2023-01-04 13:18:11 us=513272 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=513297 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=513324 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890: DATA len=26 2023-01-04 13:18:11 us=523203 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=523246 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=523271 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507: DATA len=26 2023-01-04 13:18:11 us=536056 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=536109 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=536136 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:57339: DATA len=26 2023-01-04 13:18:11 us=537084 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=537125 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=537150 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43961: DATA len=26 2023-01-04 13:18:11 us=539523 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=539564 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=539589 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981: DATA len=26 2023-01-04 13:18:11 us=540190 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=540232 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=540258 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744: DATA len=26 2023-01-04 13:18:11 us=541642 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507), accepting new connection. 2023-01-04 13:18:11 us=541679 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=541726 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=541784 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=541807 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=541859 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=541883 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=541930 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=541950 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=541968 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=542028 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=542045 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=542068 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=542096 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=542119 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=545197 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=545251 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [938] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=545291 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=545331 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=545352 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=545381 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:37769: DATA len=26 2023-01-04 13:18:11 us=545460 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=545485 Connection Attempt GET INST BY REAL: 192.168.188.69:33561 [failed] 2023-01-04 13:18:11 us=545506 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:33561: DATA len=26 2023-01-04 13:18:11 us=547104 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=547150 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=547175 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367: DATA len=26 2023-01-04 13:18:11 us=547327 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=547358 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [1161] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507: P_CONTROL_V1 kid=0 [ 1 0 ] pid=2 DATA len=1131 2023-01-04 13:18:11 us=547852 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=547969 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=549299 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_VER=2.6_git 2023-01-04 13:18:11 us=549336 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PLAT=linux 2023-01-04 13:18:11 us=549353 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_TCPNL=1 2023-01-04 13:18:11 us=549369 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_MTU=1600 2023-01-04 13:18:11 us=549389 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_NCP=2 2023-01-04 13:18:11 us=549415 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2023-01-04 13:18:11 us=549435 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PROTO=990 2023-01-04 13:18:11 us=549455 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_LZO_STUB=1 2023-01-04 13:18:11 us=549474 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUB=1 2023-01-04 13:18:11 us=549493 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUBv2=1 2023-01-04 13:18:11 us=550654 2003:d0:270b:a600:215:5dff:fe02:811a TLS: Username/Password authentication succeeded for username 'gremlin39192' [CN SET] 2023-01-04 13:18:11 us=550720 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1441', remote='link-mtu 1541' 2023-01-04 13:18:11 us=550750 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1500' 2023-01-04 13:18:11 us=550868 2003:d0:270b:a600:215:5dff:fe02:811a TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-01-04 13:18:11 us=550894 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=550938 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=550959 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=550983 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=551018 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=551042 2003:d0:270b:a600:215:5dff:fe02:811a TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-01-04 13:18:11 us=551062 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=551099 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [188] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507: P_CONTROL_V1 kid=0 [ 2 1 ] pid=2 DATA len=158 2023-01-04 13:18:11 us=551145 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=551177 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [230] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:51507: P_CONTROL_V1 kid=0 [ 2 1 ] pid=3 DATA len=200 2023-01-04 13:18:11 us=551220 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=551267 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=551292 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=551319 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43986: DATA len=26 2023-01-04 13:18:11 us=551364 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]::ffff:192.168.188.69:33561), accepting new connection. 