021-07-21 17:52:05 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2021-07-21 17:52:05 OpenVPN 2.5.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021
2021-07-21 17:52:05 Windows version 6.1 (Windows 7) 32bit
2021-07-21 17:52:05 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
Enter Management Password:
2021-07-21 17:52:05 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342
2021-07-21 17:52:05 Need hold release from management interface, waiting...
2021-07-21 17:52:06 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25342
2021-07-21 17:52:06 MANAGEMENT: CMD 'state on'
2021-07-21 17:52:06 MANAGEMENT: CMD 'log all on'
2021-07-21 17:52:06 MANAGEMENT: CMD 'echo all on'
2021-07-21 17:52:06 MANAGEMENT: CMD 'bytecount 5'
2021-07-21 17:52:06 MANAGEMENT: CMD 'hold off'
2021-07-21 17:52:06 MANAGEMENT: CMD 'hold release'
2021-07-21 17:52:06 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:52:06 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:06 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:52:06 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:52:06 MANAGEMENT: >STATE:1626871926,TCP_CONNECT,,,,,,
2021-07-21 17:52:06 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:52:06 TCP_CLIENT link local: (not bound)
2021-07-21 17:52:06 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:06 MANAGEMENT: >STATE:1626871926,WAIT,,,,,,
2021-07-21 17:52:07 MANAGEMENT: >STATE:1626871927,AUTH,,,,,,
2021-07-21 17:52:07 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=bed3c0a0 e8965fcd
2021-07-21 17:52:08 Connection reset, restarting [-1]
2021-07-21 17:52:08 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:52:08 MANAGEMENT: >STATE:1626871928,RECONNECTING,connection-reset,,,,,
2021-07-21 17:52:08 Restart pause, 5 second(s)
2021-07-21 17:52:13 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:52:13 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:13 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:52:13 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:52:13 MANAGEMENT: >STATE:1626871933,TCP_CONNECT,,,,,,
2021-07-21 17:52:13 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:52:13 TCP_CLIENT link local: (not bound)
2021-07-21 17:52:13 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:13 MANAGEMENT: >STATE:1626871933,WAIT,,,,,,
2021-07-21 17:52:13 MANAGEMENT: >STATE:1626871933,AUTH,,,,,,
2021-07-21 17:52:13 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=eb95ec62 fa03a8fd
2021-07-21 17:52:14 Connection reset, restarting [-1]
2021-07-21 17:52:14 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:52:14 MANAGEMENT: >STATE:1626871934,RECONNECTING,connection-reset,,,,,
2021-07-21 17:52:14 Restart pause, 5 second(s)
2021-07-21 17:52:19 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:52:19 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:19 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:52:19 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:52:19 MANAGEMENT: >STATE:1626871939,TCP_CONNECT,,,,,,
2021-07-21 17:52:19 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:52:19 TCP_CLIENT link local: (not bound)
2021-07-21 17:52:19 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:19 MANAGEMENT: >STATE:1626871939,WAIT,,,,,,
2021-07-21 17:52:19 MANAGEMENT: >STATE:1626871939,AUTH,,,,,,
2021-07-21 17:52:19 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=c45a1ee5 1183cca0
2021-07-21 17:52:20 Connection reset, restarting [-1]
2021-07-21 17:52:20 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:52:20 MANAGEMENT: >STATE:1626871940,RECONNECTING,connection-reset,,,,,
2021-07-21 17:52:20 Restart pause, 5 second(s)
2021-07-21 17:52:25 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:52:25 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:25 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:52:25 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:52:25 MANAGEMENT: >STATE:1626871945,TCP_CONNECT,,,,,,
2021-07-21 17:52:25 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:52:25 TCP_CLIENT link local: (not bound)
2021-07-21 17:52:25 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:25 MANAGEMENT: >STATE:1626871945,WAIT,,,,,,
2021-07-21 17:52:25 MANAGEMENT: >STATE:1626871945,AUTH,,,,,,
2021-07-21 17:52:25 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=97a49a3c 2877e9b5
2021-07-21 17:52:26 Connection reset, restarting [-1]
2021-07-21 17:52:26 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:52:26 MANAGEMENT: >STATE:1626871946,RECONNECTING,connection-reset,,,,,
