Sun Feb 04 13:45:03 2018 us=798505 Current Parameter Settings:
Sun Feb 04 13:45:03 2018 us=798505 config = 'Router UDP (tun1) --redirect-gateway.ovpn'
Sun Feb 04 13:45:03 2018 us=798505 mode = 0
Sun Feb 04 13:45:03 2018 us=798505 show_ciphers = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 show_digests = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 show_engines = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 genkey = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 key_pass_file = '[UNDEF]'
Sun Feb 04 13:45:03 2018 us=798505 show_tls_ciphers = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 connect_retry_max = 0
Sun Feb 04 13:45:03 2018 us=798505 Connection profiles [0]:
Sun Feb 04 13:45:03 2018 us=798505 proto = udp
Sun Feb 04 13:45:03 2018 us=798505 local = '[UNDEF]'
Sun Feb 04 13:45:03 2018 us=798505 local_port = '[UNDEF]'
Sun Feb 04 13:45:03 2018 us=798505 remote = '[sub.domain.tld]'
Sun Feb 04 13:45:03 2018 us=798505 remote_port = '4719'
Sun Feb 04 13:45:03 2018 us=798505 remote_float = ENABLED
Sun Feb 04 13:45:03 2018 us=798505 bind_defined = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 bind_local = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 bind_ipv6_only = DISABLED
Sun Feb 04 13:45:03 2018 us=798505 NOTE: --mute triggered...
Sun Feb 04 13:45:03 2018 us=798505 271 variation(s) on previous 20 message(s) suppressed by --mute
Sun Feb 04 13:45:03 2018 us=798505 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Sun Feb 04 13:45:03 2018 us=798505 Windows version 6.2 (Windows 8 or greater) 64bit
Sun Feb 04 13:45:03 2018 us=798505 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Sun Feb 04 13:45:03 2018 us=799508 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25343
Sun Feb 04 13:45:03 2018 us=799508 Need hold release from management interface, waiting...
Sun Feb 04 13:45:04 2018 us=281278 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25343
Sun Feb 04 13:45:04 2018 us=383015 MANAGEMENT: CMD 'state on'
Sun Feb 04 13:45:04 2018 us=383015 MANAGEMENT: CMD 'log all on'
Sun Feb 04 13:45:04 2018 us=447913 MANAGEMENT: CMD 'echo all on'
Sun Feb 04 13:45:04 2018 us=450029 MANAGEMENT: CMD 'hold off'
Sun Feb 04 13:45:04 2018 us=451031 MANAGEMENT: CMD 'hold release'
Sun Feb 04 13:45:04 2018 us=527233 PRNG init md=SHA1 size=36
Sun Feb 04 13:45:04 2018 us=527233 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Feb 04 13:45:04 2018 us=527233 Outgoing Control Channel Authentication: HMAC KEY: 8ee9cbdf a8887340 99ca7f9b a8c3dd83 87efc20d 2cada679 f4ed94f0 c91977e8 7bc25371 2fb93da0 6fa53c2a 4688cdff cd58dc1c 7cdfe0da 7268d4c6 e3522798
Sun Feb 04 13:45:04 2018 us=527233 Outgoing Control Channel Authentication: HMAC size=64 block_size=64
Sun Feb 04 13:45:04 2018 us=527233 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Feb 04 13:45:04 2018 us=527233 Incoming Control Channel Authentication: HMAC KEY: 74fc7789 606c2f64 9cb71cc4 6dfd77d5 b3cc8f7b 78a4276e 9d36ac55 854acb90 03fa0900 11e7f14e fa439abd 4fe7a8d6 df1b1dca 39670f79 e6d87d30 8305d4eb
Sun Feb 04 13:45:04 2018 us=527233 Incoming Control Channel Authentication: HMAC size=64 block_size=64
Sun Feb 04 13:45:04 2018 us=527233 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 72 bytes
Sun Feb 04 13:45:04 2018 us=527233 LZO compression initializing
Sun Feb 04 13:45:04 2018 us=527233 PID packet_id_init seq_backtrack=64 time_backtrack=15
Sun Feb 04 13:45:04 2018 us=527233 PID packet_id_init seq_backtrack=64 time_backtrack=15
Sun Feb 04 13:45:04 2018 us=527233 PID packet_id_init seq_backtrack=64 time_backtrack=15
Sun Feb 04 13:45:04 2018 us=527233 PID packet_id_init seq_backtrack=64 time_backtrack=15
Sun Feb 04 13:45:04 2018 us=527233 Control Channel MTU parms [ L:48122 D:1140 EF:110 EB:0 ET:0 EL:3 ]
Sun Feb 04 13:45:04 2018 us=528236 MANAGEMENT: >STATE:1517748304,RESOLVE,,,,,,
Sun Feb 04 13:45:04 2018 us=528236 GETADDRINFO flags=0x0901 ai_family=0 ai_socktype=2
Sun Feb 04 13:45:04 2018 us=530242 RESOLVE_REMOTE flags=0x0901 phase=1 rrs=0 sig=-1 status=0
Sun Feb 04 13:45:04 2018 us=530242 Data Channel MTU parms [ L:48122 D:48122 EF:122 EB:8156 ET:0 EL:3 ]
Sun Feb 04 13:45:04 2018 us=530242 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 100 bytes
Sun Feb 04 13:45:04 2018 us=530242 calc_options_string_link_mtu: link-mtu 48122 -> 48102
Sun Feb 04 13:45:04 2018 us=530242 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 100 bytes
Sun Feb 04 13:45:04 2018 us=530242 calc_options_string_link_mtu: link-mtu 48122 -> 48102
Sun Feb 04 13:45:04 2018 us=530242 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 48102,tun-mtu 48000,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
Sun Feb 04 13:45:04 2018 us=530242 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 48102,tun-mtu 48000,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
