schwabe / ics-openvpn

OpenVPN for Android
3.31k stars 1.2k forks source link

Connection stops working after a while #1599

Closed SoNic1967 closed 1 year ago

SoNic1967 commented 1 year ago

/To make issues more manageable, I would appreciate it if you fill out the following details as applicable:

General information

  1. Android Version 13
  2. Android Vendor/Custom ROM
  3. Device Samsung S22+
  4. Version of the app (version number/play store version/self-built Google Store

Description of the issue

Log (if applicable)

2023-03-24 15:10:02 official build 0.7.43 running on samsung SM-S906U1 (taro), Android 13 (TP1A.220624.014) API 33, ABI arm64-v8a, (samsung/g0quew/g0q:13/TP1A.220624.014/S906U1UES2CWB7:user/release-keys)
2023-03-24 15:10:02 Building configuration…
2023-03-24 15:10:02 Fetched VPN profile (SoNic) triggered by main profile list
2023-03-24 15:10:02 started Socket Thread
2023-03-24 15:10:02 P:WARNING: linker: Warning: "/data/app/~~AsLcFZ-lHEV6Zc_tRBg7NA==/de.blinkt.openvpn-XNbyQS_Ctv3IkP2Nwu7xbQ==/lib/arm64/libovpnexec.so" is not a directory (ignoring)
2023-03-24 15:10:02 Network Status: CONNECTED  to WIFI 
2023-03-24 15:10:02 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:10:02 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:10:02 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2023-03-24 15:10:02 Unrecognized option or missing or extra parameter(s) in stdin:98: block-outside-dns (2.7_master)
2023-03-24 15:10:02 Current Parameter Settings:
2023-03-24 15:10:02   config = 'stdin'
2023-03-24 15:10:02   mode = 0
2023-03-24 15:10:02   show_ciphers = DISABLED
2023-03-24 15:10:02   show_digests = DISABLED
2023-03-24 15:10:02   show_engines = DISABLED
2023-03-24 15:10:02   genkey = DISABLED
2023-03-24 15:10:02   genkey_filename = '[UNDEF]'
2023-03-24 15:10:02   key_pass_file = '[UNDEF]'
2023-03-24 15:10:02   show_tls_ciphers = DISABLED
2023-03-24 15:10:02   connect_retry_max = 0
2023-03-24 15:10:02 Connection profiles [0]:
2023-03-24 15:10:02   proto = udp
2023-03-24 15:10:02   local = '[UNDEF]'
2023-03-24 15:10:02   local_port = '[UNDEF]'
2023-03-24 15:10:02   remote = '100.4.104.240'
2023-03-24 15:10:02   remote_port = '1194'
2023-03-24 15:10:02   remote_float = DISABLED
2023-03-24 15:10:02   bind_defined = DISABLED
2023-03-24 15:10:02   bind_local = DISABLED
2023-03-24 15:10:02   bind_ipv6_only = DISABLED
2023-03-24 15:10:02   connect_retry_seconds = 2
2023-03-24 15:10:02   connect_timeout = 120
2023-03-24 15:10:02   socks_proxy_server = '[UNDEF]'
2023-03-24 15:10:02   socks_proxy_port = '[UNDEF]'
2023-03-24 15:10:02   tun_mtu = 1500
2023-03-24 15:10:02   tun_mtu_defined = ENABLED
2023-03-24 15:10:02   link_mtu = 1500
2023-03-24 15:10:02   link_mtu_defined = DISABLED
2023-03-24 15:10:02   tun_mtu_extra = 0
2023-03-24 15:10:02   tun_mtu_extra_defined = DISABLED
2023-03-24 15:10:02   tls_mtu = 1250
2023-03-24 15:10:02   mtu_discover_type = -1
2023-03-24 15:10:02   fragment = 0
2023-03-24 15:10:02   mssfix = 1280
2023-03-24 15:10:02   mssfix_encap = DISABLED
2023-03-24 15:10:02   mssfix_fixed = DISABLED
2023-03-24 15:10:02   explicit_exit_notification = 1
2023-03-24 15:10:02   tls_auth_file = '[UNDEF]'
2023-03-24 15:10:02   key_direction = not set
2023-03-24 15:10:02   tls_crypt_file = '[INLINE]'
2023-03-24 15:10:02   tls_crypt_v2_file = '[UNDEF]'
2023-03-24 15:10:02 Connection profiles END
2023-03-24 15:10:02   remote_random = DISABLED
2023-03-24 15:10:02   ipchange = '[UNDEF]'
2023-03-24 15:10:02   dev = 'tun'
2023-03-24 15:10:02   dev_type = '[UNDEF]'
2023-03-24 15:10:02   dev_node = '[UNDEF]'
2023-03-24 15:10:02   lladdr = '[UNDEF]'
2023-03-24 15:10:02   topology = 1
2023-03-24 15:10:02   ifconfig_local = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_remote_netmask = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_noexec = DISABLED
2023-03-24 15:10:02   ifconfig_nowarn = ENABLED
2023-03-24 15:10:02   ifconfig_ipv6_local = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_ipv6_netbits = 0
2023-03-24 15:10:02   ifconfig_ipv6_remote = '[UNDEF]'
2023-03-24 15:10:02   shaper = 0
2023-03-24 15:10:02   mtu_test = 0
2023-03-24 15:10:02   mlock = DISABLED
2023-03-24 15:10:02   keepalive_ping = 0
2023-03-24 15:10:02   keepalive_timeout = 0
2023-03-24 15:10:02   inactivity_timeout = 0
2023-03-24 15:10:02   session_timeout = 0
2023-03-24 15:10:02   inactivity_minimum_bytes = 0
2023-03-24 15:10:02   ping_send_timeout = 0
2023-03-24 15:10:02   ping_rec_timeout = 0
2023-03-24 15:10:02   ping_rec_timeout_action = 0
2023-03-24 15:10:02   ping_timer_remote = DISABLED
2023-03-24 15:10:02   remap_sigusr1 = 0
2023-03-24 15:10:02   persist_tun = ENABLED
2023-03-24 15:10:02   persist_local_ip = DISABLED
2023-03-24 15:10:02   persist_remote_ip = DISABLED
2023-03-24 15:10:02   persist_key = DISABLED
2023-03-24 15:10:02   passtos = DISABLED
2023-03-24 15:10:02   resolve_retry_seconds = 1000000000
2023-03-24 15:10:02   resolve_in_advance = ENABLED
2023-03-24 15:10:02   username = '[UNDEF]'
2023-03-24 15:10:02   groupname = '[UNDEF]'
2023-03-24 15:10:02   chroot_dir = '[UNDEF]'
2023-03-24 15:10:02   cd_dir = '[UNDEF]'
2023-03-24 15:10:02   writepid = '[UNDEF]'
2023-03-24 15:10:02   up_script = '[UNDEF]'
2023-03-24 15:10:02   down_script = '[UNDEF]'
2023-03-24 15:10:02   down_pre = DISABLED
2023-03-24 15:10:02   up_restart = DISABLED
2023-03-24 15:10:02   up_delay = DISABLED
2023-03-24 15:10:02   daemon = DISABLED
2023-03-24 15:10:02   log = DISABLED
2023-03-24 15:10:02   suppress_timestamps = DISABLED
2023-03-24 15:10:02   machine_readable_output = ENABLED
2023-03-24 15:10:02   nice = 0
2023-03-24 15:10:02   verbosity = 4
2023-03-24 15:10:02   mute = 0
2023-03-24 15:10:02   gremlin = 0
2023-03-24 15:10:02   status_file = '[UNDEF]'
2023-03-24 15:10:02   status_file_version = 1
2023-03-24 15:10:02   status_file_update_freq = 60
2023-03-24 15:10:02   occ = ENABLED