2021-07-21 17:52:26 Restart pause, 5 second(s)
2021-07-21 17:52:31 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:52:31 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:31 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:52:31 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:52:31 MANAGEMENT: >STATE:1626871951,TCP_CONNECT,,,,,,
2021-07-21 17:52:32 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:52:32 TCP_CLIENT link local: (not bound)
2021-07-21 17:52:32 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:52:32 MANAGEMENT: >STATE:1626871952,WAIT,,,,,,
2021-07-21 17:52:32 MANAGEMENT: >STATE:1626871952,AUTH,,,,,,
2021-07-21 17:52:32 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=2d4cddef 3e9dbb73
2021-07-21 17:52:33 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
2021-07-21 17:52:33 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
2021-07-21 17:52:33 VERIFY OK: depth=0, CN=*.opengw.net
2021-07-21 17:52:34 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2021-07-21 17:52:34 [*.opengw.net] Peer Connection Initiated with [AF_INET]31.207.212.207:1379
2021-07-21 17:52:36 MANAGEMENT: >STATE:1626871956,GET_CONFIG,,,,,,
2021-07-21 17:52:36 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
2021-07-21 17:52:36 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.237 10.211.1.238,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.238,redirect-gateway def1'
2021-07-21 17:52:36 OPTIONS IMPORT: timers and/or timeouts modified
2021-07-21 17:52:36 OPTIONS IMPORT: --ifconfig/up options modified
2021-07-21 17:52:36 OPTIONS IMPORT: route options modified
2021-07-21 17:52:36 OPTIONS IMPORT: route-related options modified
2021-07-21 17:52:36 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2021-07-21 17:52:36 Using peer cipher 'AES-128-CBC'
2021-07-21 17:52:36 Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
2021-07-21 17:52:36 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-07-21 17:52:36 Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
2021-07-21 17:52:36 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-07-21 17:52:36 interactive service msg_channel=0
2021-07-21 17:52:36 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=00:24:1d:90:86:a3
2021-07-21 17:52:36 open_tun
2021-07-21 17:52:36 tap-windows6 device [OpenVPN TAP-Windows6] opened
2021-07-21 17:52:36 TAP-Windows Driver Version 9.24
2021-07-21 17:52:36 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.237/255.255.255.252 on interface {C3E579F2-9BF5-4216-9854-C342BD98F2A7} [DHCP-serv: 10.211.1.238, lease-time: 31536000]
2021-07-21 17:52:36 Successful ARP Flush on interface [40] {C3E579F2-9BF5-4216-9854-C342BD98F2A7}
2021-07-21 17:52:36 MANAGEMENT: >STATE:1626871956,ASSIGN_IP,,10.211.1.237,,,,
2021-07-21 17:52:36 IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry()
2021-07-21 17:52:41 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
2021-07-21 17:52:41 C:\Windows\system32\route.exe ADD 31.207.212.207 MASK 255.255.255.255 192.168.1.1
2021-07-21 17:52:41 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
2021-07-21 17:52:41 Route addition via IPAPI succeeded [adaptive]
2021-07-21 17:52:41 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.238
2021-07-21 17:52:41 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
2021-07-21 17:52:41 Route addition via IPAPI succeeded [adaptive]
2021-07-21 17:52:41 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.238
2021-07-21 17:52:41 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
2021-07-21 17:52:41 Route addition via IPAPI succeeded [adaptive]
2021-07-21 17:52:41 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2021-07-21 17:52:41 Initialization Sequence Completed
2021-07-21 17:52:41 MANAGEMENT: >STATE:1626871961,CONNECTED,SUCCESS,10.211.1.237,31.207.212.207,1379,192.168.1.102,60331
2021-07-21 17:57:54 [*.opengw.net] Inactivity timeout (--ping-restart), restarting
2021-07-21 17:57:54 SIGUSR1[soft,ping-restart] received, process restarting
2021-07-21 17:57:54 MANAGEMENT: >STATE:1626872274,RECONNECTING,ping-restart,,,,,
2021-07-21 17:57:54 Restart pause, 5 second(s)
2021-07-21 17:57:59 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:57:59 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:57:59 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:57:59 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:57:59 MANAGEMENT: >STATE:1626872279,TCP_CONNECT,,,,,,
