Tons of error messages and reconnects
-
Hey guys getting very unstable connections on my road warrior connection.. could someone have a look and tell me what they think? here is a little snippet, i blanked out my ip.. Any help would be appreciated.
2023-07-28 17:40:29 official build 0.7.43 running on samsung SM-S911W (kalama), Android 13 (TP1A.220624.014) API 33, ABI arm64-v8a, (samsung/dm1qcsx/dm1q:13/TP1A.220624.014/S911WVLS1AWFD:user/release-keys)
2023-07-28 17:40:29 Log cleared.
2023-07-28 17:44:18 read TCPv4_CLIENT []: Software caused connection abort (fd=4,code=103)
2023-07-28 17:44:18 Waiting 2s seconds between connection attempt
2023-07-28 17:44:18 write TCPv4_CLIENT []: Broken pipe (fd=4,code=32)
2023-07-28 17:44:18 Connection reset, restarting [0]
2023-07-28 17:44:18 TCP/UDP: Closing socket
2023-07-28 17:44:18 SIGUSR1[soft,connection-reset] received, process restarting
2023-07-28 17:44:18 MANAGEMENT: >STATE:1690591458,RECONNECTING,connection-reset,,,,,
2023-07-28 17:44:20 MANAGEMENT: CMD 'hold release'
2023-07-28 17:44:20 MANAGEMENT: CMD 'bytecount 2'
2023-07-28 17:44:20 MANAGEMENT: CMD 'state on'
2023-07-28 17:44:20 MANAGEMENT: CMD 'proxy NONE'
2023-07-28 17:44:21 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 17:44:21 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 17:44:21 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-07-28 17:44:21 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 17:44:21 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2023-07-28 17:44:21 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2023-07-28 17:44:21 TCP/UDP: Preserving recently used remote address: [AF_INET]*****************
2023-07-28 17:44:21 Socket Buffers: R=[4194304->4194304] S=[524288->524288]
2023-07-28 17:44:21 Attempting to establish TCP connection with [AF_INET]*****************
2023-07-28 17:44:21 MANAGEMENT: >STATE:1690591461,TCP_CONNECT,,,,,,
2023-07-28 17:44:21 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 17:44:21 TCP connection established with [AF_INET]*****************
2023-07-28 17:44:21 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 17:44:21 TCPv4_CLIENT link local: (not bound)
2023-07-28 17:44:21 TCPv4_CLIENT link remote: [AF_INET]*****************
2023-07-28 17:44:21 MANAGEMENT: >STATE:1690591461,WAIT,,,,,,
2023-07-28 17:44:21 MANAGEMENT: >STATE:1690591461,AUTH,,,,,,
2023-07-28 17:44:21 TLS: Initial packet from [AF_INET], sid=d8e65a53 f114f50d
2023-07-28 17:44:21 VERIFY OK: depth=1, CN=internal-ca, C=CA, ST=BC, L=Coquitlam
2023-07-28 17:44:21 VERIFY KU OK
2023-07-28 17:44:21 Validating certificate extended key usage
2023-07-28 17:44:21 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-07-28 17:44:21 VERIFY EKU OK
2023-07-28 17:44:21 VERIFY X509NAME OK: CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 17:44:21 VERIFY OK: depth=0, CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 17:44:21 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1539', remote='link-mtu 1536'
2023-07-28 17:44:21 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-07-28 17:44:21 [roadwarrior_cert] Peer Connection Initiated with [AF_INET]
2023-07-28 17:44:22 MANAGEMENT: >STATE:1690591462,GET_CONFIG,,,,,,
2023-07-28 17:44:22 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 17:44:27 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 17:44:27 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.10.1,redirect-gateway def1,route-gateway 192.168.80.1,topology subnet,ping 10,ping-restart 600,ifconfig 192.168.80.3 255.255.255.0,peer-id 1,cipher CHACHA20-POLY1305,protocol-flags cc-exit,tun-mtu 1500'
2023-07-28 17:44:27 OPTIONS IMPORT: timers and/or timeouts modified