2023-03-24 15:10:02   rcvbuf = 0
2023-03-24 15:10:02   sndbuf = 0
2023-03-24 15:10:02   sockflags = 0
2023-03-24 15:10:02   fast_io = DISABLED
2023-03-24 15:10:02   comp.alg = 2
2023-03-24 15:10:02   comp.flags = 1
2023-03-24 15:10:02   route_script = '[UNDEF]'
2023-03-24 15:10:02   route_default_gateway = '[UNDEF]'
2023-03-24 15:10:02   route_default_metric = 0
2023-03-24 15:10:02   route_noexec = DISABLED
2023-03-24 15:10:02   route_delay = 0
2023-03-24 15:10:02   route_delay_window = 30
2023-03-24 15:10:02   route_delay_defined = DISABLED
2023-03-24 15:10:02   route_nopull = DISABLED
2023-03-24 15:10:02   route_gateway_via_dhcp = DISABLED
2023-03-24 15:10:02   allow_pull_fqdn = DISABLED
2023-03-24 15:10:02   management_addr = '/data/user/0/de.blinkt.openvpn/cache/mgmtsocket'
2023-03-24 15:10:02   management_port = 'unix'
2023-03-24 15:10:02   management_user_pass = '[UNDEF]'
2023-03-24 15:10:02   management_log_history_cache = 250
2023-03-24 15:10:02   management_echo_buffer_size = 100
2023-03-24 15:10:02   management_client_user = '[UNDEF]'
2023-03-24 15:10:02   management_client_group = '[UNDEF]'
2023-03-24 15:10:02   management_flags = 16678
2023-03-24 15:10:02   shared_secret_file = '[UNDEF]'
2023-03-24 15:10:02 Waiting 0s seconds between connection attempt
2023-03-24 15:10:02   key_direction = not set
2023-03-24 15:10:02   ciphername = 'AES-128-GCM'
2023-03-24 15:10:02   ncp_ciphers = 'AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305'
2023-03-24 15:10:02   authname = 'SHA256'
2023-03-24 15:10:02   engine = DISABLED
2023-03-24 15:10:02   replay = ENABLED
2023-03-24 15:10:02   mute_replay_warnings = DISABLED
2023-03-24 15:10:02   replay_window = 64
2023-03-24 15:10:02   replay_time = 15
2023-03-24 15:10:02   packet_id_file = '[UNDEF]'
2023-03-24 15:10:02   test_crypto = DISABLED
2023-03-24 15:10:02   tls_server = DISABLED
2023-03-24 15:10:02   tls_client = ENABLED
2023-03-24 15:10:02   ca_file = '[INLINE]'
2023-03-24 15:10:02   ca_path = '[UNDEF]'
2023-03-24 15:10:02   dh_file = '[UNDEF]'
2023-03-24 15:10:02   cert_file = '[INLINE]'
2023-03-24 15:10:02   extra_certs_file = '[UNDEF]'
2023-03-24 15:10:02   priv_key_file = '[INLINE]'
2023-03-24 15:10:02   pkcs12_file = '[UNDEF]'
2023-03-24 15:10:02   cipher_list = 'TLS-ECDHE-ECDSA-WITH-AES-128-GCM-SHA256'
2023-03-24 15:10:02   cipher_list_tls13 = '[UNDEF]'
2023-03-24 15:10:02   tls_cert_profile = 'preferred'
2023-03-24 15:10:02   tls_verify = '[UNDEF]'
2023-03-24 15:10:02   tls_export_cert = '[UNDEF]'
2023-03-24 15:10:02   verify_x509_type = 2
2023-03-24 15:10:02   verify_x509_name = 'server_ZDHyQuID7WZoiOE8'
2023-03-24 15:10:02   crl_file = '[UNDEF]'
2023-03-24 15:10:02   ns_cert_type = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 65535
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_ku[i] = 0
2023-03-24 15:10:02   remote_cert_eku = 'TLS Web Server Authentication'
2023-03-24 15:10:02   ssl_flags = 192
2023-03-24 15:10:02   tls_timeout = 2
2023-03-24 15:10:02   renegotiate_bytes = -1
2023-03-24 15:10:02   renegotiate_packets = 0
2023-03-24 15:10:02   renegotiate_seconds = 3600
2023-03-24 15:10:02   handshake_window = 60
2023-03-24 15:10:02   transition_window = 3600
2023-03-24 15:10:02   single_session = DISABLED
2023-03-24 15:10:02   push_peer_info = ENABLED
2023-03-24 15:10:02   tls_exit = DISABLED
2023-03-24 15:10:02   tls_crypt_v2_metadata = '[UNDEF]'
2023-03-24 15:10:02   server_network = 0.0.0.0
2023-03-24 15:10:02   server_netmask = 0.0.0.0
2023-03-24 15:10:02   server_network_ipv6 = ::
2023-03-24 15:10:02   server_netbits_ipv6 = 0
2023-03-24 15:10:02   server_bridge_ip = 0.0.0.0
2023-03-24 15:10:02   server_bridge_netmask = 0.0.0.0
2023-03-24 15:10:02   server_bridge_pool_start = 0.0.0.0
2023-03-24 15:10:02   server_bridge_pool_end = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_defined = DISABLED
2023-03-24 15:10:02   ifconfig_pool_start = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_end = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_netmask = 0.0.0.0
2023-03-24 15:10:02   ifconfig_pool_persist_filename = '[UNDEF]'
2023-03-24 15:10:02   ifconfig_pool_persist_refresh_freq = 600
2023-03-24 15:10:02   ifconfig_ipv6_pool_defined = DISABLED
2023-03-24 15:10:02   ifconfig_ipv6_pool_base = ::
2023-03-24 15:10:02   ifconfig_ipv6_pool_netbits = 0
2023-03-24 15:10:02   n_bcast_buf = 256
2023-03-24 15:10:02   tcp_queue_limit = 64
2023-03-24 15:10:02   real_hash_size = 256
2023-03-24 15:10:02   virtual_hash_size = 256
2023-03-24 15:10:02   client_connect_script = '[UNDEF]'
2023-03-24 15:10:02   learn_address_script = '[UNDEF]'
2023-03-24 15:10:02   client_disconnect_script = '[UNDEF]'
2023-03-24 15:10:02   client_crresponse_script = '[UNDEF]'
2023-03-24 15:10:02   client_config_dir = '[UNDEF]'
2023-03-24 15:10:02   ccd_exclusive = DISABLED
2023-03-24 15:10:02   tmp_dir = '/data/data/de.blinkt.openvpn/cache'
2023-03-24 15:10:02   push_ifconfig_defined = DISABLED
2023-03-24 15:10:02   push_ifconfig_local = 0.0.0.0
2023-03-24 15:10:02   push_ifconfig_remote_netmask = 0.0.0.0
2023-03-24 15:10:02   push_ifconfig_ipv6_defined = DISABLED
2023-03-24 15:10:02   push_ifconfig_ipv6_local = ::/0
2023-03-24 15:10:02   push_ifconfig_ipv6_remote = ::
2023-03-24 15:10:02   enable_c2c = DISABLED
2023-03-24 15:10:02   duplicate_cn = DISABLED
2023-03-24 15:10:02   cf_max = 0
2023-03-24 15:10:02   cf_per = 0
2023-03-24 15:10:02   max_clients = 1024
2023-03-24 15:10:02   max_routes_per_client = 256
2023-03-24 15:10:02   auth_user_pass_verify_script = '[UNDEF]'
2023-03-24 15:10:02   auth_user_pass_verify_script_via_file = DISABLED
2023-03-24 15:10:02   auth_token_generate = DISABLED
2023-03-24 15:10:02   auth_token_lifetime = 0
2023-03-24 15:10:02   auth_token_secret_file = '[UNDEF]'
2023-03-24 15:10:02   port_share_host = '[UNDEF]'
2023-03-24 15:10:02   port_share_port = '[UNDEF]'