2021-07-21 17:57:59 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:57:59 TCP_CLIENT link local: (not bound)
2021-07-21 17:57:59 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:57:59 MANAGEMENT: >STATE:1626872279,WAIT,,,,,,
2021-07-21 17:57:59 MANAGEMENT: >STATE:1626872279,AUTH,,,,,,
2021-07-21 17:57:59 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=ee9acd0b 033d4c82
2021-07-21 17:58:00 Connection reset, restarting [-1]
2021-07-21 17:58:00 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:58:00 MANAGEMENT: >STATE:1626872280,RECONNECTING,connection-reset,,,,,
2021-07-21 17:58:00 Restart pause, 5 second(s)
2021-07-21 17:58:05 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:58:05 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:58:05 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:58:05 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:58:05 MANAGEMENT: >STATE:1626872285,TCP_CONNECT,,,,,,
2021-07-21 17:58:05 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:58:05 TCP_CLIENT link local: (not bound)
2021-07-21 17:58:05 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:58:05 MANAGEMENT: >STATE:1626872285,WAIT,,,,,,
2021-07-21 17:58:07 MANAGEMENT: >STATE:1626872287,AUTH,,,,,,
2021-07-21 17:58:07 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=2a93fa9c 0fef0516
2021-07-21 17:58:15 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
2021-07-21 17:58:15 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
2021-07-21 17:58:15 VERIFY OK: depth=0, CN=*.opengw.net
2021-07-21 17:58:47 [*.opengw.net] Inactivity timeout (--ping-restart), restarting
2021-07-21 17:58:47 SIGUSR1[soft,ping-restart] received, process restarting
2021-07-21 17:58:47 MANAGEMENT: >STATE:1626872327,RECONNECTING,ping-restart,,,,,
2021-07-21 17:58:47 Restart pause, 5 second(s)
2021-07-21 17:58:52 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:58:52 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:58:52 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:58:52 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:58:52 MANAGEMENT: >STATE:1626872332,TCP_CONNECT,,,,,,
2021-07-21 17:58:52 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:58:52 TCP_CLIENT link local: (not bound)
2021-07-21 17:58:52 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:58:52 MANAGEMENT: >STATE:1626872332,WAIT,,,,,,
2021-07-21 17:58:53 MANAGEMENT: >STATE:1626872333,AUTH,,,,,,
2021-07-21 17:58:53 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=74136847 21b9dd91
2021-07-21 17:58:55 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
2021-07-21 17:58:55 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
2021-07-21 17:58:55 VERIFY OK: depth=0, CN=*.opengw.net
2021-07-21 17:58:57 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2021-07-21 17:58:57 [*.opengw.net] Peer Connection Initiated with [AF_INET]31.207.212.207:1379
2021-07-21 17:58:58 MANAGEMENT: >STATE:1626872338,GET_CONFIG,,,,,,
2021-07-21 17:58:58 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
2021-07-21 17:58:59 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.153 10.211.1.154,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.154,redirect-gateway def1'
2021-07-21 17:58:59 OPTIONS IMPORT: timers and/or timeouts modified
2021-07-21 17:58:59 OPTIONS IMPORT: --ifconfig/up options modified
2021-07-21 17:58:59 OPTIONS IMPORT: route options modified
2021-07-21 17:58:59 OPTIONS IMPORT: route-related options modified
2021-07-21 17:58:59 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2021-07-21 17:58:59 Using peer cipher 'AES-128-CBC'
2021-07-21 17:58:59 Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
2021-07-21 17:58:59 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-07-21 17:58:59 Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
2021-07-21 17:58:59 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-07-21 17:58:59 Preserving previous TUN/TAP instance: OpenVPN TAP-Windows6
2021-07-21 17:58:59 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
2021-07-21 17:58:59 C:\Windows\system32\route.exe DELETE 31.207.212.207 MASK 255.255.255.255 192.168.1.1
2021-07-21 17:58:59 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 17:58:59 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.211.1.238
2021-07-21 17:58:59 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 17:58:59 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.211.1.238
