Szanowni koledzy, mam problem z usykaniem połączenia poprzez VPN.
Na routerze stawiam server z wykorzystaniem klucza prywatnego w trybie TAP/UDP.
Po zainicjowaniu połączenia w statusie servera na routerze obserwuje zmieniające się bajty czytane (TUN/TAP read bytes) natomiast żadnych zapisanych (0bytes). Ogólnie połączenie nie jest nawiązywane.
Gdzie szukać przyczyny???
Chain PREROUTING (policy ACCEPT 6272 packets, 1200K bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 3579 packets, 567K bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 2044 packets, 1913K bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 2044 packets, 1913K bytes)
pkts bytes target prot opt in out source destination
____________________________________________________________
Plik konfiguracji na kliencie:
dev tap
proto udp
comp-lzo
remote xxxx.ddns.net #(tutaj adres przez DDNS z No-ip)
port 1194
resolv-retry infinite
nobind
mute-replay-warnings
secret "sciezka dostepu do pliku klucza prywatnego"
verb 3
float
Przekierowanie portu? Musisz otworzyć port od strony WAN - tomato robi to automatycznie po uruchomieniu serwera openvpn. Wpisy w chain wanin oraz w wanprerouting dotyczące portu 1194 są niepotrzebne.
tak jak khain napisał, usuń to przekierowanie, Gdy w openvpn firewall ustawiony jest na automatyczny to tomato samo sobie ustawi wszystko i otworzy potrzebne porty.
Router:Unifi Cloud Gateway Max Switch:Netgear MS510TXPP Switch:Unifi USW-Flex-Mini - szt. 2 Wi-Fi:Unifi U6-Lite - szt. 2 Proxmox VE:i5-13400T, 64GB RAM, 2x 512GB NVMe, 3x 2TB SSD, Intel X710-DA2 SFP+ VM #1:Synology SA6400 VM #2:Debian, WWW VM #3: Home Assistant OS
Czy po usunięciu przekierowań powinno ruszyć?
Czy coś jeszcze może mieć znaczenie?
pzdr
Połączony z 29 wrzesień 2014 14:57:50:
niestety usuniecie przekierowania portu nie zmieniło sytuacji:
(przekierowanie usunałem z poziomu tomato, pozniej reset routera)
efekt po stronie serwera dokładnie taki sam: leci wszystko oprocz zapisu...
iptables:
Chain INPUT (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- tap21 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1194
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
290 65019 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 shlimit tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp dpt:22 state NEW
0 0 ACCEPT all -- lo * 0.0.0.0/0 0.0.0.0/0
939 76783 ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br1 * 0.0.0.0/0 0.0.0.0/0
Chain FORWARD (policy DROP 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- tap21 * 0.0.0.0/0 0.0.0.0/0
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 account: network/netmask: 192.168.1.0/255.255.255.0 name: lan
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 account: network/netmask: 190.100.100.0/255.255.255.0 name: lan1
0 0 ACCEPT all -- br0 br0 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br1 br1 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 state INVALID
0 0 TCPMSS tcp -- * * 0.0.0.0/0 0.0.0.0/0 tcp flags:0x06/0x02 TCPMSS clamp to PMTU
0 0 ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 state RELATED,ESTABLISHED
0 0 DROP all -- br0 br1 0.0.0.0/0 0.0.0.0/0
0 0 DROP all -- br1 br0 0.0.0.0/0 0.0.0.0/0
0 0 wanin all -- ppp0 * 0.0.0.0/0 0.0.0.0/0
0 0 wanout all -- * ppp0 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br0 * 0.0.0.0/0 0.0.0.0/0
0 0 ACCEPT all -- br1 * 0.0.0.0/0 0.0.0.0/0
Chain OUTPUT (policy ACCEPT 324 packets, 312K bytes)
pkts bytes target prot opt in out source destination
Chain shlimit (1 references)
pkts bytes target prot opt in out source destination
0 0 all -- * * 0.0.0.0/0 0.0.0.0/0 recent: SET name: shlimit side: source
0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 recent: UPDATE seconds: 60 hit_count: 4 name: shlimit side: source
Chain wanin (1 references)
pkts bytes target prot opt in out source destination
Chain wanout (1 references)
pkts bytes target prot opt in out source destination
Chain PREROUTING (policy ACCEPT 882 packets, 127K bytes)
pkts bytes target prot opt in out source destination
0 0 ACCEPT udp -- * * 0.0.0.0/0 0.0.0.0/0 udp dpt:1194
0 0 WANPREROUTING all -- * * 0.0.0.0/0 10.163.60.54
0 0 DROP all -- ppp0 * 0.0.0.0/0 192.168.1.0/24
0 0 DROP all -- ppp0 * 0.0.0.0/0 190.100.100.0/24
Chain POSTROUTING (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
0 0 MASQUERADE all -- * ppp0 0.0.0.0/0 0.0.0.0/0
0 0 SNAT all -- * br0 192.168.1.0/24 192.168.1.0/24 to:192.168.1.1
0 0 SNAT all -- * br1 190.100.100.0/24 190.100.100.0/24 to:190.100.100.1
Chain OUTPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain PREROUTING (policy ACCEPT 2055 packets, 265K bytes)
pkts bytes target prot opt in out source destination
Chain INPUT (policy ACCEPT 1232 packets, 142K bytes)
pkts bytes target prot opt in out source destination
Chain FORWARD (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source destination
Chain OUTPUT (policy ACCEPT 328 packets, 316K bytes)
pkts bytes target prot opt in out source destination
Chain POSTROUTING (policy ACCEPT 328 packets, 316K bytes)
pkts bytes target prot opt in out source destination
Połączony z 29 wrzesień 2014 15:01:13:
po dłuższym czasie oczekiwania mam następujący monit:
Mon Sep 29 14:57:12 2014 NOTE: failed to obtain options consistency info from peer -- this could occur if the remote peer is running a version of OpenVPN before 1.5-beta8 or if there is a network connectivity problem, and will not necessarily prevent OpenVPN from running (0 bytes received from peer, 0 bytes authenticated data channel traffic) -- you can disable the options consistency check with --disable-occ.