2023-03-24 15:10:02   vlan_tagging = DISABLED
2023-03-24 15:10:02   vlan_accept = all
2023-03-24 15:10:02   vlan_pvid = 1
2023-03-24 15:10:02   client = ENABLED
2023-03-24 15:10:02   pull = ENABLED
2023-03-24 15:10:02   auth_user_pass_file = '[UNDEF]'
2023-03-24 15:10:02 OpenVPN 2.7-icsopenvpn [git:icsopenvpn/v0.7.43-0-gd861a123] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Dec 14 2022
2023-03-24 15:10:02 library versions: OpenSSL 3.0.7 1 Nov 2022, LZO 2.10
2023-03-24 15:10:02 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket
2023-03-24 15:10:02 MANAGEMENT: CMD 'version 3'
2023-03-24 15:10:02 MANAGEMENT: CMD 'hold release'
2023-03-24 15:10:02 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:10:02 MANAGEMENT: CMD 'state on'
2023-03-24 15:10:02 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:10:03 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:10:03 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:10:03 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:10:03 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:10:03 LZO compression initializing
2023-03-24 15:10:03 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:10:03 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:10:03 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:10:03 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:10:03 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:10:03 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:10:03 UDPv4 link local: (not bound)
2023-03-24 15:10:03 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,WAIT,,,,,,
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,AUTH,,,,,,
2023-03-24 15:10:03 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=e1a07889 9aaac046
2023-03-24 15:10:03 PID_ERR replay-window backtrack occurred [1] [TLS_WRAP-0] [0_000] 1679685003:5 1679685003:4 t=1679685003[0] r=[0,64,15,1,1] sl=[59,5,64,528]
2023-03-24 15:10:03 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:10:03 VERIFY KU OK
2023-03-24 15:10:03 Validating certificate extended key usage
2023-03-24 15:10:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:10:03 VERIFY EKU OK
2023-03-24 15:10:03 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:10:03 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:10:03 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:10:03 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:10:03 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:10:03 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:10:03 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:10:03 OPTIONS IMPORT: route options modified
2023-03-24 15:10:03 OPTIONS IMPORT: route-related options modified
2023-03-24 15:10:03 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:10:03 OPTIONS IMPORT: peer-id set
2023-03-24 15:10:03 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:10:03 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:10:03 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:10:03 Opening tun interface:
2023-03-24 15:10:03 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:10:03 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:10:03 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:10:03 Routes excluded: 10.10.98.170/20 fe80:0:0:0:6490:98ff:fe19:4a88/64
2023-03-24 15:10:03 Disallowed VPN apps: app.aawireless
2023-03-24 15:10:03 Apps may bypass VPN
2023-03-24 15:10:03 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:10:03 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:10:03 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:10:03 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:10:03 Initialization Sequence Completed
2023-03-24 15:10:03 MANAGEMENT: >STATE:1679685003,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:10:03 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:10:04 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_000000000000000000001] 0:23 0:22 t=1679685004[0] r=[-1,64,15,1,1] sl=[41,23,64,528]
2023-03-24 15:10:05 PID_ERR replay-window backtrack occurred [6] [SSL-0] [0__00__000000000000000011111111111111111111111111111111111111111] 0:74 0:68 t=1679685005[0] r=[-2,64,15,6,1] sl=[54,64,64,528]
2023-03-24 15:10:11 PID_ERR replay-window backtrack occurred [7] [SSL-0] [0___0___00000000000000000000000000000000000000000000000000000000] 0:716 0:709 t=1679685011[0] r=[-3,64,15,7,1] sl=[52,64,64,528]
2023-03-24 15:10:13 PID_ERR replay-window backtrack occurred [11] [SSL-0] [0_0__00_000_0000000000000000000000000000000000000000000000000000] 0:1171 0:1160 t=1679685013[0] r=[0,64,15,11,1] sl=[45,64,64,528]
2023-03-24 15:10:15 PID_ERR replay-window backtrack occurred [16] [SSL-0] [0__00_0__00__00__00000000111111111111111111111111111111111111111] 0:1750 0:1734 t=1679685015[0] r=[-2,64,15,16,1] sl=[42,64,64,528]
2023-03-24 15:10:15 PID_ERR replay-window backtrack occurred [21] [SSL-0] [0___0_____00__00__00__000000000000000000000000011111111111111111] 0:1772 0:1751 t=1679685015[0] r=[-2,64,15,21,1] sl=[20,64,64,528]
2023-03-24 15:10:19 PID_ERR replay-window backtrack occurred [36] [SSL-0] [00__00__00___00__00__00__00___00__00__00000000000000000000000000] 0:2649 0:2613 t=1679685019[0] r=[-1,64,15,36,1] sl=[39,64,64,528]
2023-03-24 15:10:19 PID_ERR replay-window backtrack occurred [37] [SSL-0] [00__00__00___000_000_000_0000_000_000_00000000000000000000000000] 0:2649 0:2612 t=1679685019[0] r=[-1,64,15,37,1] sl=[39,64,64,528]
2023-03-24 15:10:19 PID_ERR replay-window backtrack occurred [39] [SSL-0] [0___0___0___0__00__00__0_00__00__00__00_000000000000000000000000] 0:2806 0:2767 t=1679685019[0] r=[-1,64,15,39,1] sl=[10,64,64,528]
2023-03-24 15:16:37 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:16:37 TCP/UDP: Closing socket
2023-03-24 15:16:37 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:16:37 MANAGEMENT: >STATE:1679685397,RECONNECTING,ping-restart,,,,,