2021-07-21 17:58:59 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 17:58:59 Closing TUN/TAP interface
2021-07-21 17:58:59 TAP: DHCP address released
2021-07-21 17:59:00 interactive service msg_channel=0
2021-07-21 17:59:00 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=00:24:1d:90:86:a3
2021-07-21 17:59:00 open_tun
2021-07-21 17:59:00 tap-windows6 device [OpenVPN TAP-Windows6] opened
2021-07-21 17:59:00 TAP-Windows Driver Version 9.24
2021-07-21 17:59:00 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.153/255.255.255.252 on interface {C3E579F2-9BF5-4216-9854-C342BD98F2A7} [DHCP-serv: 10.211.1.154, lease-time: 31536000]
2021-07-21 17:59:00 Successful ARP Flush on interface [40] {C3E579F2-9BF5-4216-9854-C342BD98F2A7}
2021-07-21 17:59:00 MANAGEMENT: >STATE:1626872340,ASSIGN_IP,,10.211.1.153,,,,
2021-07-21 17:59:00 IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry()
2021-07-21 17:59:05 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
2021-07-21 17:59:05 C:\Windows\system32\route.exe ADD 31.207.212.207 MASK 255.255.255.255 192.168.1.1
2021-07-21 17:59:05 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
2021-07-21 17:59:05 Route addition via IPAPI succeeded [adaptive]
2021-07-21 17:59:05 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.154
2021-07-21 17:59:05 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
2021-07-21 17:59:05 Route addition via IPAPI succeeded [adaptive]
2021-07-21 17:59:05 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.154
2021-07-21 17:59:05 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
2021-07-21 17:59:05 Route addition via IPAPI succeeded [adaptive]
2021-07-21 17:59:05 Initialization Sequence Completed
2021-07-21 17:59:05 MANAGEMENT: >STATE:1626872345,CONNECTED,SUCCESS,10.211.1.153,31.207.212.207,1379,192.168.1.102,60865
2021-07-21 17:59:32 [*.opengw.net] Inactivity timeout (--ping-restart), restarting
2021-07-21 17:59:32 SIGUSR1[soft,ping-restart] received, process restarting
2021-07-21 17:59:32 MANAGEMENT: >STATE:1626872372,RECONNECTING,ping-restart,,,,,
2021-07-21 17:59:32 Restart pause, 5 second(s)
2021-07-21 17:59:37 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:59:37 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:37 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:59:37 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:59:37 MANAGEMENT: >STATE:1626872377,TCP_CONNECT,,,,,,
2021-07-21 17:59:37 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:59:37 TCP_CLIENT link local: (not bound)
2021-07-21 17:59:37 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:37 MANAGEMENT: >STATE:1626872377,WAIT,,,,,,
2021-07-21 17:59:38 MANAGEMENT: >STATE:1626872378,AUTH,,,,,,
2021-07-21 17:59:38 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=f9d08a15 381fe1bd
2021-07-21 17:59:39 Connection reset, restarting [-1]
2021-07-21 17:59:39 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:59:39 MANAGEMENT: >STATE:1626872379,RECONNECTING,connection-reset,,,,,
2021-07-21 17:59:39 Restart pause, 5 second(s)
2021-07-21 17:59:44 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:59:44 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:44 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:59:44 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:59:44 MANAGEMENT: >STATE:1626872384,TCP_CONNECT,,,,,,
2021-07-21 17:59:44 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:59:44 TCP_CLIENT link local: (not bound)
2021-07-21 17:59:44 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:44 MANAGEMENT: >STATE:1626872384,WAIT,,,,,,
2021-07-21 17:59:44 MANAGEMENT: >STATE:1626872384,AUTH,,,,,,
2021-07-21 17:59:44 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=9fff8cda e5fa77c4
2021-07-21 17:59:45 Connection reset, restarting [-1]
2021-07-21 17:59:45 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:59:45 MANAGEMENT: >STATE:1626872385,RECONNECTING,connection-reset,,,,,
2021-07-21 17:59:45 Restart pause, 5 second(s)
2021-07-21 17:59:50 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:59:50 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:50 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:59:50 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:59:50 MANAGEMENT: >STATE:1626872390,TCP_CONNECT,,,,,,
2021-07-21 17:59:50 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:59:50 TCP_CLIENT link local: (not bound)
2021-07-21 17:59:50 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:50 MANAGEMENT: >STATE:1626872390,WAIT,,,,,,
