root@m22:~ # openvpn --config /usr/local/etc/openvpn/Pennsylvania/Metallah/direct-tcp/airvpn.ovpn
Sun Dec 4 11:05:45 2016 OpenVPN 2.3.11 amd64-portbld-freebsd11.0 [SSL (OpenSSL)] [LZO] [MH] [IPv6] built on Nov 30 2016
Sun Dec 4 11:05:45 2016 library versions: OpenSSL 1.0.2h 3 May 2016, LZO 2.09
Sun Dec 4 11:05:45 2016 WARNING: file '/usr/local/etc/openvpn/Pennsylvania/Metallah/direct-tcp/user.key' is group or others accessible
Sun Dec 4 11:05:45 2016 WARNING: file '/usr/local/etc/openvpn/Pennsylvania/Metallah/direct-tcp/ta.key' is group or others accessible
Sun Dec 4 11:05:45 2016 Control Channel Authentication: using '/usr/local/etc/openvpn/Pennsylvania/Metallah/direct-tcp/ta.key' as a OpenVPN static key file
Sun Dec 4 11:05:45 2016 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:05:45 2016 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:05:45 2016 Socket Buffers: R=[65536->65536] S=[32768->32768]
Sun Dec 4 11:05:45 2016 Attempting to establish TCP connection with [AF_INET]104.243.24.235:443 [nonblock]
Sun Dec 4 11:05:46 2016 TCP connection established with [AF_INET]104.243.24.235:443
Sun Dec 4 11:05:46 2016 TCPv4_CLIENT link local: [undef]
Sun Dec 4 11:05:46 2016 TCPv4_CLIENT link remote: [AF_INET]104.243.24.235:443
Sun Dec 4 11:05:46 2016 TLS: Initial packet from [AF_INET]104.243.24.235:443, sid=96f28bf9 c30435ff
Sun Dec 4 11:05:46 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sun Dec 4 11:05:46 2016 Validating certificate key usage
Sun Dec 4 11:05:46 2016 ++ Certificate has key usage 00a0, expects 00a0
Sun Dec 4 11:05:46 2016 VERIFY KU OK
Sun Dec 4 11:05:46 2016 Validating certificate extended key usage
Sun Dec 4 11:05:46 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Dec 4 11:05:46 2016 VERIFY EKU OK
Sun Dec 4 11:05:46 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sun Dec 4 11:05:47 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:05:47 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:05:47 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:05:47 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:05:47 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Dec 4 11:05:47 2016 [server] Peer Connection Initiated with [AF_INET]104.243.24.235:443
Sun Dec 4 11:05:50 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Dec 4 11:05:50 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.121 255.255.0.0'
Sun Dec 4 11:05:50 2016 OPTIONS IMPORT: timers and/or timeouts modified
Sun Dec 4 11:05:50 2016 OPTIONS IMPORT: LZO parms modified
Sun Dec 4 11:05:50 2016 OPTIONS IMPORT: --ifconfig/up options modified
Sun Dec 4 11:05:50 2016 OPTIONS IMPORT: route options modified
Sun Dec 4 11:05:50 2016 OPTIONS IMPORT: route-related options modified
Sun Dec 4 11:05:50 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Dec 4 11:05:50 2016 ROUTE_GATEWAY 192.168.0.1
Sun Dec 4 11:05:50 2016 TUN/TAP device /dev/tun1 opened
Sun Dec 4 11:05:50 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sun Dec 4 11:05:50 2016 /sbin/ifconfig tun1 10.5.4.121 10.5.0.1 mtu 1500 netmask 255.255.0.0 up
Sun Dec 4 11:05:50 2016 /sbin/route add -net 10.5.0.0 10.5.4.121 255.255.0.0
add net 10.5.0.0: gateway 10.5.4.121 fib 0: route already in table
Sun Dec 4 11:05:50 2016 ERROR: FreeBSD route add command failed: external program exited with error status: 1
Sun Dec 4 11:05:50 2016 /sbin/route add -net 104.243.24.235 192.168.0.1 255.255.255.255
add net 104.243.24.235: gateway 192.168.0.1 fib 0: route already in table
Sun Dec 4 11:05:50 2016 ERROR: FreeBSD route add command failed: external program exited with error status: 1
Sun Dec 4 11:05:50 2016 /sbin/route add -net 0.0.0.0 10.5.0.1 128.0.0.0
add net 0.0.0.0: gateway 10.5.0.1 fib 0: route already in table
Sun Dec 4 11:05:50 2016 ERROR: FreeBSD route add command failed: external program exited with error status: 1