2023-01-04 13:18:11 us=551389 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=551430 192.168.188.69:33561 Re-using SSL/TLS context 2023-01-04 13:18:11 us=551476 192.168.188.69:33561 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=551506 192.168.188.69:33561 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=551558 192.168.188.69:33561 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=551595 192.168.188.69:33561 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=551645 192.168.188.69:33561 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=551687 192.168.188.69:33561 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=551710 192.168.188.69:33561 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=551774 192.168.188.69:33561 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=551798 192.168.188.69:33561 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=551824 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=551859 192.168.188.69:33561 GET INST BY REAL: 192.168.188.69:33561 [ok] 2023-01-04 13:18:11 us=551889 192.168.188.69:33561 UDPv6 READ [299] from [AF_INET6]::ffff:192.168.188.69:33561: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=553757 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=553810 192.168.188.69:33561 UDPv6 WRITE [938] to [AF_INET6]::ffff:192.168.188.69:33561: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=553853 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=553896 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981), accepting new connection. 2023-01-04 13:18:11 us=553919 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=553958 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=553998 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=554024 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=554070 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=554100 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=554144 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=554169 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=554190 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=554252 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=554283 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=554308 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=554338 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=554363 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=556215 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=556269 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [938] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=556311 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=556350 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=556375 GET INST BY REAL: 192.168.188.69:55106 [failed] 2023-01-04 13:18:11 us=556401 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:55106: DATA len=26 2023-01-04 13:18:11 us=556453 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367), accepting new connection. 2023-01-04 13:18:11 us=556479 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=556516 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=556554 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=556584 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=556632 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=556661 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=556712 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=556746 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=556769 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=556831 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=556854 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=556879 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=556909 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=556937 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=558757 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=558809 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [937] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=911 2023-01-04 13:18:11 us=558849 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=558888 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=558923 GET INST BY REAL: 192.168.188.69:39898 [failed] 2023-01-04 13:18:11 us=558952 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:39898: DATA len=26 2023-01-04 13:18:11 us=558993 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=559019 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=559043 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:52506: DATA len=26 2023-01-04 13:18:11 us=559081 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=559105 Connection Attempt GET INST BY REAL: 192.168.188.69:45696 [failed] 2023-01-04 13:18:11 us=559131 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:45696: DATA len=26 2023-01-04 13:18:11 us=559179 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744), accepting new connection. 2023-01-04 13:18:11 us=559206 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=559252 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=559288 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=559315 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=559362 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=559393 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=559455 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=559491 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=559512 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=559572 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=559594 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=559620 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=559651 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=559698 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=561530 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=561582 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [938] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=561624 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=561666 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890), accepting new connection. 