2021-07-21 17:59:51 MANAGEMENT: >STATE:1626872391,AUTH,,,,,,
2021-07-21 17:59:51 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=b65d0570 4af6ab9f
2021-07-21 17:59:51 Connection reset, restarting [-1]
2021-07-21 17:59:51 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 17:59:51 MANAGEMENT: >STATE:1626872391,RECONNECTING,connection-reset,,,,,
2021-07-21 17:59:51 Restart pause, 5 second(s)
2021-07-21 17:59:56 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 17:59:56 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:56 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 17:59:56 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 17:59:56 MANAGEMENT: >STATE:1626872396,TCP_CONNECT,,,,,,
2021-07-21 17:59:56 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 17:59:56 TCP_CLIENT link local: (not bound)
2021-07-21 17:59:56 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 17:59:56 MANAGEMENT: >STATE:1626872396,WAIT,,,,,,
2021-07-21 17:59:56 MANAGEMENT: >STATE:1626872396,AUTH,,,,,,
2021-07-21 17:59:56 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=2c8d418d 62e24aa9
2021-07-21 17:59:57 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
2021-07-21 17:59:57 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
2021-07-21 17:59:57 VERIFY OK: depth=0, CN=*.opengw.net
2021-07-21 17:59:58 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2021-07-21 17:59:58 [*.opengw.net] Peer Connection Initiated with [AF_INET]31.207.212.207:1379
2021-07-21 17:59:59 MANAGEMENT: >STATE:1626872399,GET_CONFIG,,,,,,
2021-07-21 17:59:59 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
2021-07-21 18:00:01 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10,ifconfig 10.211.1.29 10.211.1.30,dhcp-option DNS 10.211.254.254,dhcp-option DNS 8.8.8.8,route-gateway 10.211.1.30,redirect-gateway def1'
2021-07-21 18:00:01 OPTIONS IMPORT: timers and/or timeouts modified
2021-07-21 18:00:01 OPTIONS IMPORT: --ifconfig/up options modified
2021-07-21 18:00:01 OPTIONS IMPORT: route options modified
2021-07-21 18:00:01 OPTIONS IMPORT: route-related options modified
2021-07-21 18:00:01 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2021-07-21 18:00:01 Using peer cipher 'AES-128-CBC'
2021-07-21 18:00:01 Outgoing Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
2021-07-21 18:00:01 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-07-21 18:00:01 Incoming Data Channel: Cipher 'AES-128-CBC' initialized with 128 bit key
2021-07-21 18:00:01 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
2021-07-21 18:00:01 Preserving previous TUN/TAP instance: OpenVPN TAP-Windows6
2021-07-21 18:00:01 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
2021-07-21 18:00:01 C:\Windows\system32\route.exe DELETE 31.207.212.207 MASK 255.255.255.255 192.168.1.1
2021-07-21 18:00:01 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 18:00:01 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.211.1.154
2021-07-21 18:00:01 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 18:00:01 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.211.1.154
2021-07-21 18:00:01 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 18:00:01 Closing TUN/TAP interface
2021-07-21 18:00:01 TAP: DHCP address released
2021-07-21 18:00:02 interactive service msg_channel=0
2021-07-21 18:00:02 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=11 HWADDR=00:24:1d:90:86:a3
2021-07-21 18:00:03 open_tun
2021-07-21 18:00:03 tap-windows6 device [OpenVPN TAP-Windows6] opened
2021-07-21 18:00:03 TAP-Windows Driver Version 9.24
2021-07-21 18:00:03 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.211.1.29/255.255.255.252 on interface {C3E579F2-9BF5-4216-9854-C342BD98F2A7} [DHCP-serv: 10.211.1.30, lease-time: 31536000]
2021-07-21 18:00:03 Successful ARP Flush on interface [40] {C3E579F2-9BF5-4216-9854-C342BD98F2A7}
2021-07-21 18:00:03 MANAGEMENT: >STATE:1626872403,ASSIGN_IP,,10.211.1.29,,,,
2021-07-21 18:00:03 IPv4 MTU set to 1500 on interface 40 using SetIpInterfaceEntry()
2021-07-21 18:00:08 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
2021-07-21 18:00:08 C:\Windows\system32\route.exe ADD 31.207.212.207 MASK 255.255.255.255 192.168.1.1
2021-07-21 18:00:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
2021-07-21 18:00:08 Route addition via IPAPI succeeded [adaptive]
2021-07-21 18:00:08 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.211.1.30
2021-07-21 18:00:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