2023-07-28 17:44:27 OPTIONS IMPORT: --ifconfig/up options modified
2023-07-28 17:44:27 OPTIONS IMPORT: route options modified
2023-07-28 17:44:27 OPTIONS IMPORT: route-related options modified
2023-07-28 17:44:27 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-07-28 17:44:27 OPTIONS IMPORT: peer-id set
2023-07-28 17:44:27 OPTIONS IMPORT: data channel crypto options modified
2023-07-28 17:44:27 OPTIONS IMPORT: tun-mtu set to 1500
2023-07-28 17:44:27 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-07-28 17:44:27 do_ifconfig, ipv4=1, ipv6=0
2023-07-28 17:44:27 MANAGEMENT: >STATE:1690591467,ASSIGN_IP,,192.168.80.3,,,,
2023-07-28 17:44:27 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-07-28 17:44:27 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-07-28 17:44:27 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-07-28 17:44:27 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'
2023-07-28 17:44:27 Data Channel MTU parms [ mss_fix:1386 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 17:44:27 Outgoing Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 17:44:27 Incoming Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 17:44:27 Initialization Sequence Completed
2023-07-28 17:44:27 MANAGEMENT: >STATE:1690591467,CONNECTED,SUCCESS,192.168.80.3,,10.193.221.93,40252
2023-07-28 17:55:54 read TCPv4_CLIENT []: Software caused connection abort (fd=4,code=103)
2023-07-28 17:55:54 write TCPv4_CLIENT []: Broken pipe (fd=4,code=32)
2023-07-28 17:55:54 Connection reset, restarting [0]
2023-07-28 17:55:54 TCP/UDP: Closing socket
2023-07-28 17:55:54 SIGUSR1[soft,connection-reset] received, process restarting
2023-07-28 17:55:54 MANAGEMENT: >STATE:1690592154,RECONNECTING,connection-reset,,,,,
2023-07-28 17:55:54 Waiting 2s seconds between connection attempt
2023-07-28 17:55:56 MANAGEMENT: CMD 'hold release'
2023-07-28 17:55:56 MANAGEMENT: CMD 'bytecount 2'
2023-07-28 17:55:56 MANAGEMENT: CMD 'state on'
2023-07-28 17:55:56 MANAGEMENT: CMD 'proxy NONE'
2023-07-28 17:55:57 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 17:55:57 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 17:55:57 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-07-28 17:55:57 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 17:55:57 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2023-07-28 17:55:57 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2023-07-28 17:55:57 TCP/UDP: Preserving recently used remote address: [AF_INET]
2023-07-28 17:55:57 Socket Buffers: R=[4194304->4194304] S=[1048576->1048576]
2023-07-28 17:55:57 Attempting to establish TCP connection with [AF_INET]*****************
2023-07-28 17:55:57 MANAGEMENT: >STATE:1690592157,TCP_CONNECT,,,,,,
2023-07-28 17:55:57 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 17:55:57 TCP connection established with [AF_INET]*****************
2023-07-28 17:55:57 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 17:55:57 TCPv4_CLIENT link local: (not bound)
2023-07-28 17:55:57 TCPv4_CLIENT link remote: [AF_INET]*****************
2023-07-28 17:55:57 MANAGEMENT: >STATE:1690592157,WAIT,,,,,,
2023-07-28 17:55:57 MANAGEMENT: >STATE:1690592157,AUTH,,,,,,
2023-07-28 17:55:57 TLS: Initial packet from [AF_INET], sid=f20aa312 752fafc2
2023-07-28 17:55:57 VERIFY OK: depth=1, CN=internal-ca, C=CA, ST=BC, L=Coquitlam
2023-07-28 17:55:57 VERIFY KU OK
2023-07-28 17:55:57 Validating certificate extended key usage
2023-07-28 17:55:58 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-07-28 17:55:58 VERIFY EKU OK