Sun Feb 04 13:45:04 2018 us=530242 TCP/UDP: Preserving recently used remote address: [AF_INET][public router IP]:4719
Sun Feb 04 13:45:04 2018 us=530242 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Feb 04 13:45:04 2018 us=530242 UDP link local: (not bound)
Sun Feb 04 13:45:04 2018 us=530242 UDP link remote: [AF_INET][public router IP]:4719
Sun Feb 04 13:45:04 2018 us=530242 MANAGEMENT: >STATE:1517748304,WAIT,,,,,,
Sun Feb 04 13:45:04 2018 us=530242 UDP WRITE [86] to [AF_INET][public router IP]:4719: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
Sun Feb 04 13:45:04 2018 us=530242 UDP READ [0] from [AF_UNSPEC]: DATA UNDEF len=-1
Sun Feb 04 13:45:04 2018 us=654015 UDP READ [98] from [AF_INET][public router IP]:4719: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
Sun Feb 04 13:45:04 2018 us=654015 MANAGEMENT: >STATE:1517748304,AUTH,,,,,,
Sun Feb 04 13:45:04 2018 us=654015 TLS: Initial packet from [AF_INET][public router IP]:4719, sid=c5e0026b 54c749a1
Sun Feb 04 13:45:04 2018 us=654015 PID_TEST [0] [TLS_WRAP-0] [] 0:0 1517748304:1 t=1517748304[0] r=[0,64,15,0,1] sl=[0,0,64,528]
Sun Feb 04 13:45:04 2018 us=654842 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
Sun Feb 04 13:45:04 2018 us=654842 UDP WRITE [259] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=173
Sun Feb 04 13:45:04 2018 us=958556 UDP READ [1128] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #2 ] [ 1 ] pid=1 DATA len=1030
Sun Feb 04 13:45:04 2018 us=958556 PID_TEST [0] [TLS_WRAP-0] [0] 1517748304:1 1517748304:2 t=1517748304[0] r=[0,64,15,0,1] sl=[63,1,64,528]
Sun Feb 04 13:45:04 2018 us=959569 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #4 ] [ 1 ]
Sun Feb 04 13:45:04 2018 us=960570 UDP READ [1116] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=2 DATA len=1030
Sun Feb 04 13:45:04 2018 us=960570 PID_TEST [0] [TLS_WRAP-0] [00] 1517748304:2 1517748304:3 t=1517748304[0] r=[0,64,15,0,1] sl=[62,2,64,528]
Sun Feb 04 13:45:04 2018 us=960570 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #5 ] [ 2 ]
Sun Feb 04 13:45:04 2018 us=961573 UDP READ [1116] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #4 ] [ ] pid=3 DATA len=1030
Sun Feb 04 13:45:04 2018 us=961573 PID_TEST [0] [TLS_WRAP-0] [000] 1517748304:3 1517748304:4 t=1517748304[0] r=[0,64,15,0,1] sl=[61,3,64,528]
Sun Feb 04 13:45:04 2018 us=961573 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #6 ] [ 3 ]
Sun Feb 04 13:45:04 2018 us=962575 UDP READ [1116] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #5 ] [ ] pid=4 DATA len=1030
Sun Feb 04 13:45:04 2018 us=962575 PID_TEST [0] [TLS_WRAP-0] [0000] 1517748304:4 1517748304:5 t=1517748304[0] r=[0,64,15,0,1] sl=[60,4,64,528]
Sun Feb 04 13:45:04 2018 us=962575 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #7 ] [ 4 ]
Sun Feb 04 13:45:04 2018 us=996326 UDP READ [1116] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #6 ] [ ] pid=5 DATA len=1030
Sun Feb 04 13:45:04 2018 us=996326 PID_TEST [0] [TLS_WRAP-0] [00000] 1517748304:5 1517748304:6 t=1517748304[0] r=[0,64,15,0,1] sl=[59,5,64,528]
Sun Feb 04 13:45:04 2018 us=997334 VERIFY OK: depth=2, C=DE, ST=RlP, CN=OpenVPN-CA
Sun Feb 04 13:45:04 2018 us=997334 VERIFY OK: depth=1, C=DE, ST=RlP, CN=OpenVPN-ICA
Sun Feb 04 13:45:04 2018 us=998336 Validating certificate extended key usage
Sun Feb 04 13:45:04 2018 us=998336 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Feb 04 13:45:04 2018 us=998336 VERIFY EKU OK
Sun Feb 04 13:45:04 2018 us=998336 VERIFY OK: depth=0, C=DE, ST=RlP, L=KH, CN=[sub.domain.tld]
Sun Feb 04 13:45:04 2018 us=998336 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #8 ] [ 5 ]
Sun Feb 04 13:45:05 2018 us=3348 UDP READ [163] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=6 DATA len=77
Sun Feb 04 13:45:05 2018 us=3348 PID_TEST [0] [TLS_WRAP-0] [111111] 1517748304:6 1517748304:7 t=1517748305[0] r=[-1,64,15,0,1] sl=[58,6,64,528]
Sun Feb 04 13:45:05 2018 us=18389 UDP WRITE [1128] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #9 ] [ 6 ] pid=2 DATA len=1030
Sun Feb 04 13:45:05 2018 us=18389 UDP WRITE [1116] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #10 ] [ ] pid=3 DATA len=1030
Sun Feb 04 13:45:05 2018 us=18389 UDP WRITE [1116] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #11 ] [ ] pid=4 DATA len=1030
Sun Feb 04 13:45:05 2018 us=18389 UDP WRITE [611] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #12 ] [ ] pid=5 DATA len=525
Sun Feb 04 13:45:05 2018 us=18389 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=18389 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=19406 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=20393 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=20393 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=20393 ACK output sequence broken: [6] 2 3 4 5
Sun Feb 04 13:45:05 2018 us=20393 NOTE: --mute triggered...