2021-07-21 18:00:08 Route addition via IPAPI succeeded [adaptive]
2021-07-21 18:00:08 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.211.1.30
2021-07-21 18:00:08 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
2021-07-21 18:00:08 Route addition via IPAPI succeeded [adaptive]
2021-07-21 18:00:08 Initialization Sequence Completed
2021-07-21 18:00:08 MANAGEMENT: >STATE:1626872408,CONNECTED,SUCCESS,10.211.1.29,31.207.212.207,1379,192.168.1.102,62902
2021-07-21 18:00:28 [*.opengw.net] Inactivity timeout (--ping-restart), restarting
2021-07-21 18:00:28 SIGUSR1[soft,ping-restart] received, process restarting
2021-07-21 18:00:28 MANAGEMENT: >STATE:1626872428,RECONNECTING,ping-restart,,,,,
2021-07-21 18:00:28 Restart pause, 5 second(s)
2021-07-21 18:00:33 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:00:33 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:00:33 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:00:33 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:00:33 MANAGEMENT: >STATE:1626872433,TCP_CONNECT,,,,,,
2021-07-21 18:00:33 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:00:33 TCP_CLIENT link local: (not bound)
2021-07-21 18:00:33 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:00:33 MANAGEMENT: >STATE:1626872433,WAIT,,,,,,
2021-07-21 18:00:33 MANAGEMENT: >STATE:1626872433,AUTH,,,,,,
2021-07-21 18:00:33 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=c46e856d e8e5b0fa
2021-07-21 18:00:38 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
2021-07-21 18:00:38 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
2021-07-21 18:00:38 VERIFY OK: depth=0, CN=*.opengw.net
2021-07-21 18:00:40 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2021-07-21 18:00:40 [*.opengw.net] Peer Connection Initiated with [AF_INET]31.207.212.207:1379
2021-07-21 18:00:41 MANAGEMENT: >STATE:1626872441,GET_CONFIG,,,,,,
2021-07-21 18:00:41 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
2021-07-21 18:00:42 AUTH: Received control message: AUTH_FAILED
2021-07-21 18:00:42 SIGUSR1[soft,auth-failure] received, process restarting
2021-07-21 18:00:42 MANAGEMENT: >STATE:1626872442,RECONNECTING,auth-failure,,,,,
2021-07-21 18:00:42 Restart pause, 5 second(s)
2021-07-21 18:00:47 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:00:47 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:00:47 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:00:47 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:00:47 MANAGEMENT: >STATE:1626872447,TCP_CONNECT,,,,,,
2021-07-21 18:00:47 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:00:47 TCP_CLIENT link local: (not bound)
2021-07-21 18:00:47 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:00:47 MANAGEMENT: >STATE:1626872447,WAIT,,,,,,
2021-07-21 18:00:47 MANAGEMENT: >STATE:1626872447,AUTH,,,,,,
2021-07-21 18:00:47 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=a3a69fde 2903a1d6
2021-07-21 18:00:48 Connection reset, restarting [-1]
2021-07-21 18:00:48 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:00:48 MANAGEMENT: >STATE:1626872448,RECONNECTING,connection-reset,,,,,
2021-07-21 18:00:48 Restart pause, 5 second(s)
2021-07-21 18:00:53 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:00:53 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:00:53 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:00:53 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:00:53 MANAGEMENT: >STATE:1626872453,TCP_CONNECT,,,,,,
2021-07-21 18:00:53 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:00:53 TCP_CLIENT link local: (not bound)
2021-07-21 18:00:53 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:00:53 MANAGEMENT: >STATE:1626872453,WAIT,,,,,,
2021-07-21 18:00:54 MANAGEMENT: >STATE:1626872454,AUTH,,,,,,
2021-07-21 18:00:54 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=13289352 6ef9ecde
2021-07-21 18:00:55 Connection reset, restarting [-1]
2021-07-21 18:00:55 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:00:55 MANAGEMENT: >STATE:1626872455,RECONNECTING,connection-reset,,,,,
2021-07-21 18:00:55 Restart pause, 5 second(s)
2021-07-21 18:01:00 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:01:00 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:00 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:01:00 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:01:00 MANAGEMENT: >STATE:1626872460,TCP_CONNECT,,,,,,
2021-07-21 18:01:00 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:00 TCP_CLIENT link local: (not bound)
