849 C:\Windows\system32\route.exe DELETE 10.9.0.1 MASK 255.255.255.255 10.9.0.9 Wed Nov 04 10:39:53 2015 us=548849 Route deletion via IPAPI succeeded [adaptive] Wed Nov 04 10:39:53 2015 us=548849 C:\Windows\system32\route.exe DELETE 10.9.0.0 MASK 255.255.255.0 10.9.0.9 Wed Nov 04 10:39:53 2015 us=548849 Route deletion via IPAPI succeeded [adaptive] Wed Nov 04 10:39:53 2015 us=548849 Closing TUN/TAP interface Wed Nov 04 10:39:53 2015 us=548849 SIGTERM[soft,exit-with-notification] received, process exiting
------------------------------------------------------------------------------
_______________________________________________ Openvpn-users mailing list Openvpn-users@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/openvpn-users