przy czym używam aktualnego openvpn (próbowałem wersje 2.3.2-2.3.4);
próbowałem też uruchamiać z opcją --disable occ
Edytowany przez simadren dnia 29-09-2014 15:01
Witam ja rowniez mam problem z polaczeniem z serwerem openvpn.serewer postawiony na tap/udp. klient windows 8.1 laczy sie i po chwili rozlacza.i nawet przez chwile gdy jest polaczenie [swiec na zielono] ping do serwera nie idzie.W status na serwerze pokazuje ze polaczyl .Klient
dev tap
proto udp
remote 91.231.12.168
port 1194
nobind
persist-tun
ca ca.crt c:/Program Files/OpenVPN/config/ca"
cert client2.crt "c:/Program Files/OpenVPN/config/client2"
key client2.key c:/Program Files/OpenVPN/config/client2.key"
comp-lzo
verb 3
mute 20
auth-nocache
log klienta
Mon Oct 06 19:54:06 2014 OpenVPN 2.3.4 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 7 2014
Mon Oct 06 19:54:06 2014 library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
Enter Management Password:
Mon Oct 06 19:54:06 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Mon Oct 06 19:54:06 2014 Need hold release from management interface, waiting...
Mon Oct 06 19:54:06 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'state on'
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'log all on'
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'hold off'
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'hold release'
Mon Oct 06 19:54:07 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:54:07 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:54:07 2014 UDPv4 link local: [undef]
Mon Oct 06 19:54:07 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:54:07 2014 MANAGEMENT: >STATE:1412618047,WAIT,,,
Mon Oct 06 19:54:07 2014 MANAGEMENT: >STATE:1412618047,AUTH,,,
Mon Oct 06 19:54:07 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=052d8a58 aaa876cb
Mon Oct 06 19:54:07 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:54:07 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:54:08 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:54:08 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:54:08 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:54:08 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:54:08 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:54:08 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:54:09 2014 MANAGEMENT: >STATE:1412618049,GET_CONFIG,,,
Mon Oct 06 19:54:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:54:10 2014 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.3.3.1,ping 15,ping-restart 60,ifconfig 10.3.3.48 255.255.255.0'
Mon Oct 06 19:54:10 2014 OPTIONS IMPORT: timers and/or timeouts modified
Mon Oct 06 19:54:10 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Oct 06 19:54:10 2014 OPTIONS IMPORT: route-related options modified
Mon Oct 06 19:54:10 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Oct 06 19:54:10 2014 MANAGEMENT: >STATE:1412618050,ASSIGN_IP,,10.3.3.48,
Mon Oct 06 19:54:10 2014 open_tun, tt->ipv6=0
Mon Oct 06 19:54:10 2014 TAP-WIN32 device [Ethernet] opened: \\.\Global\{878F81CE-56A5-44C8-AE7C-D84AF1F028E1}.tap
Mon Oct 06 19:54:10 2014 TAP-Windows Driver Version 9.21
Mon Oct 06 19:54:10 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.3.48/255.255.255.0 on interface {878F81CE-56A5-44C8-AE7C-D84AF1F028E1} [DHCP-serv: 10.3.3.0, lease-time: 31536000]
Mon Oct 06 19:54:10 2014 Successful ARP Flush on interface [13] {878F81CE-56A5-44C8-AE7C-D84AF1F028E1}
Mon Oct 06 19:54:15 2014 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Mon Oct 06 19:54:15 2014 Initialization Sequence Completed
Mon Oct 06 19:54:15 2014 MANAGEMENT: >STATE:1412618055,CONNECTED,SUCCESS,10.3.3.48,91.231.12.168
Mon Oct 06 19:55:14 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:55:14 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:55:14 2014 MANAGEMENT: >STATE:1412618114,RECONNECTING,ping-restart,,
Mon Oct 06 19:55:14 2014 Restart pause, 2 second(s)
Mon Oct 06 19:55:16 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:55:16 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:55:16 2014 UDPv4 link local: [undef]
Mon Oct 06 19:55:16 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:55:16 2014 MANAGEMENT: >STATE:1412618116,WAIT,,,
Mon Oct 06 19:55:16 2014 MANAGEMENT: >STATE:1412618116,AUTH,,,
Mon Oct 06 19:55:16 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=d4ea221b a6ea25d8
Mon Oct 06 19:55:16 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:55:16 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:55:16 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:55:16 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:55:16 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:55:16 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:55:16 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:55:16 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:55:17 2014 MANAGEMENT: >STATE:1412618117,GET_CONFIG,,,
Mon Oct 06 19:55:18 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:23 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:29 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:34 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:39 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:44 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:49 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:54 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:59 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:04 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:09 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:14 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:17 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:56:17 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:56:17 2014 MANAGEMENT: >STATE:1412618177,RECONNECTING,ping-restart,,
Mon Oct 06 19:56:17 2014 Restart pause, 2 second(s)
Mon Oct 06 19:56:19 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:56:19 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:56:19 2014 UDPv4 link local: [undef]
Mon Oct 06 19:56:19 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:56:19 2014 MANAGEMENT: >STATE:1412618179,WAIT,,,
Mon Oct 06 19:56:19 2014 MANAGEMENT: >STATE:1412618179,AUTH,,,
Mon Oct 06 19:56:19 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=0724603a 8529374d
Mon Oct 06 19:56:19 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:56:19 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:56:19 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:56:19 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:56:19 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:56:19 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:56:19 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:56:19 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:56:20 2014 MANAGEMENT: >STATE:1412618180,GET_CONFIG,,,