2021-07-21 18:01:00 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:00 MANAGEMENT: >STATE:1626872460,WAIT,,,,,,
2021-07-21 18:01:00 MANAGEMENT: >STATE:1626872460,AUTH,,,,,,
2021-07-21 18:01:00 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=a4d1d9dc be0188c0
2021-07-21 18:01:03 VERIFY OK: depth=2, C=US, ST=New Jersey, L=Jersey City, O=The USERTRUST Network, CN=USERTrust RSA Certification Authority
2021-07-21 18:01:03 VERIFY OK: depth=1, C=GB, ST=Greater Manchester, L=Salford, O=Sectigo Limited, CN=Sectigo RSA Domain Validation Secure Server CA
2021-07-21 18:01:03 VERIFY OK: depth=0, CN=*.opengw.net
2021-07-21 18:01:18 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2021-07-21 18:01:18 [*.opengw.net] Peer Connection Initiated with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:19 MANAGEMENT: >STATE:1626872479,GET_CONFIG,,,,,,
2021-07-21 18:01:19 SENT CONTROL [*.opengw.net]: 'PUSH_REQUEST' (status=1)
2021-07-21 18:01:21 AUTH: Received control message: AUTH_FAILED
2021-07-21 18:01:21 SIGUSR1[soft,auth-failure] received, process restarting
2021-07-21 18:01:21 MANAGEMENT: >STATE:1626872481,RECONNECTING,auth-failure,,,,,
2021-07-21 18:01:21 Restart pause, 5 second(s)
2021-07-21 18:01:26 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:01:26 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:26 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:01:26 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:01:26 MANAGEMENT: >STATE:1626872486,TCP_CONNECT,,,,,,
2021-07-21 18:01:26 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:26 TCP_CLIENT link local: (not bound)
2021-07-21 18:01:26 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:26 MANAGEMENT: >STATE:1626872486,WAIT,,,,,,
2021-07-21 18:01:26 MANAGEMENT: >STATE:1626872486,AUTH,,,,,,
2021-07-21 18:01:26 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=9fa0eb65 4730a902
2021-07-21 18:01:27 Connection reset, restarting [-1]
2021-07-21 18:01:27 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:01:27 MANAGEMENT: >STATE:1626872487,RECONNECTING,connection-reset,,,,,
2021-07-21 18:01:27 Restart pause, 5 second(s)
2021-07-21 18:01:32 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:01:32 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:32 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:01:32 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:01:32 MANAGEMENT: >STATE:1626872492,TCP_CONNECT,,,,,,
2021-07-21 18:01:33 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:33 TCP_CLIENT link local: (not bound)
2021-07-21 18:01:33 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:33 MANAGEMENT: >STATE:1626872493,WAIT,,,,,,
2021-07-21 18:01:33 MANAGEMENT: >STATE:1626872493,AUTH,,,,,,
2021-07-21 18:01:33 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=c3f24218 addbeaca
2021-07-21 18:01:34 Connection reset, restarting [-1]
2021-07-21 18:01:34 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:01:34 MANAGEMENT: >STATE:1626872494,RECONNECTING,connection-reset,,,,,
2021-07-21 18:01:34 Restart pause, 5 second(s)
2021-07-21 18:01:39 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:01:39 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:39 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:01:39 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:01:39 MANAGEMENT: >STATE:1626872499,TCP_CONNECT,,,,,,
2021-07-21 18:01:40 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:40 TCP_CLIENT link local: (not bound)
2021-07-21 18:01:40 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:40 MANAGEMENT: >STATE:1626872500,WAIT,,,,,,
2021-07-21 18:01:40 MANAGEMENT: >STATE:1626872500,AUTH,,,,,,
2021-07-21 18:01:40 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=0d5a8866 ddab8349
2021-07-21 18:01:49 MANAGEMENT: CMD 'signal SIGHUP'
2021-07-21 18:01:49 C:\Windows\system32\route.exe DELETE 31.207.212.207 MASK 255.255.255.255 192.168.1.1
2021-07-21 18:01:49 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 18:01:49 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.211.1.30
2021-07-21 18:01:49 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 18:01:49 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.211.1.30
2021-07-21 18:01:49 Route deletion via IPAPI succeeded [adaptive]
2021-07-21 18:01:49 Closing TUN/TAP interface
2021-07-21 18:01:49 TAP: DHCP address released
2021-07-21 18:01:49 SIGHUP[hard,] received, process restarting
2021-07-21 18:01:49 MANAGEMENT: >STATE:1626872509,RECONNECTING,SIGHUP,,,,,