2023-03-24 15:16:37 Waiting 2s seconds between connection attempt
2023-03-24 15:16:39 MANAGEMENT: CMD 'hold release'
2023-03-24 15:16:39 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:16:39 MANAGEMENT: CMD 'state on'
2023-03-24 15:16:39 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:16:40 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:16:40 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:16:40 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:16:40 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:16:40 LZO compression initializing
2023-03-24 15:16:40 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:16:40 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:16:40 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:16:40 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:16:40 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:16:40 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:16:40 UDPv4 link local: (not bound)
2023-03-24 15:16:40 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:16:40 MANAGEMENT: >STATE:1679685400,WAIT,,,,,,
2023-03-24 15:16:40 MANAGEMENT: >STATE:1679685400,AUTH,,,,,,
2023-03-24 15:16:40 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=2a504387 51930cf8
2023-03-24 15:16:40 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:16:40 VERIFY KU OK
2023-03-24 15:16:40 Validating certificate extended key usage
2023-03-24 15:16:40 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:16:40 VERIFY EKU OK
2023-03-24 15:16:40 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:16:40 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:16:40 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:16:40 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:16:40 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:16:40 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:16:40 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:16:40 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:16:40 OPTIONS IMPORT: route options modified
2023-03-24 15:16:40 OPTIONS IMPORT: route-related options modified
2023-03-24 15:16:40 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:16:40 OPTIONS IMPORT: peer-id set
2023-03-24 15:16:40 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:16:40 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:16:40 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:16:40 MANAGEMENT: >STATE:1679685400,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:16:40 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:16:40 Opening tun interface:
2023-03-24 15:16:41 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:16:41 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:16:41 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:16:41 Routes excluded: 10.10.98.170/20 fe80:0:0:0:6490:98ff:fe19:4a88/64
2023-03-24 15:16:41 Disallowed VPN apps: app.aawireless
2023-03-24 15:16:41 Apps may bypass VPN
2023-03-24 15:16:41 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:16:41 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:16:41 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:16:41 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:16:41 Initialization Sequence Completed
2023-03-24 15:16:41 MANAGEMENT: >STATE:1679685401,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:16:41 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_] 0:2 0:1 t=1679685401[0] r=[0,64,15,1,1] sl=[62,2,64,528]
2023-03-24 15:16:41 PID_ERR replay-window backtrack occurred [2] [SSL-0] [0__0000000000000] 0:16 0:14 t=1679685401[0] r=[0,64,15,2,1] sl=[48,16,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [3] [SSL-0] [00__000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:83 0:80 t=1679685526[0] r=[0,64,15,3,1] sl=[45,64,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [5] [SSL-0] [0___0___00000000000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEE] 0:95 0:90 t=1679685526[0] r=[0,64,15,5,1] sl=[33,64,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [6] [SSL-0] [0___00__00000000000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEE] 0:95 0:89 t=1679685526[0] r=[0,64,15,6,1] sl=[33,64,64,528]
2023-03-24 15:18:46 PID_ERR replay-window backtrack occurred [7] [SSL-0] [0_0_000_00000000000000000000000000000000>EEEEEEEEEEEEEEEEEEEEEEE] 0:95 0:88 t=1679685526[0] r=[0,64,15,7,1] sl=[33,64,64,528]
2023-03-24 15:18:48 PID_ERR replay-window backtrack occurred [9] [SSL-0] [0_000_000_000000000000000000000000000000000000000000000000000000] 0:537 0:528 t=1679685528[0] r=[-2,64,15,9,1] sl=[39,64,64,528]
2023-03-24 15:20:24 Network Status: not connected
2023-03-24 15:20:24 Debug state info: not connected, pause: userPause, shouldbeconnected: false, network: PENDINGDISCONNECT 
2023-03-24 15:20:24 write UDPv4 []: Network is unreachable (fd=4,code=101)
2023-03-24 15:20:24 write UDPv4 []: Network is unreachable (fd=4,code=101)
2023-03-24 15:20:24 Network Status: CONNECTED LTE to MOBILE TRACFONE.VZWENTP
2023-03-24 15:20:24 Debug state info: CONNECTED LTE to MOBILE TRACFONE.VZWENTP, pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:20:24 MANAGEMENT: CMD 'network-change'
2023-03-24 15:24:13 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:24:13 TCP/UDP: Closing socket
2023-03-24 15:24:13 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:24:13 MANAGEMENT: >STATE:1679685853,RECONNECTING,ping-restart,,,,,
2023-03-24 15:24:13 Waiting 2s seconds between connection attempt
2023-03-24 15:24:15 MANAGEMENT: CMD 'hold release'
2023-03-24 15:24:15 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:24:15 MANAGEMENT: CMD 'state on'
2023-03-24 15:24:15 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:24:16 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:24:16 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:24:16 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:24:16 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:24:16 LZO compression initializing
