Skip to content

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Connection stops working after a while #1599

Closed
SoNic1967 opened this issue Mar 24, 2023 · 7 comments
Closed

Connection stops working after a while #1599

SoNic1967 opened this issue Mar 24, 2023 · 7 comments

Comments

@SoNic1967
Copy link

#/To make issues more manageable, I would appreciate it if you fill out the following details as applicable:

General information

  1. Android Version 13
  2. Android Vendor/Custom ROM
  3. Device Samsung S22+
  4. Version of the app (version number/play store version/self-built Google Store

Description of the issue

Log (if applicable)

2023-03-24 15:10:02 official build 0.7.43 running on samsung SM-S906U1 (taro), Android 13 (TP1A.220624.014) API 33, ABI arm64-v8a, (samsung/g0quew/g0q:13/TP1A.220624.014/S906U1UES2CWB7:user/release-keys)
2023-03-24 15:10:02 Building configuration…
2023-03-24 15:10:02 Fetched VPN profile (SoNic) triggered by main profile list
2023-03-24 15:10:02 started Socket Thread
2023-03-24 15:10:02 P:WARNING: linker: Warning: "/data/app/~~AsLcFZ-lHEV6Zc_tRBg7NA==/de.blinkt.openvpn-XNbyQS_Ctv3IkP2Nwu7xbQ==/lib/arm64/libovpnexec.so" is not a directory (ignoring)
2023-03-24 15:10:02 Network Status: CONNECTED  to WIFI 
2023-03-24 15:10:02 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:10:02 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:10:02 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2023-03-24 15:10:02 Unrecognized option or missing or extra parameter(s) in stdin:98: block-outside-dns (2.7_master)
2023-03-24 15:10:02 Current Parameter Settings:
2023-03-24 15:10:02   config = 'stdin'
2023-03-24 15:10:02   mode = 0
2023-03-24 15:10:02   show_ciphers = DISABLED
2023-03-24 15:10:02   show_digests = DISABLED
2023-03-24 15:10:02   show_engines = DISABLED
2023-03-24 15:10:02   genkey = DISABLED
2023-03-24 15:10:02   genkey_filename = '[UNDEF]'
2023-03-24 15:10:02   key_pass_file = '[UNDEF]'
2023-03-24 15:10:02   show_tls_ciphers = DISABLED
2023-03-24 15:10:02   connect_retry_max = 0
2023-03-24 15:10:02 Connection profiles [0]:
2023-03-24 15:10:02   proto = udp
2023-03-24 15:10:02   local = '[UNDEF]'
2023-03-24 15:10:02   local_port = '[UNDEF]'
2023-03-24 15:10:02   remote = '100.4.104.240'
2023-03-24 15:10:02   remote_port = '1194'
2023-03-24 15:10:02   remote_float = DISABLED
2023-03-24 15:10:02   bind_defined = DISABLED
2023-03-24 15:10:02   bind_local = DISABLED
2023-03-24 15:10:02   bind_ipv6_only = DISABLED
2023-03-24 15:10:02   connect_retry_seconds = 2
2023-03-24 15:10:02   connect_timeout = 120
2023-03-24 15:10:02   socks_proxy_server = '[UNDEF]'
2023-03-24 15:10:02   socks_proxy_port = '[UNDEF]'
2023-03-24 15:10:02   tun_mtu = 1500
2023-03-24 15:10:02   tun_mtu_defined = ENABLED
2023-03-24 15:10:02   link_mtu = 1500
2023-03-24 15:10:02   link_mtu_defined = DISABLED
2023-03-24 15:10:02   tun_mtu_extra = 0
2023-03-24 15:10:02   tun_mtu_extra_defined = DISABLED
2023-03-24 15:10:02   tls_mtu = 1250
2023-03-24 15:10:02   mtu_discover_type = -1
2023-03-24 15:10:02   fragment = 0
2023-03-24 15:10:02   mssfix = 1280
2023-03-24 15:10:02   mssfix_encap = DISABLED
2023-03-24 15:10:02   mssfix_fixed = DISABLED
2023-03-24 15:10:02   explicit_exit_notification = 1
2023-03-24 15:10:02   tls_auth_file = '[UNDEF]'
2023-03-24 15:10:02   key_direction = not set
2023-03-24 15:10:02   tls_crypt_file = '[INLINE]'
2023-03-24 15:10:02   tls_crypt_v2_file = '[UNDEF]'
2023-03-24 15:10:02 Connection profiles END
2023-03-24 15:10:02   remote_random = DISABLED
2023-03-24 15:10:02   ipchange = '[UNDEF]'
2023-03-24 15:10:02   dev = 'tun'
2023-03-24 15:10:02   dev_type = '[UNDEF]'
2023-03-24 15:10:02   dev_node = '[UNDEF]'
2023-03-24 15:10:02   lladdr = '[UNDEF]'
2023-03-24 15:10:02   topology = 1
2023-03-24 15:10:02   ifconfig_local = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_remote_netmask = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_noexec = DISABLED
2023-03-24 15:10:02   ifconfig_nowarn = ENABLED
2023-03-24 15:10:02   ifconfig_ipv6_local = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_ipv6_netbits = 0
2023-03-24 15:10:02   ifconfig_ipv6_remote = '[UNDEF]'
2023-03-24 15:10:02   shaper = 0
2023-03-24 15:10:02   mtu_test = 0
2023-03-24 15:10:02   mlock = DISABLED
2023-03-24 15:10:02   keepalive_ping = 0
2023-03-24 15:10:02   keepalive_timeout = 0
2023-03-24 15:10:02   inactivity_timeout = 0
2023-03-24 15:10:02   session_timeout = 0
2023-03-24 15:10:02   inactivity_minimum_bytes = 0
2023-03-24 15:10:02   ping_send_timeout = 0
2023-03-24 15:10:02   ping_rec_timeout = 0
2023-03-24 15:10:02   ping_rec_timeout_action = 0
2023-03-24 15:10:02   ping_timer_remote = DISABLED
2023-03-24 15:10:02   remap_sigusr1 = 0
2023-03-24 15:10:02   persist_tun = ENABLED
2023-03-24 15:10:02   persist_local_ip = DISABLED
2023-03-24 15:10:02   persist_remote_ip = DISABLED
2023-03-24 15:10:02   persist_key = DISABLED
2023-03-24 15:10:02   passtos = DISABLED
2023-03-24 15:10:02   resolve_retry_seconds = 1000000000
2023-03-24 15:10:02   resolve_in_advance = ENABLED
2023-03-24 15:10:02   username = '[UNDEF]'