Mon Oct 06 19:56:21 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:26 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:31 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:36 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:42 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:47 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:52 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:57 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:03 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:08 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:13 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:18 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
urzadzenia na androidzie sie lacza i jest ok.Firewall w windows wylaczony.
log z androida ktory sie laczy i jest ok
Sun Apr 13 03:33:27 2014 OpenVPN 2.1.1 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] built on Jan 7 2012
Sun Apr 13 03:33:27 2014 MANAGEMENT: TCP Socket listening on 127.0.0.1:29266
Sun Apr 13 03:33:27 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sun Apr 13 03:33:27 2014 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Apr 13 03:33:27 2014 WARNING: file '/sdcard/certyfikat/client1.key' is group or others accessible
Sun Apr 13 03:33:27 2014 LZO compression initialized
Sun Apr 13 03:33:27 2014 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
Sun Apr 13 03:33:27 2014 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
Sun Apr 13 03:33:27 2014 Local Options hash (VER=V4): 'd79ca330'
Sun Apr 13 03:33:27 2014 Expected Remote Options hash (VER=V4): 'f7df56b8'
Sun Apr 13 03:33:27 2014 Socket Buffers: R=[110592->131072] S=[110592->131072]
Sun Apr 13 03:33:27 2014 UDPv4 link local: [undef]
Sun Apr 13 03:33:27 2014 UDPv4 link remote: 91.231.12.168:1194
Sun Apr 13 03:33:27 2014 MANAGEMENT: Client connected from 127.0.0.1:29266
Sun Apr 13 03:33:27 2014 MANAGEMENT: CMD 'state'
Sun Apr 13 03:33:27 2014 MANAGEMENT: CMD 'state on'
Sun Apr 13 03:33:27 2014 MANAGEMENT: CMD 'bytecount 0'
Sun Apr 13 03:33:27 2014 MANAGEMENT: >STATE:1397352807,AUTH,,,
Sun Apr 13 03:33:27 2014 TLS: Initial packet from 91.231.12.168:1194, sid=526a911c f2b72b15
Sun Apr 13 03:33:27 2014 MANAGEMENT: CMD 'bytecount 0'
Sun Apr 13 03:33:27 2014 VERIFY OK: depth=1, /C=PL/ST=LU/L=KRASNIK/O=RAKO/OU=changeme/CN=RAKO/name=RAKO/emailAddress=Andrzejrak1@wp.pl
Sun Apr 13 03:33:27 2014 VERIFY OK: depth=0, /C=PL/ST=LU/L=KRASNIK/O=RAKO/OU=changeme/CN=SERWER/name=SERWER/emailAddress=Andrzejrak1@wp.pl
Sun Apr 13 03:33:29 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Apr 13 03:33:29 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Apr 13 03:33:29 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sun Apr 13 03:33:29 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Apr 13 03:33:29 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sun Apr 13 03:33:29 2014 [SERWER] Peer Connection Initiated with 91.231.12.168:1194
Sun Apr 13 03:33:30 2014 MANAGEMENT: >STATE:1397352810,GET_CONFIG,,,
Sun Apr 13 03:33:30 2014 MANAGEMENT: CMD 'bytecount 0'
Sun Apr 13 03:33:31 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Sun Apr 13 03:33:31 2014 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.3.3.1,ping 15,ping-restart 60,ifconfig 10.3.3.47 255.255.255.0'
Sun Apr 13 03:33:31 2014 OPTIONS IMPORT: timers and/or timeouts modified
Sun Apr 13 03:33:31 2014 OPTIONS IMPORT: --ifconfig/up options modified
Sun Apr 13 03:33:31 2014 OPTIONS IMPORT: route-related options modified
Sun Apr 13 03:33:31 2014 TUN/TAP device tap0 opened
Sun Apr 13 03:33:31 2014 TUN/TAP TX queue length set to 100
Sun Apr 13 03:33:31 2014 MANAGEMENT: >STATE:1397352811,ASSIGN_IP,,10.3.3.47,
Sun Apr 13 03:33:31 2014 /system/xbin/busybox ifconfig tap0 10.3.3.47 netmask 255.255.255.0 mtu 1500 broadcast 10.3.3.255
Sun Apr 13 03:33:31 2014 Initialization Sequence Completed
Sun Apr 13 03:33:31 2014 MANAGEMENT: >STATE:1397352811,CONNECTED,SUCCESS,10.3.3.47,91.231.12.168
Sun Apr 13 03:33:31 2014 MANAGEMENT: CMD 'bytecount 0'
Sun Apr 13 03:33:31 2014 MANAGEMENT: CMD 'bytecount 3'
Sun Apr 13 03:33:37 2014 MANAGEMENT: CMD 'signal SIGTERM'
Sun Apr 13 03:33:37 2014 TCP/UDP: Closing socket
Sun Apr 13 03:33:37 2014 Closing TUN/TAP interface
Sun Apr 13 03:33:37 2014 /system/xbin/busybox tap0 0.0.0.0
Sun Apr 13 03:33:37 2014 Linux ip addr del failed: external program exited with error status: 1
Sun Apr 13 03:33:37 2014 SIGTERM[hard,] received, process exiting
Sun Apr 13 03:33:37 2014 MANAGEMENT: >STATE:1397352817,EXITING,SIGTERM,,
Połączony z 06 październik 2014 23:36:13:
Mon Oct 06 19:54:06 2014 OpenVPN 2.3.4 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 7 2014
Mon Oct 06 19:54:06 2014 library versions: OpenSSL 1.0.1i 6 Aug 2014, LZO 2.05
Enter Management Password:
Mon Oct 06 19:54:06 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Mon Oct 06 19:54:06 2014 Need hold release from management interface, waiting...
Mon Oct 06 19:54:06 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'state on'
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'log all on'
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'hold off'
Mon Oct 06 19:54:07 2014 MANAGEMENT: CMD 'hold release'
Mon Oct 06 19:54:07 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:54:07 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:54:07 2014 UDPv4 link local: [undef]
Mon Oct 06 19:54:07 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:54:07 2014 MANAGEMENT: >STATE:1412618047,WAIT,,,
Mon Oct 06 19:54:07 2014 MANAGEMENT: >STATE:1412618047,AUTH,,,
Mon Oct 06 19:54:07 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=052d8a58 aaa876cb
Mon Oct 06 19:54:07 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:54:07 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:54:08 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:54:08 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:54:08 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:54:08 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:54:08 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:54:08 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:54:09 2014 MANAGEMENT: >STATE:1412618049,GET_CONFIG,,,
Mon Oct 06 19:54:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:54:10 2014 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.3.3.1,ping 15,ping-restart 60,ifconfig 10.3.3.48 255.255.255.0'
Mon Oct 06 19:54:10 2014 OPTIONS IMPORT: timers and/or timeouts modified
Mon Oct 06 19:54:10 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Oct 06 19:54:10 2014 OPTIONS IMPORT: route-related options modified
Mon Oct 06 19:54:10 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Oct 06 19:54:10 2014 MANAGEMENT: >STATE:1412618050,ASSIGN_IP,,10.3.3.48,
Mon Oct 06 19:54:10 2014 open_tun, tt->ipv6=0