Sun Feb 04 13:45:05 2018 us=57465 2 variation(s) on previous 20 message(s) suppressed by --mute
Sun Feb 04 13:45:05 2018 us=57465 UDP READ [94] from [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #8 ] [ 2 ]
Sun Feb 04 13:45:05 2018 us=57465 PID_TEST [0] [TLS_WRAP-0] [0111111] 1517748304:7 1517748304:8 t=1517748305[0] r=[-1,64,15,0,1] sl=[57,7,64,528]
Sun Feb 04 13:45:05 2018 us=57465 UDP READ [94] from [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #9 ] [ 3 ]
Sun Feb 04 13:45:05 2018 us=57465 PID_TEST [0] [TLS_WRAP-0] [00111111] 1517748304:8 1517748304:9 t=1517748305[0] r=[-1,64,15,0,1] sl=[56,8,64,528]
Sun Feb 04 13:45:05 2018 us=74544 UDP READ [94] from [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #10 ] [ 4 ]
Sun Feb 04 13:45:05 2018 us=74544 PID_TEST [0] [TLS_WRAP-0] [000111111] 1517748304:9 1517748304:10 t=1517748305[0] r=[-1,64,15,0,1] sl=[55,9,64,528]
Sun Feb 04 13:45:05 2018 us=87543 UDP READ [149] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #11 ] [ 5 ] pid=7 DATA len=51
Sun Feb 04 13:45:05 2018 us=87543 PID_TEST [0] [TLS_WRAP-0] [0000111111] 1517748304:10 1517748304:11 t=1517748305[0] r=[-1,64,15,0,1] sl=[54,10,64,528]
Sun Feb 04 13:45:05 2018 us=87543 UDP WRITE [547] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #13 ] [ 7 ] pid=6 DATA len=449
Sun Feb 04 13:45:05 2018 us=125145 UDP READ [213] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #12 ] [ 6 ] pid=8 DATA len=115
Sun Feb 04 13:45:05 2018 us=125145 PID_TEST [0] [TLS_WRAP-0] [00000111111] 1517748304:11 1517748304:12 t=1517748305[0] r=[-1,64,15,0,1] sl=[53,11,64,528]
Sun Feb 04 13:45:05 2018 us=126148 NOTE: Options consistency check may be skewed by version differences
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'version' is used inconsistently, local='version V4', remote='version V0 UNDEF'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'dev-type' is present in local config but missing in remote config, local='dev-type tun'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'link-mtu' is present in local config but missing in remote config, local='link-mtu 48102'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'tun-mtu' is present in local config but missing in remote config, local='tun-mtu 48000'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 0'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'cipher' is present in local config but missing in remote config, local='cipher AES-256-CBC'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'auth' is present in local config but missing in remote config, local='auth SHA512'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'keysize' is present in local config but missing in remote config, local='keysize 256'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'tls-auth' is present in local config but missing in remote config, local='tls-auth'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'key-method' is present in local config but missing in remote config, local='key-method 2'
Sun Feb 04 13:45:05 2018 us=126148 WARNING: 'tls-server' is present in local config but missing in remote config, local='tls-server'
Sun Feb 04 13:45:05 2018 us=126148 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #14 ] [ 8 ]
Sun Feb 04 13:45:05 2018 us=126148 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Feb 04 13:45:05 2018 us=126148 [[sub.domain.tld]] Peer Connection Initiated with [AF_INET][public router IP]:4719
Sun Feb 04 13:45:06 2018 us=317237 MANAGEMENT: >STATE:1517748306,GET_CONFIG,,,,,,
Sun Feb 04 13:45:06 2018 us=317237 SENT CONTROL [[sub.domain.tld]]: 'PUSH_REQUEST' (status=1)
Sun Feb 04 13:45:06 2018 us=317237 UDP WRITE [128] to [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #15 ] [ ] pid=7 DATA len=42
Sun Feb 04 13:45:06 2018 us=412099 UDP READ [94] from [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #13 ] [ 7 ]
Sun Feb 04 13:45:06 2018 us=412099 PID_TEST [0] [TLS_WRAP-0] [111111222222] 1517748304:12 1517748304:13 t=1517748306[0] r=[-2,64,15,0,1] sl=[52,12,64,528]
Sun Feb 04 13:45:06 2018 us=412099 UDP READ [466] from [AF_INET][public router IP]:4719: P_CONTROL_V1 kid=0 pid=[ #14 ] [ ] pid=9 DATA len=380
Sun Feb 04 13:45:06 2018 us=413104 PID_TEST [0] [TLS_WRAP-0] [0111111222222] 1517748304:13 1517748304:14 t=1517748306[0] r=[-2,64,15,0,1] sl=[51,13,64,528]
