Dec 29 14:08:25 RT-AX86U-AC30 ovpn-server2[3021]: client/1.129.110.41:19678 SIGTERM[soft,remote-exit] received, client-instance exiting
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: TCP connection established with [AF_INET]1.129.110.41:1714
Dec 29 14:08:39 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 TLS: Initial packet from [AF_INET]1.129.110.41:1714, sid=b24fb0c1 bef02c69
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AX86U, [email protected]
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, [email protected]
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_VER=3.git::2952f561
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_PLAT=ios
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_NCP=2
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_TCPNL=1
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_PROTO=2
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_IPv6=0
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_GUI_VER=net.openvpn.connect.ios_3.2.2-3507
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_SSO=openurl
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 peer info: IV_BS64DL=1
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 PLUGIN_CALL: POST /usr/lib/openvpn-plugin-auth-pam.so/PLUGIN_AUTH_USER_PASS_VERIFY status=0
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 TLS: Username/Password authentication succeeded for username 'joescian'
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: 1.129.110.41:1714 [client] Peer Connection Initiated with [AF_INET]1.129.110.41:1714
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 MULTI_sva: pool returned IPv4=10.8.0.2, IPv6=(Not enabled)
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 MULTI: Learn: 10.8.0.2 -> client/1.129.110.41:1714
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 MULTI: primary virtual IP for client/1.129.110.41:1714: 10.8.0.2
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Data Channel: using negotiated cipher 'AES-256-GCM'
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 PUSH: Received control message: 'PUSH_REQUEST'
Dec 29 14:08:40 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 SENT CONTROL [client]: 'PUSH_REPLY,route 192.168.2.0 255.255.255.0 vpn_gateway 500,dhcp-option DOMAIN RT-AX86U-DOMAIN,dhcp-option DNS 192.168.2.242,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Dec 29 14:10:31 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 Connection reset, restarting [0]
Dec 29 14:10:31 RT-AX86U-AC30 ovpn-server1[2734]: client/1.129.110.41:1714 SIGUSR1[soft,connection-reset] received, client-instance restarting
Dec 29 14:10:33 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:10:33 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Dec 29 14:10:33 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 TLS: Initial packet from [AF_INET]1.129.110.41:14158, sid=06b57b9f dd8734ca
Dec 29 14:10:34 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 VERIFY OK: depth=1, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=RT-AX86U, [email protected]
Dec 29 14:10:34 RT-AX86U-AC30 ovpn-server2[3021]: 1.129.110.41:14158 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, OU=Home/Office, CN=client, [email protected]
D