2023-01-04 13:18:11 us=561691 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=561729 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=561769 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=561795 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=561843 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=561881 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=561933 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=561959 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=561980 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=562042 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=562066 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=562091 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=562121 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=562149 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=564001 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=564054 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [939] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=913 2023-01-04 13:18:11 us=564090 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=564124 GET INST BY REAL: 192.168.188.69:33561 [ok] 2023-01-04 13:18:11 us=564150 192.168.188.69:33561 UDPv6 READ [1161] from [AF_INET6]::ffff:192.168.188.69:33561: P_CONTROL_V1 kid=0 [ 1 0 ] pid=2 DATA len=1131 2023-01-04 13:18:11 us=564562 192.168.188.69:33561 VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=564673 192.168.188.69:33561 VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=566000 192.168.188.69:33561 peer info: IV_VER=2.6_git 2023-01-04 13:18:11 us=566036 192.168.188.69:33561 peer info: IV_PLAT=linux 2023-01-04 13:18:11 us=566053 192.168.188.69:33561 peer info: IV_TCPNL=1 2023-01-04 13:18:11 us=566069 192.168.188.69:33561 peer info: IV_MTU=1600 2023-01-04 13:18:11 us=566089 192.168.188.69:33561 peer info: IV_NCP=2 2023-01-04 13:18:11 us=566114 192.168.188.69:33561 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2023-01-04 13:18:11 us=566133 192.168.188.69:33561 peer info: IV_PROTO=990 2023-01-04 13:18:11 us=566152 192.168.188.69:33561 peer info: IV_LZO_STUB=1 2023-01-04 13:18:11 us=566172 192.168.188.69:33561 peer info: IV_COMP_STUB=1 2023-01-04 13:18:11 us=566191 192.168.188.69:33561 peer info: IV_COMP_STUBv2=1 2023-01-04 13:18:11 us=567310 192.168.188.69:33561 TLS: Username/Password authentication succeeded for username 'gremlin39187' [CN SET] 2023-01-04 13:18:11 us=567367 192.168.188.69:33561 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1441', remote='link-mtu 1541' 2023-01-04 13:18:11 us=567390 192.168.188.69:33561 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1500' 2023-01-04 13:18:11 us=567518 192.168.188.69:33561 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-01-04 13:18:11 us=567544 192.168.188.69:33561 PID packet_id_free 2023-01-04 13:18:11 us=567590 192.168.188.69:33561 PID packet_id_free 2023-01-04 13:18:11 us=567611 192.168.188.69:33561 PID packet_id_free 2023-01-04 13:18:11 us=567637 192.168.188.69:33561 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=567692 192.168.188.69:33561 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=567721 192.168.188.69:33561 TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-01-04 13:18:11 us=567749 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=567787 192.168.188.69:33561 UDPv6 WRITE [188] to [AF_INET6]::ffff:192.168.188.69:33561: P_CONTROL_V1 kid=0 [ 2 1 ] pid=2 DATA len=158 2023-01-04 13:18:11 us=567839 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=567870 192.168.188.69:33561 UDPv6 WRITE [230] to [AF_INET6]::ffff:192.168.188.69:33561: P_CONTROL_V1 kid=0 [ 2 1 ] pid=3 DATA len=200 2023-01-04 13:18:11 us=567901 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=567949 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=567974 GET INST BY REAL: 192.168.188.69:33885 [failed] 2023-01-04 13:18:11 us=568001 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:33885: DATA len=26 2023-01-04 13:18:11 us=568043 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=568067 Connection Attempt GET INST BY REAL: 192.168.188.69:42276 [failed] 2023-01-04 13:18:11 us=568093 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:42276: DATA len=26 2023-01-04 13:18:11 us=568133 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=568159 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=568184 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:56577: DATA len=26 2023-01-04 13:18:11 us=568230 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43986), accepting new connection. 2023-01-04 13:18:11 us=568255 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=568297 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=568337 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=568362 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=568410 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=568437 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=568486 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=568511 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=568534 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=568597 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=568622 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=568650 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=568684 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=568711 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43986: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=570560 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=570612 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [936] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43986: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=910 2023-01-04 13:18:11 us=570652 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=570708 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]::ffff:192.168.188.69:55106), accepting new connection. 2023-01-04 13:18:11 us=570734 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=570772 192.168.188.69:55106 Re-using SSL/TLS context 2023-01-04 13:18:11 us=570817 192.168.188.69:55106 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=570843 192.168.188.69:55106 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=570891 192.168.188.69:55106 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=570921 192.168.188.69:55106 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=570970 192.168.188.69:55106 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=571002 192.168.188.69:55106 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=571025 192.168.188.69:55106 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=571088 192.168.188.69:55106 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=571114 192.168.188.69:55106 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=571139 192.168.188.69:55106 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=571168 192.168.188.69:55106 GET INST BY REAL: 192.168.188.69:55106 [ok] 2023-01-04 13:18:11 us=571194 192.168.188.69:55106 UDPv6 READ [299] from [AF_INET6]::ffff:192.168.188.69:55106: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=573056 192.168.188.69:55106 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=573109 192.168.188.69:55106 UDPv6 WRITE [938] to [AF_INET6]::ffff:192.168.188.69:55106: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=573151 192.168.188.69:55106 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=573191 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=573217 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=573243 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:60028: DATA len=26 2023-01-04 13:18:11 us=573283 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=573314 