2023-03-24 15:10:02   groupname = '[UNDEF]'
2023-03-24 15:10:02   chroot_dir = '[UNDEF]'
2023-03-24 15:10:02   cd_dir = '[UNDEF]'
2023-03-24 15:10:02   writepid = '[UNDEF]'
2023-03-24 15:10:02   up_script = '[UNDEF]'
2023-03-24 15:10:02   down_script = '[UNDEF]'
2023-03-24 15:10:02   down_pre = DISABLED
2023-03-24 15:10:02   up_restart = DISABLED
2023-03-24 15:10:02   up_delay = DISABLED
2023-03-24 15:10:02   daemon = DISABLED
2023-03-24 15:10:02   log = DISABLED
2023-03-24 15:10:02   suppress_timestamps = DISABLED
2023-03-24 15:10:02   machine_readable_output = ENABLED
2023-03-24 15:10:02   nice = 0
2023-03-24 15:10:02   verbosity = 4
2023-03-24 15:10:02   mute = 0
2023-03-24 15:10:02   gremlin = 0
2023-03-24 15:10:02   status_file = '[UNDEF]'
2023-03-24 15:10:02   status_file_version = 1
2023-03-24 15:10:02   status_file_update_freq = 60
2023-03-24 15:10:02   occ = ENABLED
2023-03-24 15:10:02   rcvbuf = 0
2023-03-24 15:10:02   sndbuf = 0
2023-03-24 15:10:02   sockflags = 0
2023-03-24 15:10:02   fast_io = DISABLED
2023-03-24 15:10:02   comp.alg = 2
2023-03-24 15:10:02   comp.flags = 1
2023-03-24 15:10:02   route_script = '[UNDEF]'
2023-03-24 15:10:02   route_default_gateway = '[UNDEF]'
2023-03-24 15:10:02   route_default_metric = 0
2023-03-24 15:10:02   route_noexec = DISABLED
2023-03-24 15:10:02   route_delay = 0
2023-03-24 15:10:02   route_delay_window = 30
2023-03-24 15:10:02   route_delay_defined = DISABLED
2023-03-24 15:10:02   route_nopull = DISABLED
2023-03-24 15:10:02   route_gateway_via_dhcp = DISABLED
2023-03-24 15:10:02   allow_pull_fqdn = DISABLED
2023-03-24 15:10:02   management_addr = '/data/user/0/de.blinkt.openvpn/cache/mgmtsocket'
2023-03-24 15:10:02   management_port = 'unix'
2023-03-24 15:10:02   management_user_pass = '[UNDEF]'
2023-03-24 15:10:02   management_log_history_cache = 250
2023-03-24 15:10:02   management_echo_buffer_size = 100
2023-03-24 15:10:02   management_client_user = '[UNDEF]'
2023-03-24 15:10:02   management_client_group = '[UNDEF]'
2023-03-24 15:10:02   management_flags = 16678
2023-03-24 15:10:02   shared_secret_file = '[UNDEF]'
2023-03-24 15:10:02 Waiting 0s seconds between connection attempt
2023-03-24 15:10:02   key_direction = not set
2023-03-24 15:10:02   ciphername = 'AES-128-GCM'
2023-03-24 15:10:02   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-03-24 15:10:02   authname = 'SHA256'
2023-03-24 15:10:02   engine = DISABLED
2023-03-24 15:10:02   replay = ENABLED
2023-03-24 15:10:02   mute_replay_warnings = DISABLED
2023-03-24 15:10:02   replay_window = 64
2023-03-24 15:10:02   replay_time = 15
2023-03-24 15:10:02   packet_id_file = '[UNDEF]'
2023-03-24 15:10:02   test_crypto = DISABLED
2023-03-24 15:10:02   tls_server = DISABLED
2023-03-24 15:10:02   tls_client = ENABLED
2023-03-24 15:10:02   ca_file = '[INLINE]'
2023-03-24 15:10:02   ca_path = '[UNDEF]'
2023-03-24 15:10:02   dh_file = '[UNDEF]'
2023-03-24 15:10:02   cert_file = '[INLINE]'
2023-03-24 15:10:02   extra_certs_file = '[UNDEF]'
2023-03-24 15:10:02   priv_key_file = '[INLINE]'
2023-03-24 15:10:02   pkcs12_file = '[UNDEF]'
2023-03-24 15:10:02   cipher_list = 'TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256'
2023-03-24 15:10:02   cipher_list_tls13 = '[UNDEF]'
2023-03-24 15:10:02   tls_cert_profile = 'preferred'
2023-03-24 15:10:02   tls_verify = '[UNDEF]'
2023-03-24 15:10:02   tls_export_cert = '[UNDEF]'
2023-03-24 15:10:02   verify_x509_type = 2
2023-03-24 15:10:02   verify_x509_name = 'server_ZDHyQuID7WZoiOE8'
2023-03-24 15:10:02   crl_file = '[UNDEF]'
2023-03-24 15:10:02   ns_cert_type = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 65535
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_eku = 'TLS Web Server Authentication'
2023-03-24 15:10:02   ssl_flags = 192
2023-03-24 15:10:02   tls_timeout = 2
2023-03-24 15:10:02   renegotiate_bytes = -1
2023-03-24 15:10:02   renegotiate_packets = 0
2023-03-24 15:10:02   renegotiate_seconds = 3600
2023-03-24 15:10:02   handshake_window = 60
2023-03-24 15:10:02   transition_window = 3600
2023-03-24 15:10:02   single_session = DISABLED
2023-03-24 15:10:02   push_peer_info = ENABLED
2023-03-24 15:10:02   tls_exit = DISABLED
2023-03-24 15:10:02   tls_crypt_v2_metadata = '[UNDEF]'
2023-03-24 15:10:02   server_network = 0.0.0.0
2023-03-24 15:10:02   server_netmask = 0.0.0.0
2023-03-24 15:10:02   server_network_ipv6 = ::
2023-03-24 15:10:02   server_netbits_ipv6 = 0
2023-03-24 15:10:02   server_bridge_ip = 0.0.0.0
2023-03-24 15:10:02   server_bridge_netmask = 0.0.0.0
2023-03-24 15:10:02   server_bridge_pool_start = 0.0.0.0
2023-03-24 15:10:02   server_bridge_pool_end = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_defined = DISABLED
2023-03-24 15:10:02   ifconfig_pool_start = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_end = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_netmask = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_persist_filename = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_pool_persist_refresh_freq = 600
2023-03-24 15:10:02   ifconfig_ipv6_pool_defined = DISABLED
2023-03-24 15:10:02   ifconfig_ipv6_pool_base = ::