Mon Oct 06 19:54:10 2014 TAP-WIN32 device [Ethernet] opened: \\.\Global\{878F81CE-56A5-44C8-AE7C-D84AF1F028E1}.tap
Mon Oct 06 19:54:10 2014 TAP-Windows Driver Version 9.21
Mon Oct 06 19:54:10 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.3.3.48/255.255.255.0 on interface {878F81CE-56A5-44C8-AE7C-D84AF1F028E1} [DHCP-serv: 10.3.3.0, lease-time: 31536000]
Mon Oct 06 19:54:10 2014 Successful ARP Flush on interface [13] {878F81CE-56A5-44C8-AE7C-D84AF1F028E1}
Mon Oct 06 19:54:15 2014 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Mon Oct 06 19:54:15 2014 Initialization Sequence Completed
Mon Oct 06 19:54:15 2014 MANAGEMENT: >STATE:1412618055,CONNECTED,SUCCESS,10.3.3.48,91.231.12.168
Mon Oct 06 19:55:14 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:55:14 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:55:14 2014 MANAGEMENT: >STATE:1412618114,RECONNECTING,ping-restart,,
Mon Oct 06 19:55:14 2014 Restart pause, 2 second(s)
Mon Oct 06 19:55:16 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:55:16 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:55:16 2014 UDPv4 link local: [undef]
Mon Oct 06 19:55:16 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:55:16 2014 MANAGEMENT: >STATE:1412618116,WAIT,,,
Mon Oct 06 19:55:16 2014 MANAGEMENT: >STATE:1412618116,AUTH,,,
Mon Oct 06 19:55:16 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=d4ea221b a6ea25d8
Mon Oct 06 19:55:16 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:55:16 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:55:16 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:55:16 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:55:16 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:55:16 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:55:16 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:55:16 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:55:17 2014 MANAGEMENT: >STATE:1412618117,GET_CONFIG,,,
Mon Oct 06 19:55:18 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:23 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:29 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:34 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:39 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:44 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:49 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:54 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:55:59 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:04 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:09 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:14 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:17 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:56:17 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:56:17 2014 MANAGEMENT: >STATE:1412618177,RECONNECTING,ping-restart,,
Mon Oct 06 19:56:17 2014 Restart pause, 2 second(s)
Mon Oct 06 19:56:19 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:56:19 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:56:19 2014 UDPv4 link local: [undef]
Mon Oct 06 19:56:19 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:56:19 2014 MANAGEMENT: >STATE:1412618179,WAIT,,,
Mon Oct 06 19:56:19 2014 MANAGEMENT: >STATE:1412618179,AUTH,,,
Mon Oct 06 19:56:19 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=0724603a 8529374d
Mon Oct 06 19:56:19 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:56:19 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:56:19 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:56:19 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:56:19 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:56:19 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:56:19 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:56:19 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:56:20 2014 MANAGEMENT: >STATE:1412618180,GET_CONFIG,,,
Mon Oct 06 19:56:21 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:26 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:31 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:36 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:42 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:47 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:52 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:56:57 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:03 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:08 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:13 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:18 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:20 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:57:20 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:57:20 2014 MANAGEMENT: >STATE:1412618240,RECONNECTING,ping-restart,,
Mon Oct 06 19:57:20 2014 Restart pause, 2 second(s)
Mon Oct 06 19:57:22 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:57:22 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:57:22 2014 UDPv4 link local: [undef]
Mon Oct 06 19:57:22 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:57:22 2014 MANAGEMENT: >STATE:1412618242,WAIT,,,
Mon Oct 06 19:57:22 2014 MANAGEMENT: >STATE:1412618242,AUTH,,,
Mon Oct 06 19:57:22 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=151a9022 0d2abf18
Mon Oct 06 19:57:22 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:57:22 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:57:22 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:57:22 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:57:22 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:57:22 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:57:22 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:57:22 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:57:23 2014 MANAGEMENT: >STATE:1412618243,GET_CONFIG,,,
Mon Oct 06 19:57:24 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:30 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:35 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:40 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:45 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:50 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:57:55 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:00 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:05 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:16 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:21 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:23 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:58:23 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:58:23 2014 MANAGEMENT: >STATE:1412618303,RECONNECTING,ping-restart,,
Mon Oct 06 19:58:23 2014 Restart pause, 2 second(s)
Mon Oct 06 19:58:25 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:58:25 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:58:25 2014 UDPv4 link local: [undef]
