De-Bug Print

  • 0

stdout: 2024-04-15 13:41:58 SENT CONTROL [server_5yzLwdZGYFSgBqIs]: 'PUSH_REQUEST' (status=1)
2024-04-15 13:41:58 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 1.0.0.1,dhcp-option DNS 1.1.1.1,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.5 255.255.255.0,peer-id 3,cipher AES-256-GCM'
2024-04-15 13:41:58 OPTIONS IMPORT: timers and/or timeouts modified
2024-04-15 13:41:58 OPTIONS IMPORT: --ifconfig/up options modified
2024-04-15 13:41:58 OPTIONS IMPORT: route options modified
2024-04-15 13:41:58 OPTIONS IMPORT: route-related options modified
2024-04-15 13:41:58 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2024-04-15 13:41:58 OPTIONS IMPORT: peer-id set
2024-04-15 13:41:58 OPTIONS IMPORT: adjusting link_mtu to 1624
2024-04-15 13:41:58 OPTIONS IMPORT: data channel crypto options modified
2024-04-15 13:41:58 Data Channel: using negotiated cipher 'AES-256-GCM'
2024-04-15 13:41:58 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 13:41:58 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 13:41:58 interactive service msg_channel=0
2024-04-15 13:41:58 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=23 HWADDR=20:4e:f6:2c:d9:11
2024-04-15 13:41:59 open_tun
2024-04-15 13:41:59 tap-windows6 device [OpenVPN TAP-Windows6] opened
2024-04-15 13:41:59 TAP-Windows Driver Version 9.24
2024-04-15 13:41:59 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
2024-04-15 13:41:59 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {62ECF017-ACCD-4B9E-B0DD-44C2CE28DFAA} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
2024-04-15 13:41:59 Successful ARP Flush on interface [12] {62ECF017-ACCD-4B9E-B0DD-44C2CE28DFAA}
2024-04-15 13:41:59 IPv4 MTU set to 1500 on interface 12 using SetIpInterfaceEntry()
2024-04-15 13:41:59 Block_DNS: WFP engine opened
2024-04-15 13:41:59 Block_DNS: Added a persistent sublayer with pre-defined UUID
2024-04-15 13:41:59 Block_DNS: Added permit filters for exe_path
2024-04-15 13:41:59 Block_DNS: Added block filters for all interfaces
2024-04-15 13:41:59 Block_DNS: Added permit filters for TAP interface
2024-04-15 13:42:04 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
2024-04-15 13:42:04 C:\WINDOWS\system32\route.exe ADD 46.4.105.143 MASK 255.255.255.255 192.168.0.1
2024-04-15 13:42:04 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
2024-04-15 13:42:04 Route addition via IPAPI succeeded [adaptive]
2024-04-15 13:42:04 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
2024-04-15 13:42:04 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
2024-04-15 13:42:04 Route addition via IPAPI succeeded [adaptive]
2024-04-15 13:42:04 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
2024-04-15 13:42:04 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
2024-04-15 13:42:04 Route addition via IPAPI succeeded [adaptive]
2024-04-15 13:42:04 Initialization Sequence Completed


stdout: 2024-04-15 14:41:57 TLS: soft reset sec=3600/3600 bytes=257507984/-1 pkts=321077/0


stdout: 2024-04-15 14:41:57 VERIFY OK: depth=1, CN=cn_xoYQ9uwiyrmJJVy1


stdout: 2024-04-15 14:41:57 VERIFY KU OK
2024-04-15 14:41:57 Validating certificate extended key usage
2024-04-15 14:41:57 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-15 14:41:57 VERIFY EKU OK
2024-04-15 14:41:57 VERIFY X509NAME OK: CN=server_5yzLwdZGYFSgBqIs
2024-04-15 14:41:57 VERIFY OK: depth=0, CN=server_5yzLwdZGYFSgBqIs


stdout: 2024-04-15 14:41:57 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 14:41:57 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 14:41:57 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256


stdout: 2024-04-15 15:41:57 TLS: soft reset sec=3600/3600 bytes=97330386/-1 pkts=146317/0