2021-07-21 18:01:49 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2021-07-21 18:01:49 OpenVPN 2.5.3 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jun 17 2021
2021-07-21 18:01:49 Windows version 6.1 (Windows 7) 32bit
2021-07-21 18:01:49 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
2021-07-21 18:01:49 Restart pause, 2 second(s)
2021-07-21 18:01:51 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:01:51 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:51 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:01:51 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:01:51 MANAGEMENT: >STATE:1626872511,TCP_CONNECT,,,,,,
2021-07-21 18:01:52 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:52 TCP_CLIENT link local: (not bound)
2021-07-21 18:01:52 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:52 MANAGEMENT: >STATE:1626872512,WAIT,,,,,,
2021-07-21 18:01:52 MANAGEMENT: >STATE:1626872512,AUTH,,,,,,
2021-07-21 18:01:52 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=6fcbe4d7 24cc5f6d
2021-07-21 18:01:53 Connection reset, restarting [-1]
2021-07-21 18:01:53 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:01:53 MANAGEMENT: >STATE:1626872513,RECONNECTING,connection-reset,,,,,
2021-07-21 18:01:53 Restart pause, 5 second(s)
2021-07-21 18:01:58 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:01:58 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:58 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:01:58 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:01:58 MANAGEMENT: >STATE:1626872518,TCP_CONNECT,,,,,,
2021-07-21 18:01:58 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:01:58 TCP_CLIENT link local: (not bound)
2021-07-21 18:01:58 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:01:58 MANAGEMENT: >STATE:1626872518,WAIT,,,,,,
2021-07-21 18:01:58 MANAGEMENT: >STATE:1626872518,AUTH,,,,,,
2021-07-21 18:01:58 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=2f4f351b 9726b2e6
2021-07-21 18:01:59 Connection reset, restarting [-1]
2021-07-21 18:01:59 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:01:59 MANAGEMENT: >STATE:1626872519,RECONNECTING,connection-reset,,,,,
2021-07-21 18:01:59 Restart pause, 5 second(s)
2021-07-21 18:02:04 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:02:04 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:02:04 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:02:04 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:02:04 MANAGEMENT: >STATE:1626872524,TCP_CONNECT,,,,,,
2021-07-21 18:02:04 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:02:04 TCP_CLIENT link local: (not bound)
2021-07-21 18:02:04 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:02:04 MANAGEMENT: >STATE:1626872524,WAIT,,,,,,
2021-07-21 18:02:05 MANAGEMENT: >STATE:1626872525,AUTH,,,,,,
2021-07-21 18:02:05 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=2fee584c 722b33c2
2021-07-21 18:02:06 Connection reset, restarting [-1]
2021-07-21 18:02:06 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:02:06 MANAGEMENT: >STATE:1626872526,RECONNECTING,connection-reset,,,,,
2021-07-21 18:02:06 Restart pause, 5 second(s)
2021-07-21 18:02:11 WARNING: No server certificate verification method has been enabled. See for more info.
2021-07-21 18:02:11 TCP/UDP: Preserving recently used remote address: [AF_INET]31.207.212.207:1379
2021-07-21 18:02:11 Socket Buffers: R=[8192->8192] S=[8192->8192]
2021-07-21 18:02:11 Attempting to establish TCP connection with [AF_INET]31.207.212.207:1379 [nonblock]
2021-07-21 18:02:11 MANAGEMENT: >STATE:1626872531,TCP_CONNECT,,,,,,
2021-07-21 18:02:12 TCP connection established with [AF_INET]31.207.212.207:1379
2021-07-21 18:02:12 TCP_CLIENT link local: (not bound)
2021-07-21 18:02:12 TCP_CLIENT link remote: [AF_INET]31.207.212.207:1379
2021-07-21 18:02:12 MANAGEMENT: >STATE:1626872532,WAIT,,,,,,
2021-07-21 18:02:12 MANAGEMENT: >STATE:1626872532,AUTH,,,,,,
2021-07-21 18:02:12 TLS: Initial packet from [AF_INET]31.207.212.207:1379, sid=613f623f 9da3b70a
2021-07-21 18:02:12 Connection reset, restarting [-1]
2021-07-21 18:02:12 SIGUSR1[soft,connection-reset] received, process restarting
2021-07-21 18:02:12 MANAGEMENT: >STATE:1626872532,RECONNECTING,connection-reset,,,,,
2021-07-21 18:02:12 Restart pause, 5 second(s)
2021-07-21 18:02:14 SIGTERM[hard,init_instance] received, process exiting
2021-07-21 18:02:14 MANAGEMENT: >STATE:1626872534,EXITING,init_instance,,,,,