Protocol options: protocol-flags cc-exit tls-ekm dyn-tls-cryptTimers: ping 10, ping-restart 60Data Channel: cipher 'AES-256-GCM', peer-id: 0Initialization Sequence Completed/sbin/route add -net 172.16.50.0 10.10.100.1 255.255.255.0/usr/local/etc/inc/plugins.inc.d/openvpn/ovpn-linkup ovpnc1 1500 0 10.10.100.2 255.255.255.0 init/sbin/ifconfig ovpnc1 10.10.100.2/24 mtu 1500 upTUN/TAP device /dev/tun1 openedTUN/TAP device ovpnc1 exists previously, keep at program endROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=vtnet0 HWADDR=bc:24:11:23:cb:dfOPTIONS IMPORT: tun-mtu set to 1500OPTIONS IMPORT: route-related options modifiedOPTIONS IMPORT: route options modifiedOPTIONS IMPORT: --ifconfig/up options modifiedPUSH: Received control message: 'PUSH_REPLY,route 172.16.50.0 255.255.255.0,route-gateway 10.10.100.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.10.100.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500'TLS: tls_multi_process: initial untrusted session promoted to trustedTLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1[BLABLA_OpenVPN] Peer Connection Initiated with [AF_INET]*ServerIP*:2024Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519VERIFY OK: depth=0, CN=BLABLA_OpenVPN, C=DEVERIFY EKU OK++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationValidating certificate extended key usageVERIFY KU OKVERIFY OK: depth=1, CN=Lighthouse_CA, C=DETLS: Initial packet from [AF_INET]*ServerIP*:2024, sid=35902d0a 5dc1c0bfUDPv4 link remote: [AF_INET]*ServerIP*:2024UDPv4 link local (bound): [AF_INET]192.168.0.24:0Socket Buffers: R=[42080->42080] S=[57344->57344]TCP/UDP: Preserving recently used remote address: [AF_INET]*ServerIP*:2024NOTE: the current --script-security setting may allow this configuration to call user-defined scriptsMANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1.socklibrary versions: OpenSSL 3.0.13 30 Jan 2024, LZO 2.10OpenVPN 2.6.10 amd64-portbld-freebsd13.2 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD]
BLABLA/*ClientIP*:43618 Protocol options: explicit-exit-notify 1, protocol-flags cc-exit tls-ekm dyn-tls-cryptBLABLA/*ClientIP*:43618 Timers: ping 10, ping-restart 120, inactive 300BLABLA/*ClientIP*:43618 Data Channel: cipher 'AES-256-GCM', peer-id: 0BLABLA/*ClientIP*:43618 SENT CONTROL [BLABLA]: 'PUSH_REPLY,route 172.16.50.0 255.255.255.0,route-gateway 10.10.100.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.10.100.2 255.255.255.0,peer-id 0,cipher AES-256-GCM,protocol-flags cc-exit tls-ekm dyn-tls-crypt,tun-mtu 1500' (status=1)BLABLA/*ClientIP*:43618 MULTI: primary virtual IP for BLABLA/*ClientIP*:43618: 10.10.100.2BLABLA/*ClientIP*:43618 MULTI: Learn: 10.10.100.2 -> BLABLA/*ClientIP*:43618BLABLA/*ClientIP*:43618 MULTI_sva: pool returned IPv4=10.10.100.2, IPv6=(Not enabled)*ClientIP*:43618 [BLABLA] Peer Connection Initiated with [AF_INET]*ClientIP*:43618*ClientIP*:43618 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bits RSA, signature: RSA-SHA256, peer temporary key: 253 bits X25519*ClientIP*:43618 TLS: tls_multi_process: initial untrusted session promoted to trusted*ClientIP*:43618 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1*ClientIP*:43618 peer info: IV_COMP_STUBv2=1*ClientIP*:43618 peer info: IV_COMP_STUB=1*ClientIP*:43618 peer info: IV_LZO_STUB=1*ClientIP*:43618 peer info: IV_PROTO=990*ClientIP*:43618 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM:CHACHA20-POLY1305*ClientIP*:43618 peer info: IV_NCP=2*ClientIP*:43618 peer info: IV_MTU=1600*ClientIP*:43618 peer info: IV_TCPNL=1*ClientIP*:43618 peer info: IV_PLAT=freebsd*ClientIP*:43618 peer info: IV_VER=2.6.10*ClientIP*:43618 VERIFY OK: depth=0, CN=BLABLA, C=DE*ClientIP*:43618 VERIFY SCRIPT OK: depth=0, CN=BLABLA, C=DE*ClientIP*:43618 VERIFY EKU OK*ClientIP*:43618 ++ Certificate has EKU (str) TLS Web Client Authentication, expects TLS Web Client Authentication*ClientIP*:43618 Validating certificate extended key usage*ClientIP*:43618 VERIFY KU OK*ClientIP*:43618 VERIFY OK: depth=1, CN=BLABLA_CA, C=DE*ClientIP*:43618 VERIFY SCRIPT OK: depth=1, CN=BLABLA_CA, C=DE*ClientIP*:43618 VERIFY WARNING: depth=1, unable to get certificate CRL: CN=BLABLA_CA, C=DE*ClientIP*:43618 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=BLABLA, C=DE
10.10.100.0/24 link#8 U 6 1500 ovpns210.10.100.1 link#4 UHS 9 16384 lo0192.168.8.0/24 10.10.100.2 UGS 10 1500 ovpns2
ipv4 10.10.100.0/24 link#8 U NaN 1500 ovpnc1 OpenVPNipv4 10.10.100.2 link#8UHS NaN 16384 lo0 Loopbackipv4 172.16.50.0/24 10.10.100.1 UGS NaN 1500 ovpnc1 OpenVPN