stdout: 2024-04-15 15:41:57 VERIFY OK: depth=1, CN=cn_xoYQ9uwiyrmJJVy1


stdout: 2024-04-15 15:41:57 VERIFY KU OK
2024-04-15 15:41:57 Validating certificate extended key usage
2024-04-15 15:41:57 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-15 15:41:57 VERIFY EKU OK
2024-04-15 15:41:57 VERIFY X509NAME OK: CN=server_5yzLwdZGYFSgBqIs
2024-04-15 15:41:57 VERIFY OK: depth=0, CN=server_5yzLwdZGYFSgBqIs


stdout: 2024-04-15 15:41:57 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 15:41:57 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 15:41:57 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256


stdout: 2024-04-15 16:41:57 TLS: soft reset sec=3600/3600 bytes=3012189136/-1 pkts=3175702/0


stdout: 2024-04-15 16:41:57 VERIFY OK: depth=1, CN=cn_xoYQ9uwiyrmJJVy1


stdout: 2024-04-15 16:41:57 VERIFY KU OK
2024-04-15 16:41:57 Validating certificate extended key usage
2024-04-15 16:41:57 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-15 16:41:57 VERIFY EKU OK
2024-04-15 16:41:57 VERIFY X509NAME OK: CN=server_5yzLwdZGYFSgBqIs
2024-04-15 16:41:57 VERIFY OK: depth=0, CN=server_5yzLwdZGYFSgBqIs


stdout: 2024-04-15 16:41:57 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 16:41:57 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key


stdout: 2024-04-15 16:41:57 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256


stdout: 2024-04-15 17:41:57 TLS: soft reset sec=3600/3600 bytes=2520320092/-1 pkts=2527594/0


stdout: 2024-04-15 17:41:59 VERIFY OK: depth=1, CN=cn_xoYQ9uwiyrmJJVy1
2024-04-15 17:41:59 VERIFY KU OK
2024-04-15 17:41:59 Validating certificate extended key usage


stdout: 2024-04-15 17:41:59 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-15 17:41:59 VERIFY EKU OK
2024-04-15 17:41:59 VERIFY X509NAME OK: CN=server_5yzLwdZGYFSgBqIs
2024-04-15 17:41:59 VERIFY OK: depth=0, CN=server_5yzLwdZGYFSgBqIs


stdout: 2024-04-15 17:42:01 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 17:42:01 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key


stdout: 2024-04-15 17:42:01 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256


stdout: 2024-04-15 17:43:31 AEAD Decrypt error: bad packet ID (may be a replay): [ #5705 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:33 AEAD Decrypt error: bad packet ID (may be a replay): [ #6921 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:33 AEAD Decrypt error: bad packet ID (may be a replay): [ #6922 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:36 AEAD Decrypt error: bad packet ID (may be a replay): [ #8447 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:36 AEAD Decrypt error: bad packet ID (may be a replay): [ #8448 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:36 AEAD Decrypt error: bad packet ID (may be a replay): [ #8449 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:43 AEAD Decrypt error: bad packet ID (may be a replay): [ #10881 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:43 AEAD Decrypt error: bad packet ID (may be a replay): [ #10882 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #10883 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #10968 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11086 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11087 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11088 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11346 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11347 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11348 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:44 AEAD Decrypt error: bad packet ID (may be a replay): [ #11349 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11618 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11694 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11695 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11696 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11697 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11698 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:45 AEAD Decrypt error: bad packet ID (may be a replay): [ #11699 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12163 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12164 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12148 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12149 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12150 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12151 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 17:43:46 AEAD Decrypt error: bad packet ID (may be a replay): [ #12152 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings


stdout: 2024-04-15 18:41:57 TLS: tls_process: killed expiring key


stdout: 2024-04-15 18:42:01 TLS: soft reset sec=3600/3600 bytes=148438020/-1 pkts=192356/0


stdout: 2024-04-15 18:42:01 VERIFY OK: depth=1, CN=cn_xoYQ9uwiyrmJJVy1
2024-04-15 18:42:01 VERIFY KU OK
2024-04-15 18:42:01 Validating certificate extended key usage
2024-04-15 18:42:01 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2024-04-15 18:42:01 VERIFY EKU OK


stdout: 2024-04-15 18:42:01 VERIFY X509NAME OK: CN=server_5yzLwdZGYFSgBqIs
2024-04-15 18:42:01 VERIFY OK: depth=0, CN=server_5yzLwdZGYFSgBqIs


stdout: 2024-04-15 18:42:01 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 18:42:01 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-04-15 18:42:01 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256

 


Was this answer helpful?

« Back