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [1162] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981: P_CONTROL_V1 kid=0 [ 1 0 ] pid=2 DATA len=1132 2023-01-04 13:18:11 us=573724 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=573837 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=575161 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_VER=2.6_git 2023-01-04 13:18:11 us=575199 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PLAT=linux 2023-01-04 13:18:11 us=575221 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_TCPNL=1 2023-01-04 13:18:11 us=575241 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_MTU=1600 2023-01-04 13:18:11 us=575262 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_NCP=2 2023-01-04 13:18:11 us=575283 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2023-01-04 13:18:11 us=575302 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PROTO=990 2023-01-04 13:18:11 us=575323 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_LZO_STUB=1 2023-01-04 13:18:11 us=575342 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUB=1 2023-01-04 13:18:11 us=575363 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUBv2=1 2023-01-04 13:18:11 us=576727 2003:d0:270b:a600:215:5dff:fe02:811a TLS: Username/Password authentication succeeded for username 'gremlin39189' [CN SET] 2023-01-04 13:18:11 us=576794 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1441', remote='link-mtu 1541' 2023-01-04 13:18:11 us=576824 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1500' 2023-01-04 13:18:11 us=576940 2003:d0:270b:a600:215:5dff:fe02:811a TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-01-04 13:18:11 us=576965 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=577010 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=577031 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=577055 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=577092 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=577116 2003:d0:270b:a600:215:5dff:fe02:811a TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-01-04 13:18:11 us=577136 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=577171 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [188] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981: P_CONTROL_V1 kid=0 [ 2 1 ] pid=2 DATA len=158 2023-01-04 13:18:11 us=577218 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=577248 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [230] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49981: P_CONTROL_V1 kid=0 [ 2 1 ] pid=3 DATA len=200 2023-01-04 13:18:11 us=577280 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=577328 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]::ffff:192.168.188.69:45696), accepting new connection. 2023-01-04 13:18:11 us=577352 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=577392 192.168.188.69:45696 Re-using SSL/TLS context 2023-01-04 13:18:11 us=577426 192.168.188.69:45696 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=577452 192.168.188.69:45696 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=577501 192.168.188.69:45696 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=577531 192.168.188.69:45696 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=577582 192.168.188.69:45696 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=577607 192.168.188.69:45696 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=577633 192.168.188.69:45696 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=577700 192.168.188.69:45696 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=577724 192.168.188.69:45696 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=577752 192.168.188.69:45696 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=577784 192.168.188.69:45696 GET INST BY REAL: 192.168.188.69:45696 [ok] 2023-01-04 13:18:11 us=577813 192.168.188.69:45696 UDPv6 READ [299] from [AF_INET6]::ffff:192.168.188.69:45696: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=579715 192.168.188.69:45696 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=579765 192.168.188.69:45696 UDPv6 WRITE [938] to [AF_INET6]::ffff:192.168.188.69:45696: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=579806 192.168.188.69:45696 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=579849 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:57339), accepting new connection. 2023-01-04 13:18:11 us=579881 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=579920 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=579959 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=579986 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=580039 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=580082 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=580129 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=580153 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=580175 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=580238 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=580263 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=580287 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=580321 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=580347 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:57339: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=582180 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=582231 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [938] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:57339: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=582273 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=582316 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=582341 GET INST BY REAL: 192.168.188.69:38917 [failed] 2023-01-04 13:18:11 us=582367 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:38917: DATA len=26 2023-01-04 13:18:11 us=582411 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:52506), accepting new connection. 