2023-03-24 15:10:02   ifconfig_ipv6_pool_netbits = 0
2023-03-24 15:10:02   n_bcast_buf = 256
2023-03-24 15:10:02   tcp_queue_limit = 64
2023-03-24 15:10:02   real_hash_size = 256
2023-03-24 15:10:02   virtual_hash_size = 256
2023-03-24 15:10:02   client_connect_script = '[UNDEF]'
2023-03-24 15:10:02   learn_address_script = '[UNDEF]'
2023-03-24 15:10:02   client_disconnect_script = '[UNDEF]'
2023-03-24 15:10:02   client_crresponse_script = '[UNDEF]'
2023-03-24 15:10:02   client_config_dir = '[UNDEF]'
2023-03-24 15:10:02   ccd_exclusive = DISABLED
2023-03-24 15:10:02   tmp_dir = '/data/data/de.blinkt.openvpn/cache'
2023-03-24 15:10:02   push_ifconfig_defined = DISABLED
2023-03-24 15:10:02   push_ifconfig_local = 0.0.0.0
2023-03-24 15:10:02   push_ifconfig_remote_netmask = 0.0.0.0
2023-03-24 15:10:02   push_ifconfig_ipv6_defined = DISABLED
2023-03-24 15:10:02   push_ifconfig_ipv6_local = ::/0
2023-03-24 15:10:02   push_ifconfig_ipv6_remote = ::
2023-03-24 15:10:02   enable_c2c = DISABLED
2023-03-24 15:10:02   duplicate_cn = DISABLED
2023-03-24 15:10:02   cf_max = 0
2023-03-24 15:10:02   cf_per = 0
2023-03-24 15:10:02   max_clients = 1024
2023-03-24 15:10:02   max_routes_per_client = 256
2023-03-24 15:10:02   auth_user_pass_verify_script = '[UNDEF]'
2023-03-24 15:10:02   auth_user_pass_verify_script_via_file = DISABLED
2023-03-24 15:10:02   auth_token_generate = DISABLED
2023-03-24 15:10:02   auth_token_lifetime = 0
2023-03-24 15:10:02   auth_token_secret_file = '[UNDEF]'
2023-03-24 15:10:02   port_share_host = '[UNDEF]'
2023-03-24 15:10:02   port_share_port = '[UNDEF]'
2023-03-24 15:10:02   vlan_tagging = DISABLED
2023-03-24 15:10:02   vlan_accept = all
2023-03-24 15:10:02   vlan_pvid = 1
2023-03-24 15:10:02   client = ENABLED
2023-03-24 15:10:02   pull = ENABLED
2023-03-24 15:10:02   auth_user_pass_file = '[UNDEF]'
2023-03-24 15:10:02 OpenVPN 2.7-icsopenvpn [git:icsopenvpn/v0.7.43-0-gd861a123] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 14 2022
2023-03-24 15:10:02 library versions: OpenSSL 3.0.7 1 Nov 2022, LZO 2.10
2023-03-24 15:10:02 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket
2023-03-24 15:10:02 MANAGEMENT: CMD 'version 3'
2023-03-24 15:10:02 MANAGEMENT: CMD 'hold release'
2023-03-24 15:10:02 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:10:02 MANAGEMENT: CMD 'state on'
2023-03-24 15:10:02 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:10:03 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:10:03 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:10:03 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:10:03 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:10:03 LZO compression initializing
2023-03-24 15:10:03 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:10:03 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:10:03 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:10:03 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:10:03 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:10:03 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:10:03 UDPv4 link local: (not bound)
2023-03-24 15:10:03 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,WAIT,,,,,,
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,AUTH,,,,,,
2023-03-24 15:10:03 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=e1a07889 9aaac046
2023-03-24 15:10:03 PID_ERR replay-window backtrack occurred [1] [TLS_WRAP-0] [0_000] 1679685003:5 1679685003:4 t=1679685003[0] r=[0,64,15,1,1] sl=[59,5,64,528]
2023-03-24 15:10:03 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:10:03 VERIFY KU OK
2023-03-24 15:10:03 Validating certificate extended key usage
2023-03-24 15:10:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:10:03 VERIFY EKU OK
2023-03-24 15:10:03 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:10:03 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:10:03 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:10:03 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:10:03 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:10:03 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:10:03 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:10:03 OPTIONS IMPORT: route options modified
2023-03-24 15:10:03 OPTIONS IMPORT: route-related options modified
2023-03-24 15:10:03 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:10:03 OPTIONS IMPORT: peer-id set
2023-03-24 15:10:03 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:10:03 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:10:03 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:10:03 Opening tun interface:
2023-03-24 15:10:03 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:10:03 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:10:03 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:10:03 Routes excluded: 10.10.98.170/20 fe80:0:0:0:6490:98ff:fe19:4a88/64
2023-03-24 15:10:03 Disallowed VPN apps: app.aawireless
2023-03-24 15:10:03 Apps may bypass VPN