Sun Dec 4 11:05:50 2016 /sbin/route add -net 128.0.0.0 10.5.0.1 128.0.0.0
add net 128.0.0.0: gateway 10.5.0.1 fib 0: route already in table
Sun Dec 4 11:05:50 2016 ERROR: FreeBSD route add command failed: external program exited with error status: 1
Sun Dec 4 11:05:50 2016 Initialization Sequence Completed
Sun Dec 4 11:05:55 2016 Connection reset, restarting [0]
Sun Dec 4 11:05:55 2016 SIGUSR1[soft,connection-reset] received, process restarting
Sun Dec 4 11:05:55 2016 Restart pause, 5 second(s)
Sun Dec 4 11:06:00 2016 Socket Buffers: R=[65536->65536] S=[32768->32768]
Sun Dec 4 11:06:00 2016 Attempting to establish TCP connection with [AF_INET]104.243.24.235:443 [nonblock]
Sun Dec 4 11:06:01 2016 TCP connection established with [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:01 2016 TCPv4_CLIENT link local: [undef]
Sun Dec 4 11:06:01 2016 TCPv4_CLIENT link remote: [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:01 2016 TLS: Initial packet from [AF_INET]104.243.24.235:443, sid=596249d3 ec7c3370
Sun Dec 4 11:06:02 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sun Dec 4 11:06:02 2016 Validating certificate key usage
Sun Dec 4 11:06:02 2016 ++ Certificate has key usage 00a0, expects 00a0
Sun Dec 4 11:06:02 2016 VERIFY KU OK
Sun Dec 4 11:06:02 2016 Validating certificate extended key usage
Sun Dec 4 11:06:02 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Dec 4 11:06:02 2016 VERIFY EKU OK
Sun Dec 4 11:06:02 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sun Dec 4 11:06:02 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:06:02 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:06:02 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:06:02 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:06:02 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Dec 4 11:06:02 2016 [server] Peer Connection Initiated with [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:04 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Dec 4 11:06:05 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.121 255.255.0.0'
Sun Dec 4 11:06:05 2016 OPTIONS IMPORT: timers and/or timeouts modified
Sun Dec 4 11:06:05 2016 OPTIONS IMPORT: LZO parms modified
Sun Dec 4 11:06:05 2016 OPTIONS IMPORT: --ifconfig/up options modified
Sun Dec 4 11:06:05 2016 OPTIONS IMPORT: route options modified
Sun Dec 4 11:06:05 2016 OPTIONS IMPORT: route-related options modified
Sun Dec 4 11:06:05 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Dec 4 11:06:05 2016 Preserving previous TUN/TAP instance: tun1
Sun Dec 4 11:06:05 2016 Initialization Sequence Completed
Sun Dec 4 11:06:10 2016 Connection reset, restarting [0]
Sun Dec 4 11:06:10 2016 SIGUSR1[soft,connection-reset] received, process restarting
Sun Dec 4 11:06:10 2016 Restart pause, 5 second(s)
Sun Dec 4 11:06:15 2016 Socket Buffers: R=[65536->65536] S=[32768->32768]
Sun Dec 4 11:06:15 2016 Attempting to establish TCP connection with [AF_INET]104.243.24.235:443 [nonblock]
Sun Dec 4 11:06:16 2016 TCP connection established with [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:16 2016 TCPv4_CLIENT link local: [undef]
Sun Dec 4 11:06:16 2016 TCPv4_CLIENT link remote: [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:16 2016 TLS: Initial packet from [AF_INET]104.243.24.235:443, sid=a6a7a62b 4fa72d94
Sun Dec 4 11:06:17 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sun Dec 4 11:06:17 2016 Validating certificate key usage
Sun Dec 4 11:06:17 2016 ++ Certificate has key usage 00a0, expects 00a0
Sun Dec 4 11:06:17 2016 VERIFY KU OK
Sun Dec 4 11:06:17 2016 Validating certificate extended key usage
Sun Dec 4 11:06:17 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Dec 4 11:06:17 2016 VERIFY EKU OK