2023-01-04 13:18:11 us=582435 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=582472 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=582512 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=582538 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=582592 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=582623 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=582671 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=582695 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=582717 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=582792 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=582816 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=582841 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=582871 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=582899 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:52506: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=584759 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=584813 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [938] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:52506: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=584854 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=584895 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=584920 GET INST BY REAL: 192.168.188.69:48361 [failed] 2023-01-04 13:18:11 us=584946 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:48361: DATA len=26 2023-01-04 13:18:11 us=584988 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=585016 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [1162] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367: P_CONTROL_V1 kid=0 [ 1 0 ] pid=2 DATA len=1132 2023-01-04 13:18:11 us=585429 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=585543 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=586878 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_VER=2.6_git 2023-01-04 13:18:11 us=586914 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PLAT=linux 2023-01-04 13:18:11 us=586931 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_TCPNL=1 2023-01-04 13:18:11 us=586947 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_MTU=1600 2023-01-04 13:18:11 us=586967 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_NCP=2 2023-01-04 13:18:11 us=586993 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2023-01-04 13:18:11 us=587014 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PROTO=990 2023-01-04 13:18:11 us=587034 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_LZO_STUB=1 2023-01-04 13:18:11 us=587055 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUB=1 2023-01-04 13:18:11 us=587075 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUBv2=1 2023-01-04 13:18:11 us=588414 2003:d0:270b:a600:215:5dff:fe02:811a TLS: Username/Password authentication succeeded for username 'gremlin39228' [CN SET] 2023-01-04 13:18:11 us=588473 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1441', remote='link-mtu 1541' 2023-01-04 13:18:11 us=588502 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1500' 2023-01-04 13:18:11 us=588625 2003:d0:270b:a600:215:5dff:fe02:811a TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-01-04 13:18:11 us=588652 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=588696 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=588717 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=588742 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=588781 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=588802 2003:d0:270b:a600:215:5dff:fe02:811a TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-01-04 13:18:11 us=588830 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=588866 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [188] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367: P_CONTROL_V1 kid=0 [ 2 1 ] pid=2 DATA len=158 2023-01-04 13:18:11 us=588911 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=588942 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [230] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:49367: P_CONTROL_V1 kid=0 [ 2 1 ] pid=3 DATA len=200 2023-01-04 13:18:11 us=588975 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=589022 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=589048 GET INST BY REAL: 192.168.188.69:46126 [failed] 2023-01-04 13:18:11 us=589074 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:46126: DATA len=26 2023-01-04 13:18:11 us=589122 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]::ffff:192.168.188.69:39898), accepting new connection. 2023-01-04 13:18:11 us=589147 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=589188 192.168.188.69:39898 Re-using SSL/TLS context 2023-01-04 13:18:11 us=589223 192.168.188.69:39898 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=589250 192.168.188.69:39898 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=589296 192.168.188.69:39898 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=589324 192.168.188.69:39898 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=589374 192.168.188.69:39898 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=589402 192.168.188.69:39898 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=589425 192.168.188.69:39898 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=589484 192.168.188.69:39898 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=589506 192.168.188.69:39898 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=589533 192.168.188.69:39898 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=589569 192.168.188.69:39898 GET INST BY REAL: 192.168.188.69:39898 [ok] 2023-01-04 13:18:11 us=589595 192.168.188.69:39898 UDPv6 READ [299] from [AF_INET6]::ffff:192.168.188.69:39898: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=591440 192.168.188.69:39898 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=591521 192.168.188.69:39898 UDPv6 WRITE [937] to [AF_INET6]::ffff:192.168.188.69:39898: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=911 2023-01-04 13:18:11 us=591565 192.168.188.69:39898 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=591610 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=591638 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=591688 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:35677: DATA len=26 2023-01-04 13:18:11 us=591740 Connection Attempt Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=591767 Connection Attempt GET INST BY REAL: 192.168.188.69:53527 [failed] 2023-01-04 13:18:11 us=591791 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]::ffff:192.168.188.69:53527: DATA len=26 2023-01-04 13:18:11 us=591834 Connection Attempt Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43961), accepting new connection. 