Mon Oct 06 19:58:25 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:58:25 2014 MANAGEMENT: >STATE:1412618305,WAIT,,,
Mon Oct 06 19:58:25 2014 MANAGEMENT: >STATE:1412618305,AUTH,,,
Mon Oct 06 19:58:25 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=694f8f7c 4abe60d0
Mon Oct 06 19:58:25 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:58:25 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:58:26 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:58:26 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:58:26 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:58:26 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:58:26 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:58:26 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:58:27 2014 MANAGEMENT: >STATE:1412618307,GET_CONFIG,,,
Mon Oct 06 19:58:28 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:33 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:38 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:43 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:48 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:53 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:58:58 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:03 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:09 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:14 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:19 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:24 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:28 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 19:59:28 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 19:59:28 2014 MANAGEMENT: >STATE:1412618368,RECONNECTING,ping-restart,,
Mon Oct 06 19:59:28 2014 Restart pause, 2 second(s)
Mon Oct 06 19:59:30 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 19:59:30 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 19:59:30 2014 UDPv4 link local: [undef]
Mon Oct 06 19:59:30 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 19:59:30 2014 MANAGEMENT: >STATE:1412618370,WAIT,,,
Mon Oct 06 19:59:30 2014 MANAGEMENT: >STATE:1412618370,AUTH,,,
Mon Oct 06 19:59:30 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=99c9bdaa 9a0b92e7
Mon Oct 06 19:59:31 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:59:31 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 19:59:31 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:59:31 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:59:31 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 19:59:31 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 19:59:31 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 19:59:31 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 19:59:32 2014 MANAGEMENT: >STATE:1412618372,GET_CONFIG,,,
Mon Oct 06 19:59:33 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:38 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:43 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:48 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:53 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 19:59:58 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:03 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:08 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:14 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:19 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:24 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:29 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:33 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:00:33 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:00:33 2014 MANAGEMENT: >STATE:1412618433,RECONNECTING,ping-restart,,
Mon Oct 06 20:00:33 2014 Restart pause, 2 second(s)
Mon Oct 06 20:00:35 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:00:35 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:00:35 2014 UDPv4 link local: [undef]
Mon Oct 06 20:00:35 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:00:35 2014 MANAGEMENT: >STATE:1412618435,WAIT,,,
Mon Oct 06 20:00:36 2014 MANAGEMENT: >STATE:1412618436,AUTH,,,
Mon Oct 06 20:00:36 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=923741a2 26ccdf67
Mon Oct 06 20:00:36 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:00:36 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:00:36 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:00:36 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:00:36 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:00:36 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:00:36 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:00:36 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:00:37 2014 MANAGEMENT: >STATE:1412618437,GET_CONFIG,,,
Mon Oct 06 20:00:38 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:43 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:48 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:53 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:00:58 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:03 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:08 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:13 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:18 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:23 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:28 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:33 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:38 2014 No reply from server after sending 12 push requests
Mon Oct 06 20:01:38 2014 SIGUSR1[soft,no-push-reply] received, process restarting
Mon Oct 06 20:01:38 2014 MANAGEMENT: >STATE:1412618498,RECONNECTING,no-push-reply,,
Mon Oct 06 20:01:38 2014 Restart pause, 2 second(s)
Mon Oct 06 20:01:40 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:01:40 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:01:40 2014 UDPv4 link local: [undef]
Mon Oct 06 20:01:40 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:01:40 2014 MANAGEMENT: >STATE:1412618500,WAIT,,,
Mon Oct 06 20:01:40 2014 MANAGEMENT: >STATE:1412618500,AUTH,,,
Mon Oct 06 20:01:40 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=7ca7fbbd 81ada11b
Mon Oct 06 20:01:40 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:01:40 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:01:40 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:01:40 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:01:40 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:01:40 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:01:40 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:01:40 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:01:41 2014 MANAGEMENT: >STATE:1412618501,GET_CONFIG,,,