Sun Dec 4 11:06:17 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sun Dec 4 11:06:17 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:06:17 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:06:17 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:06:17 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:06:17 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Dec 4 11:06:17 2016 [server] Peer Connection Initiated with [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:19 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Dec 4 11:06:20 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.4.121 255.255.0.0'
Sun Dec 4 11:06:20 2016 OPTIONS IMPORT: timers and/or timeouts modified
Sun Dec 4 11:06:20 2016 OPTIONS IMPORT: LZO parms modified
Sun Dec 4 11:06:20 2016 OPTIONS IMPORT: --ifconfig/up options modified
Sun Dec 4 11:06:20 2016 OPTIONS IMPORT: route options modified
Sun Dec 4 11:06:20 2016 OPTIONS IMPORT: route-related options modified
Sun Dec 4 11:06:20 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Dec 4 11:06:20 2016 Preserving previous TUN/TAP instance: tun1
Sun Dec 4 11:06:20 2016 Initialization Sequence Completed
Sun Dec 4 11:06:25 2016 Connection reset, restarting [0]
Sun Dec 4 11:06:25 2016 SIGUSR1[soft,connection-reset] received, process restarting
Sun Dec 4 11:06:25 2016 Restart pause, 5 second(s)
Sun Dec 4 11:06:30 2016 Socket Buffers: R=[65536->65536] S=[32768->32768]
Sun Dec 4 11:06:30 2016 Attempting to establish TCP connection with [AF_INET]104.243.24.235:443 [nonblock]
Sun Dec 4 11:06:31 2016 TCP connection established with [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:31 2016 TCPv4_CLIENT link local: [undef]
Sun Dec 4 11:06:31 2016 TCPv4_CLIENT link remote: [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:31 2016 TLS: Initial packet from [AF_INET]104.243.24.235:443, sid=fae8e25c d6244e11
Sun Dec 4 11:06:32 2016 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sun Dec 4 11:06:32 2016 Validating certificate key usage
Sun Dec 4 11:06:32 2016 ++ Certificate has key usage 00a0, expects 00a0
Sun Dec 4 11:06:32 2016 VERIFY KU OK
Sun Dec 4 11:06:32 2016 Validating certificate extended key usage
Sun Dec 4 11:06:32 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Dec 4 11:06:32 2016 VERIFY EKU OK
Sun Dec 4 11:06:32 2016 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sun Dec 4 11:06:32 2016 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:06:32 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:06:32 2016 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Dec 4 11:06:32 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 4 11:06:32 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Dec 4 11:06:32 2016 [server] Peer Connection Initiated with [AF_INET]104.243.24.235:443
Sun Dec 4 11:06:35 2016 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Dec 4 11:06:35 2016 AUTH: Received control message: AUTH_FAILED
Sun Dec 4 11:06:35 2016 /sbin/route delete -net 104.243.24.235 192.168.0.1 255.255.255.255
route: route has not been found
delete net 104.243.24.235: gateway 192.168.0.1 fib 0: not in table
Sun Dec 4 11:06:35 2016 ERROR: FreeBSD route delete command failed: external program exited with error status: 1
Sun Dec 4 11:06:35 2016 /sbin/route delete -net 0.0.0.0 10.5.0.1 128.0.0.0
route: route has not been found
delete net 0.0.0.0: gateway 10.5.0.1 fib 0: not in table
Sun Dec 4 11:06:35 2016 ERROR: FreeBSD route delete command failed: external program exited with error status: 1
Sun Dec 4 11:06:35 2016 /sbin/route delete -net 128.0.0.0 10.5.0.1 128.0.0.0
route: route has not been found
delete net 128.0.0.0: gateway 10.5.0.1 fib 0: not in table
Sun Dec 4 11:06:35 2016 ERROR: FreeBSD route delete command failed: external program exited with error status: 1
Sun Dec 4 11:06:35 2016 Closing TUN/TAP interface
Sun Dec 4 11:06:35 2016 /sbin/ifconfig tun1 destroy
Sun Dec 4 11:06:35 2016 SIGTERM[soft,auth-failure] received, process exiting
root@m22:~ #