Sun Feb 04 13:45:06 2018 us=413104 PUSH: Received control message: 'PUSH_REPLY,sndbuf 393216,rcvbuf 393216,route 192.168.1.0 255.255.255.0,dhcp-option DNS 192.168.1.1,dhcp-option WINS 192.168.1.1,dhcp-option DNS 208.67.222.123,dhcp-option DNS 208.67.220.123,dhcp-option NTP 192.53.103.108,route-gateway 10.1.1.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.1.1.2 255.255.255.240,peer-id 0,cipher AES-256-GCM'
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: timers and/or timeouts modified
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sun Feb 04 13:45:06 2018 us=413104 Socket Buffers: R=[65536->393216] S=[65536->393216]
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: --ifconfig/up options modified
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: route options modified
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: route-related options modified
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: peer-id set
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: adjusting link_mtu to 48125
Sun Feb 04 13:45:06 2018 us=413104 OPTIONS IMPORT: data channel crypto options modified
Sun Feb 04 13:45:06 2018 us=413104 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Feb 04 13:45:06 2018 us=413104 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 48 bytes
Sun Feb 04 13:45:06 2018 us=413104 Data Channel MTU parms [ L:48053 D:48053 EF:53 EB:8156 ET:0 EL:3 ]
Sun Feb 04 13:45:06 2018 us=413104 Client pre_master: 9788c1a8 e738cd92 61652b84 a826eeae c56c922e 5714b3bc 26ac1e99 89d98da6 cdc989f1 4318dbb6 e247930f 7c7f60a4
Sun Feb 04 13:45:06 2018 us=413104 Client random1: 15c8365c 5bf04ee0 234870b2 54322101 4fda307e a93b676c 81969b81 9a95505f
Sun Feb 04 13:45:06 2018 us=413104 Client random2: de4844d3 2ce30860 21a5bca7 fc7df956 3cb97fc2 27bb9601 48217fea 707f5061
Sun Feb 04 13:45:06 2018 us=413104 Server pre_master: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000
Sun Feb 04 13:45:06 2018 us=413104 Server random1: a3b27aba d358fbb0 111c9f5b cbc5a083 de77c1f4 2e965ab7 89350747 7c2e83ba
Sun Feb 04 13:45:06 2018 us=413104 Server random2: 4ae0b417 6e2b76c7 2deb3e20 01db6924 0de4533e b1547355 a19f614d e25cb7ae
Sun Feb 04 13:45:06 2018 us=413104 tls1_P_hash sec: 9788c1a8 e738cd92 61652b84 a826eeae c56c922e 5714b3bc
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash seed: 4f70656e 56504e20 6d617374 65722073 65637265 7415c836 5c5bf04e e0234870 b2543221 014fda30 7ea93b67 6c81969b 819a9550 5fa3b27a bad358fb b0111c9f 5bcbc5a0 83de77c1 f42e965a b7893507 477c2e83 ba
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash out: 06559427 e30034bc 2b0e7837 1c7caee2 9bfde101 03338dc5 92543416 13093955 abf6d2d8 8e008e49 47db099f c72d46ee
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash sec: 26ac1e99 89d98da6 cdc989f1 4318dbb6 e247930f 7c7f60a4
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash seed: 4f70656e 56504e20 6d617374 65722073 65637265 7415c836 5c5bf04e e0234870 b2543221 014fda30 7ea93b67 6c81969b 819a9550 5fa3b27a bad358fb b0111c9f 5bcbc5a0 83de77c1 f42e965a b7893507 477c2e83 ba
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash out: 4236bed2 e70b3614 a61bca73 077725ef 37b04ac4 bd3563ae 96edeb10 52db03ce df1fdfe5 b1899d39 49d4babb 6e650fa1
Sun Feb 04 13:45:06 2018 us=414104 tls1_PRF out[48]: 44632af5 040b02a8 8d15b244 1b0b8b0d ac4dabc5 be06ee6b 04b9df06 41d23a9b 74e90d3d 3f891370 0e0fb324 a948494f
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash sec: 44632af5 040b02a8 8d15b244 1b0b8b0d ac4dabc5 be06ee6b
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash seed: 4f70656e 56504e20 6b657920 65787061 6e73696f 6ede4844 d32ce308 6021a5bc a7fc7df9 563cb97f c227bb96 0148217f ea707f50 614ae0b4 176e2b76 c72deb3e 2001db69 240de453 3eb15473 55a19f61 4de25cb7 ae0a8bc9 ab3a38fa bdc5e002 6b54c749 a1
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash out: bf924f55 0eee6d44 4c07fde9 ed8beaeb 976889f7 49fa9ae0 025c7f21 90e13d5e 75e47109 3aa7cf3a 81520344 41d73c1c 8523bae4 6243713e 075eb989 b2da8f6a c23292d7 53d68a55 8beba25e aedff3ac b6d270a4 6dbce01b ac7a262b 75aa4914 6e375519 e04cbd08 65db2b10 45ba8f13 01cb4215 6b22fc60 3d717869 f6b3823f 530f1b26 1bf5cd25 f1666a4d 2cac7d5f 85b4603b 44dd2f7c 188641e6 73362b42 0cc6468f b3ac2a29 58cdac05 cdf402fc bc542b43 b7ef7586 7041a412 3b49893f 5cb5a136 7df05cd0 1b930d3c e8b1f2d2 3f7166bc 9dfb1a78 599b0866 1b24d723 f734be65 5cda8a0c faf8af57 ca716ae4 68abc675 cd54b58e 78831cf7 e4a49dd9