Mon Oct 06 20:01:42 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:47 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:52 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:01:57 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:02 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:07 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:12 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:17 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:22 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:27 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:32 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:37 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:41 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:02:41 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:02:41 2014 MANAGEMENT: >STATE:1412618561,RECONNECTING,ping-restart,,
Mon Oct 06 20:02:41 2014 Restart pause, 2 second(s)
Mon Oct 06 20:02:43 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:02:43 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:02:43 2014 UDPv4 link local: [undef]
Mon Oct 06 20:02:43 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:02:43 2014 MANAGEMENT: >STATE:1412618563,WAIT,,,
Mon Oct 06 20:02:43 2014 MANAGEMENT: >STATE:1412618563,AUTH,,,
Mon Oct 06 20:02:43 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=197ed64f 2e9e82f1
Mon Oct 06 20:02:43 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:02:43 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:02:43 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:02:43 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:02:43 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:02:43 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:02:43 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:02:43 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:02:44 2014 MANAGEMENT: >STATE:1412618564,GET_CONFIG,,,
Mon Oct 06 20:02:45 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:50 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:02:55 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:00 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:05 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:15 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:20 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:25 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:30 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:35 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:40 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:43 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:03:43 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:03:43 2014 MANAGEMENT: >STATE:1412618623,RECONNECTING,ping-restart,,
Mon Oct 06 20:03:43 2014 Restart pause, 2 second(s)
Mon Oct 06 20:03:45 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:03:45 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:03:45 2014 UDPv4 link local: [undef]
Mon Oct 06 20:03:45 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:03:45 2014 MANAGEMENT: >STATE:1412618625,WAIT,,,
Mon Oct 06 20:03:45 2014 MANAGEMENT: >STATE:1412618625,AUTH,,,
Mon Oct 06 20:03:45 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=8d5c3017 5f55df01
Mon Oct 06 20:03:46 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:03:46 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:03:46 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:03:46 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:03:46 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:03:46 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:03:46 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:03:46 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:03:47 2014 MANAGEMENT: >STATE:1412618627,GET_CONFIG,,,
Mon Oct 06 20:03:49 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:54 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:03:59 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:04 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:09 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:14 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:19 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:24 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:30 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:35 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:40 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:45 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:46 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:04:46 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:04:46 2014 MANAGEMENT: >STATE:1412618686,RECONNECTING,ping-restart,,
Mon Oct 06 20:04:46 2014 Restart pause, 2 second(s)
Mon Oct 06 20:04:48 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:04:48 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:04:48 2014 UDPv4 link local: [undef]
Mon Oct 06 20:04:48 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:04:48 2014 MANAGEMENT: >STATE:1412618688,WAIT,,,
Mon Oct 06 20:04:48 2014 MANAGEMENT: >STATE:1412618688,AUTH,,,
Mon Oct 06 20:04:48 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=f32c7144 1d57f1a8
Mon Oct 06 20:04:48 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:04:48 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:04:48 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:04:48 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:04:48 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:04:48 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:04:48 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:04:48 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:04:49 2014 MANAGEMENT: >STATE:1412618689,GET_CONFIG,,,
Mon Oct 06 20:04:50 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:04:55 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:00 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:05 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:15 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:20 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:25 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:30 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:35 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:40 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:45 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:05:50 2014 No reply from server after sending 12 push requests
Mon Oct 06 20:05:50 2014 SIGUSR1[soft,no-push-reply] received, process restarting
Mon Oct 06 20:05:50 2014 MANAGEMENT: >STATE:1412618750,RECONNECTING,no-push-reply,,
Mon Oct 06 20:05:50 2014 Restart pause, 2 second(s)
Mon Oct 06 20:05:52 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:05:52 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:05:52 2014 UDPv4 link local: [undef]
Mon Oct 06 20:05:52 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:05:52 2014 MANAGEMENT: >STATE:1412618752,WAIT,,,
Mon Oct 06 20:05:52 2014 MANAGEMENT: >STATE:1412618752,AUTH,,,