2023-03-24 15:24:16 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:24:16 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:24:16 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:24:16 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:24:16 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:24:16 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:24:16 UDPv4 link local: (not bound)
2023-03-24 15:24:16 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:24:16 MANAGEMENT: >STATE:1679685856,WAIT,,,,,,
2023-03-24 15:24:16 MANAGEMENT: >STATE:1679685856,AUTH,,,,,,
2023-03-24 15:24:16 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=9898239c b4ce2887
2023-03-24 15:24:16 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:24:16 VERIFY KU OK
2023-03-24 15:24:16 Validating certificate extended key usage
2023-03-24 15:24:16 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:24:16 VERIFY EKU OK
2023-03-24 15:24:16 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:24:16 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:24:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:24:16 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:24:16 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:24:16 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:24:16 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:24:16 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:24:16 OPTIONS IMPORT: route options modified
2023-03-24 15:24:16 OPTIONS IMPORT: route-related options modified
2023-03-24 15:24:16 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:24:16 OPTIONS IMPORT: peer-id set
2023-03-24 15:24:16 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:24:16 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:24:16 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:24:16 MANAGEMENT: >STATE:1679685856,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:24:16 Opening tun interface:
2023-03-24 15:24:16 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:24:16 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:24:16 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:24:16 Routes excluded:  
2023-03-24 15:24:16 Disallowed VPN apps: app.aawireless
2023-03-24 15:24:16 Apps may bypass VPN
2023-03-24 15:24:16 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:24:17 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:24:17 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:24:17 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:24:17 Initialization Sequence Completed
2023-03-24 15:24:17 MANAGEMENT: >STATE:1679685857,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:28:58 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:28:58 TCP/UDP: Closing socket
2023-03-24 15:28:58 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:28:58 Waiting 2s seconds between connection attempt
2023-03-24 15:28:58 MANAGEMENT: >STATE:1679686138,RECONNECTING,ping-restart,,,,,
2023-03-24 15:29:00 MANAGEMENT: CMD 'hold release'
2023-03-24 15:29:00 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:29:00 MANAGEMENT: CMD 'state on'
2023-03-24 15:29:00 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:29:01 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:29:01 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:29:01 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:29:01 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:29:01 LZO compression initializing
2023-03-24 15:29:01 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:29:01 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:29:01 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:29:01 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:29:01 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:29:01 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:29:01 UDPv4 link local: (not bound)
2023-03-24 15:29:01 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,WAIT,,,,,,
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,AUTH,,,,,,
2023-03-24 15:29:01 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=6c11b057 20261027
2023-03-24 15:29:01 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:29:01 VERIFY KU OK
2023-03-24 15:29:01 Validating certificate extended key usage
2023-03-24 15:29:01 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:29:01 VERIFY EKU OK
2023-03-24 15:29:01 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:29:01 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:29:01 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:29:01 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:29:01 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:29:01 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:29:01 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:29:01 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:29:01 OPTIONS IMPORT: route options modified
2023-03-24 15:29:01 OPTIONS IMPORT: route-related options modified
2023-03-24 15:29:01 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:29:01 OPTIONS IMPORT: peer-id set
2023-03-24 15:29:01 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:29:01 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:29:01 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:29:01 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'
2023-03-24 15:29:01 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:29:01 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:29:01 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:29:01 Initialization Sequence Completed
2023-03-24 15:29:01 MANAGEMENT: >STATE:1679686141,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:33:14 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:33:14 TCP/UDP: Closing socket