2023-07-28 17:55:58 VERIFY X509NAME OK: CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 17:55:58 VERIFY OK: depth=0, CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 17:55:58 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1539', remote='link-mtu 1536'
2023-07-28 17:55:58 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-07-28 17:55:58 [roadwarrior_cert] Peer Connection Initiated with [AF_INET]
2023-07-28 17:55:58 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.10.1,redirect-gateway def1,route-gateway 192.168.80.1,topology subnet,ping 10,ping-restart 600,ifconfig 192.168.80.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit,tun-mtu 1500'
2023-07-28 17:55:58 OPTIONS IMPORT: timers and/or timeouts modified
2023-07-28 17:55:58 OPTIONS IMPORT: --ifconfig/up options modified
2023-07-28 17:55:58 OPTIONS IMPORT: route options modified
2023-07-28 17:55:58 OPTIONS IMPORT: route-related options modified
2023-07-28 17:55:58 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-07-28 17:55:58 OPTIONS IMPORT: peer-id set
2023-07-28 17:55:58 OPTIONS IMPORT: data channel crypto options modified
2023-07-28 17:55:58 OPTIONS IMPORT: tun-mtu set to 1500
2023-07-28 17:55:58 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-07-28 17:55:58 do_ifconfig, ipv4=1, ipv6=0
2023-07-28 17:55:58 MANAGEMENT: >STATE:1690592158,ASSIGN_IP,,192.168.80.2,,,,
2023-07-28 17:55:58 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-07-28 17:55:58 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-07-28 17:55:58 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-07-28 17:55:58 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-07-28 17:55:58 Opening tun interface:
2023-07-28 17:55:58 Local IPv4: 192.168.80.2/24 IPv6: (not set) MTU: 1500
2023-07-28 17:55:58 DNS Server: 10.10.10.1, 10.10.10.1, Domain: null
2023-07-28 17:55:58 Routes: 0.0.0.0/0, 192.168.80.0/24
2023-07-28 17:55:58 Routes excluded:
2023-07-28 17:55:58 Disallowed VPN apps:
2023-07-28 17:55:58 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-07-28 17:55:58 Data Channel MTU parms [ mss_fix:1386 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 17:55:58 Outgoing Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 17:55:58 Incoming Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 17:55:58 Initialization Sequence Completed
2023-07-28 17:55:58 MANAGEMENT: >STATE:1690592158,CONNECTED,SUCCESS,192.168.80.2,,10.193.221.93,59552
2023-07-28 18:03:30 read TCPv4_CLIENT []: Software caused connection abort (fd=4,code=103)
2023-07-28 18:03:30 write TCPv4_CLIENT []: Broken pipe (fd=4,code=32)
2023-07-28 18:03:30 Connection reset, restarting [0]
2023-07-28 18:03:30 TCP/UDP: Closing socket
2023-07-28 18:03:30 SIGUSR1[soft,connection-reset] received, process restarting
2023-07-28 18:03:31 MANAGEMENT: >STATE:1690592610,RECONNECTING,connection-reset,,,,,
2023-07-28 18:03:31 Waiting 2s seconds between connection attempt
2023-07-28 18:03:33 MANAGEMENT: CMD 'hold release'
2023-07-28 18:03:33 MANAGEMENT: CMD 'bytecount 2'
2023-07-28 18:03:33 MANAGEMENT: CMD 'state on'
2023-07-28 18:03:33 MANAGEMENT: CMD 'proxy NONE'
2023-07-28 18:03:34 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 18:03:34 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 18:03:34 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-07-28 18:03:34 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 18:03:34 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2023-07-28 18:03:34 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2023-07-28 18:03:34 TCP/UDP: Preserving recently used remote address: [AF_INET]
2023-07-28 18:03:34 Socket Buffers: R=[4194304->4194304] S=[524288->524288]
2023-07-28 18:03:34 Attempting to establish TCP connection with [AF_INET]*****************