2023-01-04 13:18:11 us=591866 Connection Attempt MULTI: multi_create_instance called 2023-01-04 13:18:11 us=591912 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=591949 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=591976 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=592027 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=592057 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=592108 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=592139 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=592162 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=592223 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=592246 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=592271 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=592301 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=592328 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43961: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=594158 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=594210 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [937] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:43961: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=911 2023-01-04 13:18:11 us=594246 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=594280 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=594308 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [1163] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744: P_CONTROL_V1 kid=0 [ 1 0 ] pid=2 DATA len=1133 2023-01-04 13:18:11 us=594714 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=594825 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=596192 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_VER=2.6_git 2023-01-04 13:18:11 us=596231 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PLAT=linux 2023-01-04 13:18:11 us=596248 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_TCPNL=1 2023-01-04 13:18:11 us=596264 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_MTU=1600 2023-01-04 13:18:11 us=596284 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_NCP=2 2023-01-04 13:18:11 us=596311 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2023-01-04 13:18:11 us=596332 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PROTO=990 2023-01-04 13:18:11 us=596353 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_LZO_STUB=1 2023-01-04 13:18:11 us=596373 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUB=1 2023-01-04 13:18:11 us=596393 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUBv2=1 2023-01-04 13:18:11 us=597558 2003:d0:270b:a600:215:5dff:fe02:811a TLS: Username/Password authentication succeeded for username 'gremlin39191' [CN SET] 2023-01-04 13:18:11 us=597616 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1441', remote='link-mtu 1541' 2023-01-04 13:18:11 us=597653 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1500' 2023-01-04 13:18:11 us=597771 2003:d0:270b:a600:215:5dff:fe02:811a TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-01-04 13:18:11 us=597796 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=597843 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=597864 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=597889 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=597932 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=597961 2003:d0:270b:a600:215:5dff:fe02:811a TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-01-04 13:18:11 us=597981 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=598017 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [188] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744: P_CONTROL_V1 kid=0 [ 2 1 ] pid=2 DATA len=158 2023-01-04 13:18:11 us=598062 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=598092 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [230] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:44744: P_CONTROL_V1 kid=0 [ 2 1 ] pid=3 DATA len=200 2023-01-04 13:18:11 us=598126 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=598174 Reset packet from client, sending HMAC based reset challenge 2023-01-04 13:18:11 us=598201 GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [failed] 2023-01-04 13:18:11 us=598227 Connection Attempt UDPv6 WRITE [26] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:36226: DATA len=26 2023-01-04 13:18:11 us=598263 Connection Attempt GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=598292 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [1161] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890: P_CONTROL_V1 kid=0 [ 1 0 ] pid=2 DATA len=1131 2023-01-04 13:18:11 us=598713 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=598826 2003:d0:270b:a600:215:5dff:fe02:811a VERIFY OK: depth=0, CN=focal-as 2023-01-04 13:18:11 us=600184 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_VER=2.6_git 2023-01-04 13:18:11 us=600223 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PLAT=linux 2023-01-04 13:18:11 us=600245 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_TCPNL=1 2023-01-04 13:18:11 us=600262 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_MTU=1600 2023-01-04 13:18:11 us=600284 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_NCP=2 2023-01-04 13:18:11 us=600302 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305 2023-01-04 13:18:11 us=600324 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_PROTO=990 2023-01-04 13:18:11 us=600344 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_LZO_STUB=1 2023-01-04 13:18:11 us=600364 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUB=1 2023-01-04 13:18:11 us=600382 2003:d0:270b:a600:215:5dff:fe02:811a peer info: IV_COMP_STUBv2=1 2023-01-04 13:18:11 us=601791 2003:d0:270b:a600:215:5dff:fe02:811a TLS: Username/Password authentication succeeded for username 'gremlin39188' [CN SET] 2023-01-04 13:18:11 us=601847 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1441', remote='link-mtu 1541' 2023-01-04 13:18:11 us=601876 2003:d0:270b:a600:215:5dff:fe02:811a WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1400', remote='tun-mtu 1500' 2023-01-04 13:18:11 us=601993 2003:d0:270b:a600:215:5dff:fe02:811a TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-01-04 13:18:11 us=602018 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=602073 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=602095 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_free 2023-01-04 13:18:11 us=602120 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=602161 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=602188 2003:d0:270b:a600:215:5dff:fe02:811a TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-01-04 13:18:11 us=602209 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=602244 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [188] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890: P_CONTROL_V1 kid=0 [ 2 1 ] pid=2 DATA len=158 2023-01-04 13:18:11 us=602290 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=602321 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [230] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:59890: P_CONTROL_V1 kid=0 [ 2 1 ] pid=3 DATA len=200 2023-01-04 13:18:11 us=602355 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=602405 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:37769), accepting new connection. 