2023-03-24 15:33:14 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:33:14 MANAGEMENT: >STATE:1679686394,RECONNECTING,ping-restart,,,,,
2023-03-24 15:33:14 Waiting 2s seconds between connection attempt
2023-03-24 15:33:16 MANAGEMENT: CMD 'hold release'
2023-03-24 15:33:16 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:33:16 MANAGEMENT: CMD 'state on'
2023-03-24 15:33:16 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:33:17 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:33:17 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:33:17 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:33:17 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:33:17 LZO compression initializing
2023-03-24 15:33:17 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:33:17 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:33:17 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:33:17 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:33:17 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:33:17 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:33:17 UDPv4 link local: (not bound)
2023-03-24 15:33:17 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,WAIT,,,,,,
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,AUTH,,,,,,
2023-03-24 15:33:17 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=66b022bf d98be6a3
2023-03-24 15:33:17 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:33:17 VERIFY KU OK
2023-03-24 15:33:17 Validating certificate extended key usage
2023-03-24 15:33:17 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:33:17 VERIFY EKU OK
2023-03-24 15:33:17 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:33:17 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:33:17 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:33:17 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:33:17 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:33:17 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:33:17 Opening tun interface:
2023-03-24 15:33:17 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:33:17 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:33:17 OPTIONS IMPORT: route options modified
2023-03-24 15:33:17 OPTIONS IMPORT: route-related options modified
2023-03-24 15:33:17 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:33:17 OPTIONS IMPORT: peer-id set
2023-03-24 15:33:17 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:33:17 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:33:17 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:33:17 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:33:17 DNS Server: 8.8.8.8, 8.8.4.4, 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:33:17 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:33:17 Routes excluded:  
2023-03-24 15:33:17 Disallowed VPN apps: app.aawireless
2023-03-24 15:33:17 Apps may bypass VPN
2023-03-24 15:33:17 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:33:17 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:33:17 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:33:17 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:33:17 Initialization Sequence Completed
2023-03-24 15:33:17 MANAGEMENT: >STATE:1679686397,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:37:56 Network Status: CONNECTED  to WIFI 
2023-03-24 15:37:56 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:37:56 MANAGEMENT: CMD 'network-change'
2023-03-24 15:37:56 Debug state info: CONNECTED  to WIFI , pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED 
2023-03-24 15:42:11 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:42:11 TCP/UDP: Closing socket
2023-03-24 15:42:11 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:42:11 MANAGEMENT: >STATE:1679686931,RECONNECTING,ping-restart,,,,,
2023-03-24 15:42:11 Waiting 2s seconds between connection attempt
2023-03-24 15:42:13 MANAGEMENT: CMD 'hold release'
2023-03-24 15:42:13 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:42:13 MANAGEMENT: CMD 'state on'
2023-03-24 15:42:13 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:42:14 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:42:14 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:42:14 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:42:14 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:42:14 LZO compression initializing
2023-03-24 15:42:14 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:42:14 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:42:14 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:42:14 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:42:14 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:42:14 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:42:14 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:42:14 UDPv4 link local: (not bound)
2023-03-24 15:42:14 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:42:14 MANAGEMENT: >STATE:1679686934,WAIT,,,,,,
2023-03-24 15:42:14 MANAGEMENT: >STATE:1679686934,AUTH,,,,,,
2023-03-24 15:42:14 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=a9b0d115 1a1f2d39
2023-03-24 15:42:14 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:42:14 VERIFY KU OK
2023-03-24 15:42:14 Validating certificate extended key usage
2023-03-24 15:42:14 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:42:14 VERIFY EKU OK
2023-03-24 15:42:14 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:42:14 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:42:14 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:42:14 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:42:14 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:42:14 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:42:14 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:42:14 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:42:14 OPTIONS IMPORT: route options modified