2023-07-28 18:03:34 MANAGEMENT: >STATE:1690592614,TCP_CONNECT,,,,,,
2023-07-28 18:03:34 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 18:03:34 TCP connection established with [AF_INET]*****************
2023-07-28 18:03:34 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 18:03:34 TCPv4_CLIENT link local: (not bound)
2023-07-28 18:03:34 TCPv4_CLIENT link remote: [AF_INET]*****************
2023-07-28 18:03:34 MANAGEMENT: >STATE:1690592614,WAIT,,,,,,
2023-07-28 18:03:34 MANAGEMENT: >STATE:1690592614,AUTH,,,,,,
2023-07-28 18:03:34 TLS: Initial packet from [AF_INET], sid=b39b9a4c f8044758
2023-07-28 18:03:34 VERIFY OK: depth=1, CN=internal-ca, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:03:34 VERIFY KU OK
2023-07-28 18:03:34 Validating certificate extended key usage
2023-07-28 18:03:34 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-07-28 18:03:34 VERIFY EKU OK
2023-07-28 18:03:34 VERIFY X509NAME OK: CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:03:34 VERIFY OK: depth=0, CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:03:34 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1539', remote='link-mtu 1536'
2023-07-28 18:03:34 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-07-28 18:03:34 [roadwarrior_cert] Peer Connection Initiated with [AF_INET]
2023-07-28 18:03:35 MANAGEMENT: >STATE:1690592615,GET_CONFIG,,,,,,
2023-07-28 18:03:35 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 18:03:40 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 18:04:22 read TCPv4_CLIENT []: Software caused connection abort (fd=4,code=103)
2023-07-28 18:04:22 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 18:04:22 write TCPv4_CLIENT []: Broken pipe (fd=4,code=32)
2023-07-28 18:04:22 Connection reset, restarting [0]
2023-07-28 18:04:22 TCP/UDP: Closing socket
2023-07-28 18:04:22 SIGUSR1[soft,connection-reset] received, process restarting
2023-07-28 18:04:22 MANAGEMENT: >STATE:1690592662,RECONNECTING,connection-reset,,,,,
2023-07-28 18:04:22 Waiting 2s seconds between connection attempt
2023-07-28 18:04:24 MANAGEMENT: CMD 'hold release'
2023-07-28 18:04:24 MANAGEMENT: CMD 'bytecount 2'
2023-07-28 18:04:24 MANAGEMENT: CMD 'state on'
2023-07-28 18:04:24 MANAGEMENT: CMD 'proxy NONE'
2023-07-28 18:04:25 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 18:04:25 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 18:04:25 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-07-28 18:04:25 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 18:04:25 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2023-07-28 18:04:25 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2023-07-28 18:04:25 TCP/UDP: Preserving recently used remote address: [AF_INET]*****************
2023-07-28 18:04:25 Socket Buffers: R=[4194304->4194304] S=[524288->524288]
2023-07-28 18:04:25 Attempting to establish TCP connection with [AF_INET]*****************
2023-07-28 18:04:25 MANAGEMENT: >STATE:1690592665,TCP_CONNECT,,,,,,
2023-07-28 18:04:25 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 18:04:25 TCP connection established with [AF_INET]*****************
2023-07-28 18:04:25 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 18:04:25 TCPv4_CLIENT link local: (not bound)
2023-07-28 18:04:25 TCPv4_CLIENT link remote: [AF_INET]*****************
2023-07-28 18:04:25 MANAGEMENT: >STATE:1690592665,WAIT,,,,,,
2023-07-28 18:04:25 MANAGEMENT: >STATE:1690592665,AUTH,,,,,,
2023-07-28 18:04:25 TLS: Initial packet from [AF_INET], sid=7a243972 e30d1082
2023-07-28 18:04:25 VERIFY OK: depth=1, CN=internal-ca, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:04:25 VERIFY KU OK