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash sec: 04b9df06 41d23a9b 74e90d3d 3f891370 0e0fb324 a948494f
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash seed: 4f70656e 56504e20 6b657920 65787061 6e73696f 6ede4844 d32ce308 6021a5bc a7fc7df9 563cb97f c227bb96 0148217f ea707f50 614ae0b4 176e2b76 c72deb3e 2001db69 240de453 3eb15473 55a19f61 4de25cb7 ae0a8bc9 ab3a38fa bdc5e002 6b54c749 a1
Sun Feb 04 13:45:06 2018 us=414104 tls1_P_hash out: a8ca9f36 a482cb79 eb34e4ad e5e1eb10 5a682c6d 93dacc68 f5c3ab9a 8d0f6fe9 7c501edc fb9e59b8 4a3258eb 8dc77413 b4f78319 37e348ba cc43b10b 11d5be93 5b077f5d 717168f5 f25e5f07 24b04946 231efe1b ba33981e 68f92112 b7a33d0e 32bc67c9 fbedd1f3 aecbb3ae 3fc41b5f a726ce2d 1e09fa99 8e546389 94ad24a3 2c480c18 2dac0d37 180de7be 0d133956 1f18bcb3 2e889896 191928ce 1ecdd19e bf54ee3f d9733f29 972c1df8 b7d2b55a a6633688 c597d690 198f79d2 ce185556 49b7a238 eabd8efa e2906162 a6d9308b 70d793ac 83da450c a6640316 ca7438e2 2f84bf24 70c0a44a b7b37407 5bb83651 57b7ae9d d86c1efe 258d634a c5c76c83
Sun Feb 04 13:45:06 2018 us=415106 tls1_PRF out[256]: 1758d063 aa6ca63d a7331944 086a01fb cd00a59a da205688 f79fd4bb 1dee52b7 09b46fd5 c1399682 cb605baf cc10480f 31d439fd 55a03984 cb1d0882 a30f31f9 9935ed8a 22a7e2a0 79b5fd59 8a6fbaea 95cc8ebf d78f7805 c4830739 c209741a 5c8b32d0 1ba16cfb cb1098be 7a7e944c a6ed8c38 752b06f9 b3251be0 621ea69c 7f47173e 3659c012 e96b8df3 21bf4409 9aacdc88 6a55b7ea 019f6928 6dfbfadc b392a8b0 6adf1500 cfe1b1fd 7a26b7a6 1a371dcb 7278a316 69ceddc0 f551dc69 1502030e 974dd22a f9036c5e 4e68c259 4fa6f510 1e215f74 ffff0b70 d150efc1 d8b00141 2c1a2e46 4d4bdb50 91c95cb5 3f1c68e8 1538ab70 5d0e7fbd 2163f15a
Sun Feb 04 13:45:06 2018 us=415106 NOTE: --mute triggered...
Sun Feb 04 13:45:06 2018 us=415106 8 variation(s) on previous 20 message(s) suppressed by --mute
Sun Feb 04 13:45:06 2018 us=415106 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Feb 04 13:45:06 2018 us=415106 Outgoing Data Channel: CIPHER KEY: 1758d063 aa6ca63d a7331944 086a01fb cd00a59a da205688 f79fd4bb 1dee52b7
Sun Feb 04 13:45:06 2018 us=415106 Outgoing Data Channel: CIPHER block_size=16 iv_size=12
Sun Feb 04 13:45:06 2018 us=415106 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Feb 04 13:45:06 2018 us=415106 Incoming Data Channel: CIPHER KEY: 7f47173e 3659c012 e96b8df3 21bf4409 9aacdc88 6a55b7ea 019f6928 6dfbfadc
Sun Feb 04 13:45:06 2018 us=415106 Incoming Data Channel: CIPHER block_size=16 iv_size=12
Sun Feb 04 13:45:06 2018 us=415106 interactive service msg_channel=0
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[0] 0.0.0.0/0.0.0.0 i=2 m=55
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[1] 127.0.0.0/255.0.0.0 i=1 m=331
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[2] 127.0.0.1/255.255.255.255 i=1 m=331
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[3] 127.255.255.255/255.255.255.255 i=1 m=331
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[4] 192.168.43.0/255.255.255.0 i=2 m=311
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[5] 192.168.43.192/255.255.255.255 i=2 m=311
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[6] 192.168.43.255/255.255.255.255 i=2 m=311
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[7] 224.0.0.0/240.0.0.0 i=1 m=331
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[8] 224.0.0.0/240.0.0.0 i=2 m=311
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[9] 255.255.255.255/255.255.255.255 i=1 m=331
Sun Feb 04 13:45:06 2018 us=418118 GDGR: route[10] 255.255.255.255/255.255.255.255 i=2 m=311
Sun Feb 04 13:45:06 2018 us=418118 GDGR: best=0 lm=55
Sun Feb 04 13:45:06 2018 us=419121 DEBUG: IP Locate: ip=192.168.43.1 nm=255.255.255.0 index=2 count=-1
Sun Feb 04 13:45:06 2018 us=419121 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 I=2 HWADDR=e4:70:b8:10:1c:0b
Sun Feb 04 13:45:06 2018 us=419121 open_tun
Sun Feb 04 13:45:06 2018 us=421125 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C881E576-EF41-4747-8B8C-C11E7A62B46E}.tap
Sun Feb 04 13:45:06 2018 us=421125 TAP-Windows Driver Version 9.21
Sun Feb 04 13:45:06 2018 us=421125 TAP-Windows MTU=1500
Sun Feb 04 13:45:06 2018 us=424131 Set TAP-Windows TUN subnet mode network/local/netmask = 10.1.1.0/10.1.1.2/255.255.255.240 [SUCCEEDED]
Sun Feb 04 13:45:06 2018 us=424131 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.1.1.2/255.255.255.240 on interface {C881E576-EF41-4747-8B8C-C11E7A62B46E} [DHCP-serv: 10.1.1.14, lease-time: 31536000]