2023-03-24 15:42:15 OPTIONS IMPORT: route-related options modified
2023-03-24 15:42:15 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:42:15 OPTIONS IMPORT: peer-id set
2023-03-24 15:42:15 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:42:15 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:42:15 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:42:15 MANAGEMENT: >STATE:1679686934,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:42:15 Opening tun interface:
2023-03-24 15:42:15 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:42:15 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:42:15 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:42:15 Routes excluded: 192.168.1.239/24 fe80:0:0:0:cce2:d7ff:fe5a:d07/64
2023-03-24 15:42:15 Disallowed VPN apps: app.aawireless
2023-03-24 15:42:15 Apps may bypass VPN
2023-03-24 15:42:15 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:42:15 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:42:15 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:42:15 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:42:15 Initialization Sequence Completed
2023-03-24 15:42:15 MANAGEMENT: >STATE:1679686935,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:51:17 [server_ZDHyQuID7WZoiOE8] Inactivity timeout (--ping-restart), restarting
2023-03-24 15:51:17 TCP/UDP: Closing socket
2023-03-24 15:51:17 SIGUSR1[soft,ping-restart] received, process restarting
2023-03-24 15:51:17 Waiting 2s seconds between connection attempt
2023-03-24 15:51:17 MANAGEMENT: >STATE:1679687477,RECONNECTING,ping-restart,,,,,
2023-03-24 15:51:19 MANAGEMENT: CMD 'hold release'
2023-03-24 15:51:19 MANAGEMENT: CMD 'bytecount 2'
2023-03-24 15:51:19 MANAGEMENT: CMD 'state on'
2023-03-24 15:51:19 MANAGEMENT: CMD 'proxy NONE'
2023-03-24 15:51:20 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:51:20 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:51:20 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-03-24 15:51:20 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-03-24 15:51:20 LZO compression initializing
2023-03-24 15:51:20 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
2023-03-24 15:51:20 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:51:20 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-client'
2023-03-24 15:51:20 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-GCM,auth [null-digest],keysize 128,key-method 2,tls-server'
2023-03-24 15:51:20 TCP/UDP: Preserving recently used remote address: [AF_INET]100.4.104.240:1194
2023-03-24 15:51:20 Socket Buffers: R=[229376->229376] S=[229376->229376]
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2023-03-24 15:51:20 UDPv4 link local: (not bound)
2023-03-24 15:51:20 UDPv4 link remote: [AF_INET]100.4.104.240:1194
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,WAIT,,,,,,
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,AUTH,,,,,,
2023-03-24 15:51:20 TLS: Initial packet from [AF_INET]100.4.104.240:1194, sid=732457a7 9e11dd34
2023-03-24 15:51:20 VERIFY OK: depth=1, CN=cn_jAe4c7EcQN7mSk5f
2023-03-24 15:51:20 VERIFY KU OK
2023-03-24 15:51:20 Validating certificate extended key usage
2023-03-24 15:51:20 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-03-24 15:51:20 VERIFY EKU OK
2023-03-24 15:51:20 VERIFY X509NAME OK: CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:51:20 VERIFY OK: depth=0, CN=server_ZDHyQuID7WZoiOE8
2023-03-24 15:51:20 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1553', remote='link-mtu 1550'
2023-03-24 15:51:20 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 256 bit EC, curve prime256v1, signature: ecdsa-with-SHA256
2023-03-24 15:51:20 [server_ZDHyQuID7WZoiOE8] Peer Connection Initiated with [AF_INET]100.4.104.240:1194
2023-03-24 15:51:20 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2023-03-24 15:51:20 OPTIONS IMPORT: timers and/or timeouts modified
2023-03-24 15:51:20 OPTIONS IMPORT: --ifconfig/up options modified
2023-03-24 15:51:20 OPTIONS IMPORT: route options modified
2023-03-24 15:51:20 OPTIONS IMPORT: route-related options modified
2023-03-24 15:51:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-03-24 15:51:20 OPTIONS IMPORT: peer-id set
2023-03-24 15:51:20 OPTIONS IMPORT: data channel crypto options modified
2023-03-24 15:51:20 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2023-03-24 15:51:20 do_ifconfig, ipv4=1, ipv6=0
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,ASSIGN_IP,,10.8.0.2,,,,
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2023-03-24 15:51:20 Opening tun interface:
2023-03-24 15:51:20 Local IPv4: 10.8.0.2/24 IPv6: (not set) MTU: 1500
2023-03-24 15:51:20 DNS Server: 8.8.8.8, 8.8.4.4, Domain: null
2023-03-24 15:51:20 Routes: 0.0.0.0/0, 10.8.0.0/24 
2023-03-24 15:51:20 Routes excluded: 192.168.1.239/24 fe80:0:0:0:cce2:d7ff:fe5a:d07/64
2023-03-24 15:51:20 Disallowed VPN apps: app.aawireless
2023-03-24 15:51:20 Apps may bypass VPN
2023-03-24 15:51:20 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2023-03-24 15:51:20 Data Channel MTU parms [ mss_fix:1215 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1768 tailroom:562 ET:0 ]
2023-03-24 15:51:20 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:51:20 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2023-03-24 15:51:20 Initialization Sequence Completed
2023-03-24 15:51:20 MANAGEMENT: >STATE:1679687480,CONNECTED,SUCCESS,10.8.0.2,100.4.104.240,1194,,
2023-03-24 15:54:27 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_00000000000000000000000000000000000000000000000111111111111111] 0:791 0:790 t=1679687667[0] r=[-1,64,15,1,1] sl=[41,64,64,528]
2023-03-24 15:54:32 PID_ERR replay-window backtrack occurred [3] [SSL-0] [00__000000000000000000000000000000000000000000000000000000000000] 0:2027 0:2024 t=1679687672[0] r=[-1,64,15,3,1] sl=[21,64,64,528]