2023-07-28 18:04:25 Validating certificate extended key usage
2023-07-28 18:04:25 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-07-28 18:04:25 VERIFY EKU OK
2023-07-28 18:04:25 VERIFY X509NAME OK: CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:04:25 VERIFY OK: depth=0, CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:04:25 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1539', remote='link-mtu 1536'
2023-07-28 18:04:25 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-07-28 18:04:25 [roadwarrior_cert] Peer Connection Initiated with [AF_INET]
2023-07-28 18:04:26 MANAGEMENT: >STATE:1690592666,GET_CONFIG,,,,,,
2023-07-28 18:04:26 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 18:04:26 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.10.1,redirect-gateway def1,route-gateway 192.168.80.1,topology subnet,ping 10,ping-restart 600,ifconfig 192.168.80.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit,tun-mtu 1500'
2023-07-28 18:04:26 OPTIONS IMPORT: timers and/or timeouts modified
2023-07-28 18:04:26 OPTIONS IMPORT: --ifconfig/up options modified
2023-07-28 18:04:26 OPTIONS IMPORT: route options modified
2023-07-28 18:04:26 OPTIONS IMPORT: route-related options modified
2023-07-28 18:04:26 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-07-28 18:04:26 OPTIONS IMPORT: peer-id set
2023-07-28 18:04:26 OPTIONS IMPORT: data channel crypto options modified
2023-07-28 18:04:26 OPTIONS IMPORT: tun-mtu set to 1500
2023-07-28 18:04:26 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-07-28 18:04:26 do_ifconfig, ipv4=1, ipv6=0
2023-07-28 18:04:26 MANAGEMENT: >STATE:1690592666,ASSIGN_IP,,192.168.80.2,,,,
2023-07-28 18:04:26 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-07-28 18:04:26 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-07-28 18:04:26 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-07-28 18:04:26 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-07-28 18:04:26 Opening tun interface:
2023-07-28 18:04:26 Local IPv4: 192.168.80.2/24 IPv6: (not set) MTU: 1500
2023-07-28 18:04:26 DNS Server: 10.10.10.1, Domain: null
2023-07-28 18:04:26 Routes: 0.0.0.0/0, 192.168.80.0/24
2023-07-28 18:04:26 Routes excluded:
2023-07-28 18:04:26 Disallowed VPN apps:
2023-07-28 18:04:26 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-07-28 18:04:26 Data Channel MTU parms [ mss_fix:1386 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 18:04:26 Outgoing Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 18:04:26 Incoming Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 18:04:26 Initialization Sequence Completed
2023-07-28 18:04:26 MANAGEMENT: >STATE:1690592666,CONNECTED,SUCCESS,192.168.80.2,,10.193.221.93,43318
2023-07-28 18:11:17 read TCPv4_CLIENT []: Software caused connection abort (fd=4,code=103)
2023-07-28 18:11:18 write TCPv4_CLIENT []: Broken pipe (fd=4,code=32)
2023-07-28 18:11:18 Connection reset, restarting [0]
2023-07-28 18:11:18 TCP/UDP: Closing socket
2023-07-28 18:11:18 Waiting 2s seconds between connection attempt
2023-07-28 18:11:18 SIGUSR1[soft,connection-reset] received, process restarting
2023-07-28 18:11:18 MANAGEMENT: >STATE:1690593078,RECONNECTING,connection-reset,,,,,
2023-07-28 18:11:20 MANAGEMENT: CMD 'hold release'
2023-07-28 18:11:20 MANAGEMENT: CMD 'bytecount 2'
2023-07-28 18:11:20 MANAGEMENT: CMD 'state on'
2023-07-28 18:11:20 MANAGEMENT: CMD 'proxy NONE'
2023-07-28 18:11:21 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 18:11:21 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-07-28 18:11:21 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-07-28 18:11:21 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 18:11:21 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_CLIENT,keydir 1,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