2023-01-04 13:18:11 us=602428 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=602469 2003:d0:270b:a600:215:5dff:fe02:811a Re-using SSL/TLS context 2023-01-04 13:18:11 us=602503 2003:d0:270b:a600:215:5dff:fe02:811a MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=602535 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=602577 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=602607 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=602665 2003:d0:270b:a600:215:5dff:fe02:811a PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=602698 2003:d0:270b:a600:215:5dff:fe02:811a Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=602722 2003:d0:270b:a600:215:5dff:fe02:811a Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=602785 2003:d0:270b:a600:215:5dff:fe02:811a Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=602810 2003:d0:270b:a600:215:5dff:fe02:811a Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=602838 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=602873 2003:d0:270b:a600:215:5dff:fe02:811a GET INST BY REAL: 2003:d0:270b:a600:215:5dff:fe02:811a [ok] 2023-01-04 13:18:11 us=602901 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 READ [299] from [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:37769: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=604770 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=604824 2003:d0:270b:a600:215:5dff:fe02:811a UDPv6 WRITE [938] to [AF_INET6]2003:d0:270b:a600:215:5dff:fe02:811a:37769: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=604867 2003:d0:270b:a600:215:5dff:fe02:811a dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=604916 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]::ffff:192.168.188.69:33885), accepting new connection. 2023-01-04 13:18:11 us=604942 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=604982 192.168.188.69:33885 Re-using SSL/TLS context 2023-01-04 13:18:11 us=605025 192.168.188.69:33885 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=605060 192.168.188.69:33885 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=605108 192.168.188.69:33885 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=605138 192.168.188.69:33885 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=605188 192.168.188.69:33885 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=605212 192.168.188.69:33885 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=605234 192.168.188.69:33885 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=605294 192.168.188.69:33885 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=605322 192.168.188.69:33885 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=605349 192.168.188.69:33885 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=605385 192.168.188.69:33885 GET INST BY REAL: 192.168.188.69:33885 [ok] 2023-01-04 13:18:11 us=605414 192.168.188.69:33885 UDPv6 READ [299] from [AF_INET6]::ffff:192.168.188.69:33885: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=607232 192.168.188.69:33885 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=607285 192.168.188.69:33885 UDPv6 WRITE [939] to [AF_INET6]::ffff:192.168.188.69:33885: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=913 2023-01-04 13:18:11 us=607322 192.168.188.69:33885 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=607365 Valid packet (P_CONTROL_V1) with HMAC challenge from peer ([AF_INET6]::ffff:192.168.188.69:42276), accepting new connection. 2023-01-04 13:18:11 us=607390 MULTI: multi_create_instance called 2023-01-04 13:18:11 us=607428 192.168.188.69:42276 Re-using SSL/TLS context 2023-01-04 13:18:11 us=607477 192.168.188.69:42276 MTU: adding 426 buffer tailroom for compression for 1768 bytes of payload 2023-01-04 13:18:11 us=607506 192.168.188.69:42276 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=607557 192.168.188.69:42276 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=607589 192.168.188.69:42276 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=607634 192.168.188.69:42276 PID packet_id_init seq_backtrack=64 time_backtrack=15 2023-01-04 13:18:11 us=607677 192.168.188.69:42276 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ] 2023-01-04 13:18:11 us=607704 192.168.188.69:42276 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1400 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ] 2023-01-04 13:18:11 us=607767 192.168.188.69:42276 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-server' 2023-01-04 13:18:11 us=607790 192.168.188.69:42276 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1441,tun-mtu 1400,proto UDPv4,auth SHA1,keysize 128,key-method 2,tls-client' 2023-01-04 13:18:11 us=607817 192.168.188.69:42276 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=607849 192.168.188.69:42276 GET INST BY REAL: 192.168.188.69:42276 [ok] 2023-01-04 13:18:11 us=607877 192.168.188.69:42276 UDPv6 READ [299] from [AF_INET6]::ffff:192.168.188.69:42276: P_CONTROL_V1 kid=0 [ 0 ] pid=1 DATA len=273 2023-01-04 13:18:11 us=609698 192.168.188.69:42276 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=609750 192.168.188.69:42276 UDPv6 WRITE [938] to [AF_INET6]::ffff:192.168.188.69:42276: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=912 2023-01-04 13:18:11 us=609791 192.168.188.69:42276 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=609824 GET INST BY REAL: 192.168.188.69:33561 [ok] 2023-01-04 13:18:11 us=609860 192.168.188.69:33561 UDPv6 READ [30] from [AF_INET6]::ffff:192.168.188.69:33561: P_ACK_V1 kid=0 [ 2 1 0 ] DATA len=0 2023-01-04 13:18:11 us=609897 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=609930 GET INST BY REAL: 192.168.188.69:33561 [ok] 2023-01-04 13:18:11 us=609954 192.168.188.69:33561 UDPv6 READ [34] from [AF_INET6]::ffff:192.168.188.69:33561: P_ACK_V1 kid=0 [ 3 2 1 0 ] DATA len=0 2023-01-04 13:18:11 us=609987 192.168.188.69:33561 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 384 bit EC, curve secp384r1, signature: ecdsa-with-SHA256 2023-01-04 13:18:11 us=610019 192.168.188.69:33561 [gremlin39187] Peer Connection Initiated with [AF_INET6]::ffff:192.168.188.69:33561 2023-01-04 13:18:11 us=610051 192.168.188.69:33561 dco_update_keys: peer_id=-1 2023-01-04 13:18:11 us=610165 gremlin39187/192.168.188.69:33561 MULTI_sva: pool returned IPv4=10.33.0.2, IPv6=fd00:f00f::1001 2023-01-04 13:18:11 us=610232 gremlin39187/192.168.188.69:33561 MULTI: Learn: 10.33.0.2 -> gremlin39187/192.168.188.69:33561 2023-01-04 13:18:11 us=610255 gremlin39187/192.168.188.69:33561 MULTI: primary virtual IP for gremlin39187/192.168.188.69:33561: 10.33.0.2 2023-01-04 13:18:11 us=610277 gremlin39187/192.168.188.69:33561 MULTI: Learn: fd00:f00f::1001 -> gremlin39187/192.168.188.69:33561 2023-01-04 13:18:11 us=610300 gremlin39187/192.168.188.69:33561 MULTI: primary virtual IPv6 for gremlin39187/192.168.188.69:33561: fd00:f00f::1001 2023-01-04 13:18:11 us=610327 gremlin39187/192.168.188.69:33561 dco_new_peer: peer-id 1, fd 5, remote addr: [AF_INET6]::ffff:192.168.188.69:33561