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:10:03 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:10:03 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:10:03 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:10:03 Initialization Sequence Completed
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:10:03 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:10:04 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_000000000000000000001] 0:23 0:22 t=1679685004[0] r=[-1,64,15,1,1] sl=[41,23,64,528]
2023-03-24 15:10:05 PID_ERR replay-window backtrack occurred [6] [SSL-0] [0__00__000000000000000011111111111111111111111111111111111111111] 0:74 0:68 t=1679685005[0] r=[-2,64,15,6,1] sl=[54,64,64,528]
2023-03-24 15:10:11 PID_ERR replay-window backtrack occurred [7] [SSL-0] [0___0___00000000000000000000000000000000000000000000000000000000] 0:716 0:709 t=1679685011[0] r=[-3,64,15,7,1] sl=[52,64,64,528]
2023-03-24 15:10:13 PID_ERR replay-window backtrack occurred [11] [SSL-0] [0_0__00_000_0000000000000000000000000000000000000000000000000000] 0:1171 0:1160 t=1679685013[0] r=[0,64,15,11,1] sl=[45,64,64,528]
2023-03-24 15:10:15 PID_ERR replay-window backtrack occurred [16] [SSL-0] [0__00_0__00__00__00000000111111111111111111111111111111111111111] 0:1750 0:1734 t=1679685015[0] r=[-2,64,15,16,1] sl=[42,64,64,528]
2023-03-24 15:10:15 PID_ERR replay-window backtrack occurred [21] [SSL-0] [0___0_____00__00__00__000000000000000000000000011111111111111111] 0:1772 0:1751 t=1679685015[0] r=[-2,64,15,21,1] sl=[20,64,64,528]
2023-03-24 15:10:19 PID_ERR replay-window backtrack occurred [36] [SSL-0] [00__00__00___00__00__00__00___00__00__00000000000000000000000000] 0:2649 0:2613 t=1679685019[0] r=[-1,64,15,36,1] sl=[39,64,64,528]
2023-03-24 15:10:19 PID_ERR replay-window backtrack occurred [37] [SSL-0] [00__00__00___000_000_000_0000_000_000_00000000000000000000000000] 0:2649 0:2612 t=1679685019[0] r=[-1,64,15,37,1] sl=[39,64,64,528]
2023-03-24 15:10:19 PID_ERR replay-window backtrack occurred [39] [SSL-0] [0___0___0___0__00__00__0_00__00__00__00_000000000000000000000000] 0:2806 0:2767 t=1679685019[0] r=[-1,64,15,39,1] sl=[10,64,64,528]
2023-03-24 15:16:37 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:16:37 TCP/UDP: Closing socket
2023-03-24 15:16:37 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:16:37 MANAGEMENT: >STATE:1679685397,RECONNECTING,ping-restart,,,,,
2023-03-24 15:16:37 Waiting 2s seconds between connection attempt
2023-03-24 15:16:39 MANAGEMENT: CMD 'hold release'
2023-03-24 15:16:39 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:16:39 MANAGEMENT: CMD 'state on'
2023-03-24 15:16:39 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:16:40 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:16:40 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:16:40 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:16:40 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:16:40 LZO compression initializing
2023-03-24 15:16:40 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:16:40 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:16:40 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:16:40 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:16:40 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:16:40 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:16:40 UDPv4 link local: (not bound)
2023-03-24 15:16:40 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:16:40 MANAGEMENT: >STATE:1679685400,WAIT,,,,,,
2023-03-24 15:16:40 MANAGEMENT: >STATE:1679685400,AUTH,,,,,,
2023-03-24 15:16:40 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=2a504387 51930cf8
2023-03-24 15:16:40 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:16:40 VERIFY KU OK
2023-03-24 15:16:40 Validating certificate extended key usage
2023-03-24 15:16:40 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:16:40 VERIFY EKU OK
2023-03-24 15:16:40 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:16:40 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:16:40 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:16:40 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:16:40 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:16:40 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:16:40 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:16:40 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:16:40 OPTIONS IMPORT: route options modified
2023-03-24 15:16:40 OPTIONS IMPORT: route-related options modified
2023-03-24 15:16:40 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:16:40 OPTIONS IMPORT: peer-id set
2023-03-24 15:16:40 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:16:40 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:16:40 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:16:40 MANAGEMENT: >STATE:1679685400,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:16:40 Opening tun interface:
2023-03-24 15:16:41 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:16:41 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:16:41 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:16:41 Routes excluded: 10.10.98.170/20 fe80:0:0:0:6490:98ff:fe19:4a88/64