Sun Feb 04 13:45:06 2018 us=424131 DHCP option string: 060cc0a8 5401d043 de7bd043 dc7b2c04 c0a85401 2a04c035 676c
Sun Feb 04 13:45:06 2018 us=424131 Successful ARP Flush on interface [18] {C881E576-EF41-4747-8B8C-C11E7A62B46E}
Sun Feb 04 13:45:06 2018 us=436163 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Sun Feb 04 13:45:06 2018 us=436163 MANAGEMENT: >STATE:1517748306,ASSIGN_IP,,10.1.1.2,,,,
Sun Feb 04 13:45:06 2018 us=436163 MTU DYNAMIC mtu=1500, flags=3, 48053 -> 1553
Sun Feb 04 13:45:06 2018 us=436163 UDP WRITE [94] to [AF_INET][public router IP]:4719: P_ACK_V1 kid=0 pid=[ #16 ] [ 9 ]
Sun Feb 04 13:45:06 2018 us=464237 TUN READ [142]
Sun Feb 04 13:45:06 2018 us=464237 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=465241 UDP WRITE [161] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=160
Sun Feb 04 13:45:06 2018 us=476268 TUN READ [76]
Sun Feb 04 13:45:06 2018 us=476268 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=476268 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:06 2018 us=480279 TUN READ [76]
Sun Feb 04 13:45:06 2018 us=481282 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=481282 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:06 2018 us=481282 TUN READ [76]
Sun Feb 04 13:45:06 2018 us=481282 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=481282 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:06 2018 us=482285 TUN READ [80]
Sun Feb 04 13:45:06 2018 us=482285 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=482285 UDP WRITE [105] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=104
Sun Feb 04 13:45:06 2018 us=485293 TUN READ [76]
Sun Feb 04 13:45:06 2018 us=485293 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=485293 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:06 2018 us=493313 TUN READ [76]
Sun Feb 04 13:45:06 2018 us=493313 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=493313 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:06 2018 us=722384 TUN READ [64]
Sun Feb 04 13:45:06 2018 us=722384 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=722384 UDP WRITE [89] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=88
Sun Feb 04 13:45:06 2018 us=722384 TUN READ [48]
Sun Feb 04 13:45:06 2018 us=722384 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=722384 UDP WRITE [73] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=72
Sun Feb 04 13:45:06 2018 us=723392 TUN READ [136]
Sun Feb 04 13:45:06 2018 us=723392 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=723392 UDP WRITE [123] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=122
Sun Feb 04 13:45:06 2018 us=894146 TUN READ [80]
Sun Feb 04 13:45:06 2018 us=894146 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:06 2018 us=894146 UDP WRITE [105] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=104
Sun Feb 04 13:45:07 2018 us=223365 TUN READ [76]
Sun Feb 04 13:45:07 2018 us=223365 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=223365 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:07 2018 us=305387 TUN READ [76]
Sun Feb 04 13:45:07 2018 us=305387 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=305387 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:07 2018 us=306386 TUN READ [76]
Sun Feb 04 13:45:07 2018 us=306386 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=306386 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:07 2018 us=308390 TUN READ [80]
Sun Feb 04 13:45:07 2018 us=309394 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=309394 UDP WRITE [105] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=104
Sun Feb 04 13:45:07 2018 us=465370 TUN READ [142]
Sun Feb 04 13:45:07 2018 us=465370 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=465370 UDP WRITE [162] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=161
Sun Feb 04 13:45:07 2018 us=721510 TUN READ [80]
Sun Feb 04 13:45:07 2018 us=721510 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=722526 UDP WRITE [105] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=104
Sun Feb 04 13:45:07 2018 us=722526 TUN READ [72]
Sun Feb 04 13:45:07 2018 us=722526 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=723525 UDP WRITE [97] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=96
Sun Feb 04 13:45:07 2018 us=724528 TUN READ [56]