Configuration file

add the contents of the configuration file if applicable
be careful to not post private keys
schwabe commented 1 year ago

There are several indications of bad network connection in the log. But please also describe the problem in more detail.

SoNic1967 commented 1 year ago

The connection works fine at the beginning.

But, after a few minutes, it just stops working. I turn off the VPN, remaining on normal WiFi, and it works.

I will change my phone today, will try to see if that makes a difference.

From: Arne Schwabe @.> Sent: Friday, March 24, 2023 8:19 PM To: schwabe/ics-openvpn @.> Cc: SoNic1967 @.>; Author @.> Subject: Re: [schwabe/ics-openvpn] Connection stops working after a while (Issue #1599)

There are several indications of bad network connection in the log. But please also describe the problem in more detail.

— Reply to this email directly, view it on GitHub https://github.com/schwabe/ics-openvpn/issues/1599#issuecomment-1483624082 , or unsubscribe https://github.com/notifications/unsubscribe-auth/AHKZOODQV3HHFHOJSLDINRDW5Y2V5ANCNFSM6AAAAAAWG7LRME . You are receiving this because you authored the thread. https://github.com/notifications/beacon/AHKZOOAZCD5T52UJDKEEHYTW5Y2V5A5CNFSM6AAAAAAWG7LRMGWGG33NNVSW45C7OR4XAZNMJFZXG5LFINXW23LFNZ2KUY3PNVWWK3TUL5UWJTSYNZHJE.gif Message ID: @.***>

schwabe commented 1 year ago

That looks like more an issue that you should sort out with your VPN provider.

ahmedyhabib commented 1 year ago

Please help vpn

ahmedyhabib commented 1 year ago

Please help vpn

ahmedyhabib commented 1 year ago

help tu in Ethiopia

ahmedyhabib commented 1 year ago

Help tu in Ethiopia