2023-03-24 15:16:41 Disallowed VPN apps: app.aawireless
2023-03-24 15:16:41 Apps may bypass VPN
2023-03-24 15:16:41 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:16:41 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:16:41 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:16:41 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:16:41 Initialization Sequence Completed
2023-03-24 15:16:41 MANAGEMENT: >STATE:1679685401,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:16:41 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_] 0:2 0:1 t=1679685401[0] r=[0,64,15,1,1] sl=[62,2,64,528]
2023-03-24 15:16:41 PID_ERR replay-window backtrack occurred [2] [SSL-0] [0__0000000000000] 0:16 0:14 t=1679685401[0] r=[0,64,15,2,1] sl=[48,16,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [3] [SSL-0] [00__000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:83 0:80 t=1679685526[0] r=[0,64,15,3,1] sl=[45,64,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [5] [SSL-0] [0___0___00000000000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEE] 0:95 0:90 t=1679685526[0] r=[0,64,15,5,1] sl=[33,64,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [6] [SSL-0] [0___00__00000000000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEE] 0:95 0:89 t=1679685526[0] r=[0,64,15,6,1] sl=[33,64,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [7] [SSL-0] [0_0_000_00000000000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEE] 0:95 0:88 t=1679685526[0] r=[0,64,15,7,1] sl=[33,64,64,528]
2023-03-24 15:18:48 PID_ERR replay-window backtrack occurred [9] [SSL-0] [0_000_000_000000000000000000000000000000000000000000000000000000] 0:537 0:528 t=1679685528[0] r=[-2,64,15,9,1] sl=[39,64,64,528]
2023-03-24 15:20:24 Network Status: not connected
2023-03-24 15:20:24 Debug state info: not connected, pause: userPause, shouldbeconnected: false, network: PENDINGDISCONNECT 
2023-03-24 15:20:24 write UDPv4 []: Network is unreachable (fd=4,code=101)
2023-03-24 15:20:24 write UDPv4 []: Network is unreachable (fd=4,code=101)
2023-03-24 15:20:24 Network Status: CONNECTED LTE to MOBILE TRACFONE.VZWENTP
2023-03-24 15:20:24 Debug state info: CONNECTED LTE to MOBILE TRACFONE.VZWENTP, pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:20:24 MANAGEMENT: CMD 'network-change'
2023-03-24 15:24:13 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:24:13 TCP/UDP: Closing socket
2023-03-24 15:24:13 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:24:13 MANAGEMENT: >STATE:1679685853,RECONNECTING,ping-restart,,,,,
2023-03-24 15:24:13 Waiting 2s seconds between connection attempt
2023-03-24 15:24:15 MANAGEMENT: CMD 'hold release'
2023-03-24 15:24:15 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:24:15 MANAGEMENT: CMD 'state on'
2023-03-24 15:24:15 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:24:16 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:24:16 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:24:16 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:24:16 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:24:16 LZO compression initializing
2023-03-24 15:24:16 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:24:16 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:24:16 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:24:16 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:24:16 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:24:16 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:24:16 UDPv4 link local: (not bound)
2023-03-24 15:24:16 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:24:16 MANAGEMENT: >STATE:1679685856,WAIT,,,,,,
2023-03-24 15:24:16 MANAGEMENT: >STATE:1679685856,AUTH,,,,,,
2023-03-24 15:24:16 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=9898239c b4ce2887
2023-03-24 15:24:16 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:24:16 VERIFY KU OK
2023-03-24 15:24:16 Validating certificate extended key usage
2023-03-24 15:24:16 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:24:16 VERIFY EKU OK
2023-03-24 15:24:16 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:24:16 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:24:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:24:16 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:24:16 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:24:16 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:24:16 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:24:16 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:24:16 OPTIONS IMPORT: route options modified
2023-03-24 15:24:16 OPTIONS IMPORT: route-related options modified
2023-03-24 15:24:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:24:16 OPTIONS IMPORT: peer-id set
2023-03-24 15:24:16 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:24:16 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:24:16 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:24:16 MANAGEMENT: >STATE:1679685856,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:24:16 Opening tun interface:
2023-03-24 15:24:16 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:24:16 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:24:16 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:24:16 Routes excluded:  
2023-03-24 15:24:16 Disallowed VPN apps: app.aawireless
2023-03-24 15:24:16 Apps may bypass VPN
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:24:17 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:24:17 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:24:17 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:24:17 Initialization Sequence Completed
2023-03-24 15:24:17 MANAGEMENT: >STATE:1679685857,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:28:58 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:28:58 TCP/UDP: Closing socket
2023-03-24 15:28:58 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:28:58 Waiting 2s seconds between connection attempt
2023-03-24 15:28:58 MANAGEMENT: >STATE:1679686138,RECONNECTING,ping-restart,,,,,
2023-03-24 15:29:00 MANAGEMENT: CMD 'hold release'
2023-03-24 15:29:00 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:29:00 MANAGEMENT: CMD 'state on'
2023-03-24 15:29:00 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:29:01 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:29:01 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:29:01 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:29:01 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:29:01 LZO compression initializing
2023-03-24 15:29:01 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:29:01 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:29:01 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:29:01 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:29:01 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:29:01 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:29:01 UDPv4 link local: (not bound)
2023-03-24 15:29:01 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,WAIT,,,,,,
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,AUTH,,,,,,
2023-03-24 15:29:01 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=6c11b057 20261027
2023-03-24 15:29:01 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:29:01 VERIFY KU OK
2023-03-24 15:29:01 Validating certificate extended key usage
2023-03-24 15:29:01 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:29:01 VERIFY EKU OK
2023-03-24 15:29:01 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:29:01 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:29:01 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:29:01 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:29:01 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:29:01 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:29:01 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:29:01 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:29:01 OPTIONS IMPORT: route options modified
2023-03-24 15:29:01 OPTIONS IMPORT: route-related options modified
2023-03-24 15:29:01 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:29:01 OPTIONS IMPORT: peer-id set
2023-03-24 15:29:01 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:29:01 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:29:01 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'
2023-03-24 15:29:01 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:29:01 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:29:01 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:29:01 Initialization Sequence Completed
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:33:14 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:33:14 TCP/UDP: Closing socket
2023-03-24 15:33:14 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:33:14 MANAGEMENT: >STATE:1679686394,RECONNECTING,ping-restart,,,,,
2023-03-24 15:33:14 Waiting 2s seconds between connection attempt
2023-03-24 15:33:16 MANAGEMENT: CMD 'hold release'
2023-03-24 15:33:16 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:33:16 MANAGEMENT: CMD 'state on'
2023-03-24 15:33:16 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:33:17 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:33:17 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:33:17 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:33:17 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:33:17 LZO compression initializing
2023-03-24 15:33:17 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:33:17 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:33:17 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:33:17 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:33:17 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:33:17 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:33:17 UDPv4 link local: (not bound)
2023-03-24 15:33:17 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,WAIT,,,,,,
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,AUTH,,,,,,
2023-03-24 15:33:17 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=66b022bf d98be6a3
2023-03-24 15:33:17 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:33:17 VERIFY KU OK
2023-03-24 15:33:17 Validating certificate extended key usage