Sun Feb 04 13:45:07 2018 us=724528 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=724528 UDP WRITE [81] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=80
Sun Feb 04 13:45:07 2018 us=724528 TUN READ [76]
Sun Feb 04 13:45:07 2018 us=724528 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=724528 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:07 2018 us=725530 TUN READ [76]
Sun Feb 04 13:45:07 2018 us=725530 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=725530 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:07 2018 us=736558 TUN READ [76]
Sun Feb 04 13:45:07 2018 us=736558 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:07 2018 us=736558 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:08 2018 us=136202 TUN READ [76]
Sun Feb 04 13:45:08 2018 us=136202 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:08 2018 us=137215 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:08 2018 us=137215 TUN READ [76]
Sun Feb 04 13:45:08 2018 us=137215 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:08 2018 us=138217 UDP WRITE [101] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=100
Sun Feb 04 13:45:08 2018 us=141229 TUN READ [80]
Sun Feb 04 13:45:08 2018 us=141229 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:08 2018 us=141229 UDP WRITE [105] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=104
Sun Feb 04 13:45:08 2018 us=222457 TUN READ [96]
Sun Feb 04 13:45:08 2018 us=222457 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:08 2018 us=222457 UDP WRITE [121] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=120
Sun Feb 04 13:45:08 2018 us=551601 TUN READ [80]
Sun Feb 04 13:45:08 2018 us=551601 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:08 2018 us=551601 UDP WRITE [105] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=104
Sun Feb 04 13:45:08 2018 us=722462 TUN READ [56]
Sun Feb 04 13:45:08 2018 us=722462 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:08 2018 us=722462 UDP WRITE [81] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=80
Sun Feb 04 13:45:09 2018 us=465423 TUN READ [142]
Sun Feb 04 13:45:09 2018 us=465423 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:09 2018 us=465423 UDP WRITE [162] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=161
Sun Feb 04 13:45:11 2018 us=853747 DEBUG: IP Locate: ip=10.1.1.1 nm=255.255.255.240 index=18 count=1
Sun Feb 04 13:45:11 2018 us=853747 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
Sun Feb 04 13:45:11 2018 us=853747 MANAGEMENT: >STATE:1517748311,ADD_ROUTES,,,,,,
Sun Feb 04 13:45:11 2018 us=854791 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.1.1.1
Sun Feb 04 13:45:11 2018 us=859801 DEBUG: route find if: on_tun=1 count=1 index=18
Sun Feb 04 13:45:11 2018 us=861815 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
Sun Feb 04 13:45:11 2018 us=861815 Route addition via IPAPI succeeded [adaptive]
SYSTEM ROUTING TABLE
0.0.0.0 0.0.0.0 192.168.43.1 p=0 i=2 t=4 pr=3 a=46 h=0 m=55/0/0/0/0
10.1.1.0 255.255.255.240 10.1.1.2 p=0 i=18 t=3 pr=2 a=5 h=0 m=291/0/0/0/0
10.1.1.2 255.255.255.255 10.1.1.2 p=0 i=18 t=3 pr=2 a=5 h=0 m=291/0/0/0/0
10.1.1.15 255.255.255.255 10.1.1.2 p=0 i=18 t=3 pr=2 a=5 h=0 m=291/0/0/0/0
127.0.0.0 255.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=12737 h=0 m=331/0/0/0/0
127.0.0.1 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=12737 h=0 m=331/0/0/0/0
127.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=12737 h=0 m=331/0/0/0/0
192.168.43.0 255.255.255.0 192.168.43.192 p=0 i=2 t=3 pr=2 a=46 h=0 m=311/0/0/0/0
192.168.43.192 255.255.255.255 192.168.43.192 p=0 i=2 t=3 pr=2 a=46 h=0 m=311/0/0/0/0
192.168.43.255 255.255.255.255 192.168.43.192 p=0 i=2 t=3 pr=2 a=46 h=0 m=311/0/0/0/0
192.168.1.0 255.255.255.0 10.1.1.1 p=0 i=18 t=4 pr=3 a=0 h=0 m=35/0/0/0/0
224.0.0.0 240.0.0.0 127.0.0.1 p=0 i=1 t=3 pr=2 a=12737 h=0 m=331/0/0/0/0
224.0.0.0 240.0.0.0 10.1.1.2 p=0 i=18 t=3 pr=2 a=12733 h=0 m=291/0/0/0/0
224.0.0.0 240.0.0.0 192.168.43.192 p=0 i=2 t=3 pr=2 a=12726 h=0 m=311/0/0/0/0
255.255.255.255 255.255.255.255 127.0.0.1 p=0 i=1 t=3 pr=2 a=12737 h=0 m=331/0/0/0/0
255.255.255.255 255.255.255.255 10.1.1.2 p=0 i=18 t=3 pr=2 a=12733 h=0 m=291/0/0/0/0
255.255.255.255 255.255.255.255 192.168.43.192 p=0 i=2 t=3 pr=2 a=12726 h=0 m=311/0/0/0/0
SYSTEM ADAPTER LIST
TAP-Windows Adapter V9
Sun Feb 04 13:45:11 2018 us=867828 NOTE: --mute triggered...