2023-07-28 18:11:21 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1539,tun-mtu 1500,proto TCPv4_SERVER,keydir 0,cipher CHACHA20-POLY1305,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
2023-07-28 18:11:21 TCP/UDP: Preserving recently used remote address: [AF_INET]
2023-07-28 18:11:21 Socket Buffers: R=[4194304->4194304] S=[524288->524288]
2023-07-28 18:11:21 Attempting to establish TCP connection with [AF_INET]*****************
2023-07-28 18:11:21 MANAGEMENT: >STATE:1690593081,TCP_CONNECT,,,,,,
2023-07-28 18:11:21 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 18:11:21 TCP connection established with [AF_INET]*****************
2023-07-28 18:11:21 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-07-28 18:11:21 TCPv4_CLIENT link local: (not bound)
2023-07-28 18:11:21 TCPv4_CLIENT link remote: [AF_INET]*****************
2023-07-28 18:11:21 MANAGEMENT: >STATE:1690593081,WAIT,,,,,,
2023-07-28 18:11:21 MANAGEMENT: >STATE:1690593081,AUTH,,,,,,
2023-07-28 18:11:21 TLS: Initial packet from [AF_INET], sid=30badf68 1c225cfa
2023-07-28 18:11:21 VERIFY OK: depth=1, CN=internal-ca, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:11:21 VERIFY KU OK
2023-07-28 18:11:21 Validating certificate extended key usage
2023-07-28 18:11:21 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-07-28 18:11:21 VERIFY EKU OK
2023-07-28 18:11:21 VERIFY X509NAME OK: CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:11:21 VERIFY OK: depth=0, CN=roadwarrior_cert, C=CA, ST=BC, L=Coquitlam
2023-07-28 18:11:21 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1539', remote='link-mtu 1536'
2023-07-28 18:11:21 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-07-28 18:11:21 [roadwarrior_cert] Peer Connection Initiated with [AF_INET]
2023-07-28 18:11:22 MANAGEMENT: >STATE:1690593082,GET_CONFIG,,,,,,
2023-07-28 18:11:22 SENT CONTROL [roadwarrior_cert]: 'PUSH_REQUEST' (status=1)
2023-07-28 18:11:22 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.10.1,redirect-gateway def1,route-gateway 192.168.80.1,topology subnet,ping 10,ping-restart 600,ifconfig 192.168.80.2 255.255.255.0,peer-id 0,cipher CHACHA20-POLY1305,protocol-flags cc-exit,tun-mtu 1500'
2023-07-28 18:11:22 OPTIONS IMPORT: timers and/or timeouts modified
2023-07-28 18:11:22 OPTIONS IMPORT: --ifconfig/up options modified
2023-07-28 18:11:22 OPTIONS IMPORT: route options modified
2023-07-28 18:11:22 OPTIONS IMPORT: route-related options modified
2023-07-28 18:11:22 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-07-28 18:11:22 OPTIONS IMPORT: peer-id set
2023-07-28 18:11:22 OPTIONS IMPORT: data channel crypto options modified
2023-07-28 18:11:22 OPTIONS IMPORT: tun-mtu set to 1500
2023-07-28 18:11:22 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-07-28 18:11:22 do_ifconfig, ipv4=1, ipv6=0
2023-07-28 18:11:22 MANAGEMENT: >STATE:1690593082,ASSIGN_IP,,192.168.80.2,,,,
2023-07-28 18:11:22 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-07-28 18:11:22 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-07-28 18:11:22 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-07-28 18:11:22 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'
2023-07-28 18:11:22 Data Channel MTU parms [ mss_fix:1386 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-07-28 18:11:22 Outgoing Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key
2023-07-28 18:11:22 Incoming Data Channel: Cipher 'CHACHA20-POLY1305' initialized with 256 bit key