2023-03-24 15:33:17 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:33:17 VERIFY EKU OK
2023-03-24 15:33:17 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:33:17 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:33:17 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:33:17 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:33:17 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:33:17 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:33:17 Opening tun interface:
2023-03-24 15:33:17 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:33:17 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:33:17 OPTIONS IMPORT: route options modified
2023-03-24 15:33:17 OPTIONS IMPORT: route-related options modified
2023-03-24 15:33:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:33:17 OPTIONS IMPORT: peer-id set
2023-03-24 15:33:17 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:33:17 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:33:17 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:33:17 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:33:17 DNS Server: 8.8.8.8, 8.8.4.4, 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:33:17 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:33:17 Routes excluded:  
2023-03-24 15:33:17 Disallowed VPN apps: app.aawireless
2023-03-24 15:33:17 Apps may bypass VPN
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:33:17 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:33:17 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:33:17 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:33:17 Initialization Sequence Completed
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:37:56 Network Status: CONNECTED  to WIFI 
2023-03-24 15:37:56 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:37:56 MANAGEMENT: CMD 'network-change'
2023-03-24 15:37:56 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:42:11 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:42:11 TCP/UDP: Closing socket
2023-03-24 15:42:11 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:42:11 MANAGEMENT: >STATE:1679686931,RECONNECTING,ping-restart,,,,,
2023-03-24 15:42:11 Waiting 2s seconds between connection attempt
2023-03-24 15:42:13 MANAGEMENT: CMD 'hold release'
2023-03-24 15:42:13 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:42:13 MANAGEMENT: CMD 'state on'
2023-03-24 15:42:13 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:42:14 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:42:14 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:42:14 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:42:14 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:42:14 LZO compression initializing
2023-03-24 15:42:14 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:42:14 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:42:14 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:42:14 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:42:14 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:42:14 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:42:14 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:42:14 UDPv4 link local: (not bound)
2023-03-24 15:42:14 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:42:14 MANAGEMENT: >STATE:1679686934,WAIT,,,,,,
2023-03-24 15:42:14 MANAGEMENT: >STATE:1679686934,AUTH,,,,,,
2023-03-24 15:42:14 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=a9b0d115 1a1f2d39
2023-03-24 15:42:14 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:42:14 VERIFY KU OK
2023-03-24 15:42:14 Validating certificate extended key usage
2023-03-24 15:42:14 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:42:14 VERIFY EKU OK
2023-03-24 15:42:14 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:42:14 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:42:14 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:42:14 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:42:14 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:42:14 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:42:14 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:42:14 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:42:14 OPTIONS IMPORT: route options modified
2023-03-24 15:42:15 OPTIONS IMPORT: route-related options modified
2023-03-24 15:42:15 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:42:15 OPTIONS IMPORT: peer-id set
2023-03-24 15:42:15 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:42:15 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:42:15 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:42:15 MANAGEMENT: >STATE:1679686934,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:42:15 Opening tun interface:
2023-03-24 15:42:15 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:42:15 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:42:15 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:42:15 Routes excluded: 192.168.1.239/24 fe80:0:0:0:cce2:d7ff:fe5a:d07/64
2023-03-24 15:42:15 Disallowed VPN apps: app.aawireless
2023-03-24 15:42:15 Apps may bypass VPN