Sun Feb 04 13:45:11 2018 us=899873 31 variation(s) on previous 20 message(s) suppressed by --mute
Sun Feb 04 13:45:11 2018 us=899873 Initialization Sequence Completed
Sun Feb 04 13:45:11 2018 us=899873 MANAGEMENT: >STATE:1517748311,CONNECTED,SUCCESS,10.1.1.2,[public router IP],4719,,
Sun Feb 04 13:45:13 2018 us=466206 TUN READ [142]
Sun Feb 04 13:45:13 2018 us=466206 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:13 2018 us=466206 UDP WRITE [162] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=161
Sun Feb 04 13:45:14 2018 us=90009 TUN READ [96]
Sun Feb 04 13:45:14 2018 us=90009 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:14 2018 us=91011 UDP WRITE [121] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=120
Sun Feb 04 13:45:14 2018 us=112065 TUN READ [72]
Sun Feb 04 13:45:14 2018 us=112065 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:14 2018 us=112065 UDP WRITE [97] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=96
Sun Feb 04 13:45:14 2018 us=147765 UDP READ [146] from [AF_INET][public router IP]:4719: P_DATA_V1 kid=0 DATA len=145
Sun Feb 04 13:45:14 2018 us=147765 TLS: tls_pre_decrypt, key_id=0, IP=[AF_INET][public router IP]:4719
Sun Feb 04 13:45:14 2018 us=147765 PID_TEST [0] [SSL-0] [] 0:0 0:1 t=1517748314[0] r=[0,64,15,0,1] sl=[0,0,64,528]
Sun Feb 04 13:45:14 2018 us=147765 TUN WRITE [124]
Sun Feb 04 13:45:14 2018 us=157616 UDP READ [192] from [AF_INET][public router IP]:4719: P_DATA_V1 kid=0 DATA len=191
Sun Feb 04 13:45:14 2018 us=157616 TLS: tls_pre_decrypt, key_id=0, IP=[AF_INET][public router IP]:4719
Sun Feb 04 13:45:14 2018 us=157616 PID_TEST [0] [SSL-0] [0] 0:1 0:2 t=1517748314[0] r=[0,64,15,0,1] sl=[63,1,64,528]
Sun Feb 04 13:45:14 2018 us=157616 TUN WRITE [170]
Sun Feb 04 13:45:15 2018 us=113228 TUN READ [72]
Sun Feb 04 13:45:15 2018 us=113228 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:15 2018 us=113228 UDP WRITE [97] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=96
Sun Feb 04 13:45:15 2018 us=213042 UDP READ [192] from [AF_INET][public router IP]:4719: P_DATA_V1 kid=0 DATA len=191
Sun Feb 04 13:45:15 2018 us=213042 TLS: tls_pre_decrypt, key_id=0, IP=[AF_INET][public router IP]:4719
Sun Feb 04 13:45:15 2018 us=213042 PID_TEST [0] [SSL-0] [11] 0:2 0:3 t=1517748315[0] r=[-1,64,15,0,1] sl=[62,2,64,528]
Sun Feb 04 13:45:15 2018 us=214064 TUN WRITE [170]
Sun Feb 04 13:45:15 2018 us=589687 TUN READ [96]
Sun Feb 04 13:45:15 2018 us=589687 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:15 2018 us=589687 UDP WRITE [121] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=120
Sun Feb 04 13:45:15 2018 us=648461 UDP READ [146] from [AF_INET][public router IP]:4719: P_DATA_V1 kid=0 DATA len=145
Sun Feb 04 13:45:15 2018 us=648461 TLS: tls_pre_decrypt, key_id=0, IP=[AF_INET][public router IP]:4719
Sun Feb 04 13:45:15 2018 us=648461 PID_TEST [0] [SSL-0] [011] 0:3 0:4 t=1517748315[0] r=[-1,64,15,0,1] sl=[61,3,64,528]
Sun Feb 04 13:45:15 2018 us=648461 TUN WRITE [124]
Sun Feb 04 13:45:16 2018 us=113748 TUN READ [72]
Sun Feb 04 13:45:16 2018 us=113748 TLS: tls_pre_encrypt: key_id=0
Sun Feb 04 13:45:16 2018 us=113748 UDP WRITE [97] to [AF_INET][public router IP]:4719: P_DATA_V2 kid=0 DATA len=96
Sun Feb 04 13:45:16 2018 us=163355 UDP READ [192] from [AF_INET][public router IP]:4719: P_DATA_V1 kid=0 DATA len=191
Sun Feb 04 13:45:16 2018 us=163355 TLS: tls_pre_decrypt, key_id=0, IP=[AF_INET][public router IP]:4719
Sun Feb 04 13:45:16 2018 us=163355 PID_TEST [0] [SSL-0] [1122] 0:4 0:5 t=1517748316[0] r=[-2,64,15,0,1] sl=[60,4,64,528]
Sun Feb 04 13:45:16 2018 us=163355 TUN WRITE [170]
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=804864 TCP/UDP: Closing socket
Sun Feb 04 13:45:16 2018 us=804864 C:\WINDOWS\system32\route.exe DELETE 192.168.1.0 MASK 255.255.255.0 10.1.1.1
Sun Feb 04 13:45:16 2018 us=806869 DEBUG: route find if: on_tun=1 count=1 index=18
Sun Feb 04 13:45:16 2018 us=806869 Route deletion via IPAPI succeeded [adaptive]
Sun Feb 04 13:45:16 2018 us=806869 Closing TUN/TAP interface
Sun Feb 04 13:45:16 2018 us=816897 TAP: DHCP address released
Sun Feb 04 13:45:16 2018 us=816897 Attempting CancelIO on TAP-Windows adapter
Sun Feb 04 13:45:16 2018 us=816897 Attempting close of overlapped read event on TAP-Windows adapter
Sun Feb 04 13:45:16 2018 us=816897 Attempting close of overlapped write event on TAP-Windows adapter
Sun Feb 04 13:45:16 2018 us=816897 Attempting CloseHandle on TAP-Windows adapter
Sun Feb 04 13:45:16 2018 us=817899 PID packet_id_free
Sun Feb 04 13:45:16 2018 us=817899 SIGTERM[hard,] received, process exiting
Sun Feb 04 13:45:16 2018 us=817899 MANAGEMENT: >STATE:1517748316,EXITING,SIGTERM,,,,,
Sun Feb 04 13:45:16 2018 us=817899 PKCS#11: Terminating openssl
Sun Feb 04 13:45:16 2018 us=817899 PKCS#11: Removing providers
Sun Feb 04 13:45:16 2018 us=817899 PKCS#11: Releasing sessions
Sun Feb 04 13:45:16 2018 us=817899 PKCS#11: Terminating slotevent
Sun Feb 04 13:45:16 2018 us=817899 PKCS#11: Marking as uninitialized