Mon Oct 06 20:05:52 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=71b8c2e4 677e2703
Mon Oct 06 20:05:52 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:05:52 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:05:52 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:05:52 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:05:52 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:05:52 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:05:52 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:05:52 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:05:53 2014 MANAGEMENT: >STATE:1412618753,GET_CONFIG,,,
Mon Oct 06 20:05:54 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:00 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:05 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:16 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:21 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:26 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:31 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:36 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:42 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:47 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:52 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:06:54 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:06:54 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:06:54 2014 MANAGEMENT: >STATE:1412618814,RECONNECTING,ping-restart,,
Mon Oct 06 20:06:54 2014 Restart pause, 2 second(s)
Mon Oct 06 20:06:56 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:06:56 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:06:56 2014 UDPv4 link local: [undef]
Mon Oct 06 20:06:56 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:06:56 2014 MANAGEMENT: >STATE:1412618816,WAIT,,,
Mon Oct 06 20:06:56 2014 MANAGEMENT: >STATE:1412618816,AUTH,,,
Mon Oct 06 20:06:56 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=ac1fbabf ffcb7902
Mon Oct 06 20:06:56 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:06:56 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:06:57 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:06:57 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:06:57 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:06:57 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:06:57 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:06:57 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:06:58 2014 MANAGEMENT: >STATE:1412618818,GET_CONFIG,,,
Mon Oct 06 20:06:59 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:05 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:10 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:15 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:20 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:25 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:30 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:35 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:40 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:46 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:51 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:56 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:07:57 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:07:57 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:07:57 2014 MANAGEMENT: >STATE:1412618877,RECONNECTING,ping-restart,,
Mon Oct 06 20:07:57 2014 Restart pause, 2 second(s)
Mon Oct 06 20:07:59 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:07:59 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:07:59 2014 UDPv4 link local: [undef]
Mon Oct 06 20:07:59 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:07:59 2014 MANAGEMENT: >STATE:1412618879,WAIT,,,
Mon Oct 06 20:07:59 2014 MANAGEMENT: >STATE:1412618879,AUTH,,,
Mon Oct 06 20:07:59 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=c3bb27d0 3aa14a06
Mon Oct 06 20:07:59 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:07:59 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:07:59 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:07:59 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:07:59 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:07:59 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:07:59 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:07:59 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:08:00 2014 MANAGEMENT: >STATE:1412618880,GET_CONFIG,,,
Mon Oct 06 20:08:01 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:06 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:11 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:16 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:21 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:26 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:31 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:36 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:42 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:48 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:53 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:08:58 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:00 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:09:00 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:09:00 2014 MANAGEMENT: >STATE:1412618940,RECONNECTING,ping-restart,,
Mon Oct 06 20:09:00 2014 Restart pause, 2 second(s)
Mon Oct 06 20:09:02 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:09:02 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:09:02 2014 UDPv4 link local: [undef]
Mon Oct 06 20:09:02 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:09:02 2014 MANAGEMENT: >STATE:1412618942,WAIT,,,
Mon Oct 06 20:09:02 2014 MANAGEMENT: >STATE:1412618942,AUTH,,,
Mon Oct 06 20:09:02 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=bbe3d9bb 4115239d
Mon Oct 06 20:09:02 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:09:02 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:09:02 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:09:02 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:09:02 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:09:02 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:09:02 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:09:02 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:09:03 2014 MANAGEMENT: >STATE:1412618943,GET_CONFIG,,,
Mon Oct 06 20:09:04 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:09 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:14 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:19 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:24 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:29 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:34 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:40 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:45 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:50 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:09:55 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:00 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:03 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:10:03 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:10:03 2014 MANAGEMENT: >STATE:1412619003,RECONNECTING,ping-restart,,
Mon Oct 06 20:10:03 2014 Restart pause, 2 second(s)
Mon Oct 06 20:10:06 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:10:06 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:10:06 2014 UDPv4 link local: [undef]
Mon Oct 06 20:10:06 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:10:06 2014 MANAGEMENT: >STATE:1412619006,WAIT,,,
Mon Oct 06 20:10:06 2014 MANAGEMENT: >STATE:1412619006,AUTH,,,
Mon Oct 06 20:10:06 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=fa8a2ff2 5e97a50b
Mon Oct 06 20:10:06 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:10:06 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:10:06 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:10:06 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:10:06 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:10:06 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:10:06 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:10:06 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:10:07 2014 MANAGEMENT: >STATE:1412619007,GET_CONFIG,,,
Mon Oct 06 20:10:08 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:13 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:18 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:23 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:28 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:33 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:38 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:43 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:48 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:54 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:10:59 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:04 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:06 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:11:06 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:11:06 2014 MANAGEMENT: >STATE:1412619066,RECONNECTING,ping-restart,,
Mon Oct 06 20:11:06 2014 Restart pause, 2 second(s)
Mon Oct 06 20:11:08 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:11:08 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:11:08 2014 UDPv4 link local: [undef]
Mon Oct 06 20:11:08 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:11:08 2014 MANAGEMENT: >STATE:1412619068,WAIT,,,
Mon Oct 06 20:11:08 2014 MANAGEMENT: >STATE:1412619068,AUTH,,,
Mon Oct 06 20:11:08 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=04473b15 993296bf
Mon Oct 06 20:11:08 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:11:08 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:11:09 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:11:09 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:11:09 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Oct 06 20:11:09 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Oct 06 20:11:09 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Mon Oct 06 20:11:09 2014 [SERWER] Peer Connection Initiated with [AF_INET]91.231.12.168:1194
Mon Oct 06 20:11:10 2014 MANAGEMENT: >STATE:1412619070,GET_CONFIG,,,
Mon Oct 06 20:11:12 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:17 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:23 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:28 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:33 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:38 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:43 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:48 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:53 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:11:59 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:12:04 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:12:09 2014 SENT CONTROL [SERWER]: 'PUSH_REQUEST' (status=1)
Mon Oct 06 20:12:09 2014 [SERWER] Inactivity timeout (--ping-restart), restarting
Mon Oct 06 20:12:09 2014 SIGUSR1[soft,ping-restart] received, process restarting
Mon Oct 06 20:12:09 2014 MANAGEMENT: >STATE:1412619129,RECONNECTING,ping-restart,,
Mon Oct 06 20:12:09 2014 Restart pause, 2 second(s)
Mon Oct 06 20:12:11 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Mon Oct 06 20:12:11 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]
Mon Oct 06 20:12:11 2014 UDPv4 link local: [undef]
Mon Oct 06 20:12:11 2014 UDPv4 link remote: [AF_INET]91.231.12.168:1194
Mon Oct 06 20:12:11 2014 MANAGEMENT: >STATE:1412619131,WAIT,,,
Mon Oct 06 20:12:11 2014 MANAGEMENT: >STATE:1412619131,AUTH,,,
Mon Oct 06 20:12:11 2014 TLS: Initial packet from [AF_INET]91.231.12.168:1194, sid=adbe2df4 cfebdb8e
Mon Oct 06 20:12:11 2014 VERIFY OK: depth=1, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=RAKO, name=RAKO, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:12:11 2014 VERIFY OK: depth=0, C=PL, ST=LU, L=KRASNIK, O=RAKO, OU=changeme, CN=SERWER, name=SERWER, emailAddress=Andrzejrak1@wp.pl
Mon Oct 06 20:12:12 2014 Data Channel Encrypt: Cipher 'BF-CB
Edytowany przez rako28 dnia 06-10-2014 23:36
· Łącznie użytkowników: 24,115 · Najnowszy użytkownik: Ja
Czat
Musisz się zalogować, aby opublikować wiadomość.
Maniek91PL
06-11-2024 22:37
dzięki !
maxikaaz
29-10-2024 14:27
@Maniek91PL - Administration=> Admin Access, i tam masz "Allow Wireless Access" do zaznaczenia
Maniek91PL
26-10-2024 22:07
siemka! ktoś przypomni co się ustawiało jeśli nie mogę wejść od strony wifi do tomato? od lan działa
overflow2
04-10-2024 17:34
Kupowałem Asusy n10u albo n12d1 ale nie widzę ich, chyba już nie produkują, Chodzi o coś nowego i taniego. Transfery niewielkie.
maxikaaz
04-10-2024 09:38
@overflow2 patrząc po dostępności funkcji w nowych kompilacjach, to chyba nawet WRT54G/GL jeszcze ma OpenVPN, albo jakiś odpowiednik... zależy, na jakie transfery liczysz.
overflow2
30-09-2024 20:53
Jaki aktualnie najtańszy router do tomato do openvpn?
maxikaaz
27-07-2024 15:07
@servee - na początek router do rozebrania i obejrzenia, ciężko wróżyć tak tylko po objawach
maxikaaz
27-07-2024 14:55
@servee - cały kontroler nie pada tak sobie z powodu "zbiegu okoliczności", więc prawdopodobnie gdzieś przepięcie.
servee
25-07-2024 13:33
@maxikaaz: działało, aż pewnego pięknego dnia przestało działać. W tym dniu była też burza, ale to raczej zbieg okoliczności.
maxikaaz
25-07-2024 11:38
@servee - o ile problem jest w obrębie samych wyjść (dławiki, warystory), to naprawialne, ale jeśli w samym SoC - to nienaprawialne ze względu na koszta. A co było przyczyną?