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:42:15 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:42:15 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:42:15 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:42:15 Initialization Sequence Completed
2023-03-24 15:42:15 MANAGEMENT: >STATE:1679686935,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:51:17 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:51:17 TCP/UDP: Closing socket
2023-03-24 15:51:17 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:51:17 Waiting 2s seconds between connection attempt
2023-03-24 15:51:17 MANAGEMENT: >STATE:1679687477,RECONNECTING,ping-restart,,,,,
2023-03-24 15:51:19 MANAGEMENT: CMD 'hold release'
2023-03-24 15:51:19 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:51:19 MANAGEMENT: CMD 'state on'
2023-03-24 15:51:19 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:51:20 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:51:20 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:51:20 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:51:20 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:51:20 LZO compression initializing
2023-03-24 15:51:20 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:51:20 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:51:20 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:51:20 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:51:20 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:51:20 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:51:20 UDPv4 link local: (not bound)
2023-03-24 15:51:20 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,WAIT,,,,,,
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,AUTH,,,,,,
2023-03-24 15:51:20 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=732457a7 9e11dd34
2023-03-24 15:51:20 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:51:20 VERIFY KU OK
2023-03-24 15:51:20 Validating certificate extended key usage
2023-03-24 15:51:20 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:51:20 VERIFY EKU OK
2023-03-24 15:51:20 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:51:20 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:51:20 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:51:20 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:51:20 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:51:20 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:51:20 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:51:20 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:51:20 OPTIONS IMPORT: route options modified
2023-03-24 15:51:20 OPTIONS IMPORT: route-related options modified
2023-03-24 15:51:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:51:20 OPTIONS IMPORT: peer-id set
2023-03-24 15:51:20 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:51:20 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:51:20 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:51:20 Opening tun interface:
2023-03-24 15:51:20 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:51:20 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:51:20 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:51:20 Routes excluded: 192.168.1.239/24 fe80:0:0:0:cce2:d7ff:fe5a:d07/64
2023-03-24 15:51:20 Disallowed VPN apps: app.aawireless
2023-03-24 15:51:20 Apps may bypass VPN
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:51:20 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:51:20 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:51:20 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:51:20 Initialization Sequence Completed
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:54:27 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_00000000000000000000000000000000000000000000000111111111111111] 0:791 0:790 t=1679687667[0] r=[-1,64,15,1,1] sl=[41,64,64,528]
2023-03-24 15:54:32 PID_ERR replay-window backtrack occurred [3] [SSL-0] [00__000000000000000000000000000000000000000000000000000000000000] 0:2027 0:2024 t=1679687672[0] r=[-1,64,15,3,1] sl=[21,64,64,528]

Configuration file

add the contents of the configuration file if applicable
be careful to not post private keys
@schwabe
Copy link
Owner

schwabe commented Mar 25, 2023

There are several indications of bad network connection in the log. But please also describe the problem in more detail.

@SoNic1967
Copy link
Author

SoNic1967 commented Mar 25, 2023 via email

@schwabe
Copy link
Owner

schwabe commented Mar 25, 2023

That looks like more an issue that you should sort out with your VPN provider.

@ahmedyhabib
Copy link

Please help vpn

1 similar comment
@ahmedyhabib
Copy link

Please help vpn

@ahmedyhabib
Copy link

help tu in Ethiopia

@ahmedyhabib
Copy link

Help tu in Ethiopia

Repository owner locked and limited conversation to collaborators Apr 17, 2023
@schwabe schwabe converted this issue into discussion #1604 Apr 17, 2023

This issue was moved to a discussion.

You can continue the conversation there. Go to discussion →

Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants