Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Official client software for OpenVPN Access Server and OpenVPN Cloud.
Locked
anatoli
OpenVPN User
Posts: 36
Joined: Sun Nov 17, 2013 8:32 am

Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by anatoli » Thu Jan 11, 2018 6:47 am

I'm also not authed to PM, and I'm interested in testing the beta.

I've just discovered that after some time (some hours) for some reason the phone doesn't have connectivity via OpenVPN anymore. The VPN icon is there, the state in the app is Connected, but there's no connectivity, not even ping to internal IPs, though internal (protocol-level) pings look like passing as the counter for "Packet received" timer is updating every 5 sec.

The log shows that half an hour ago the following happened:
Session invalidated: KEEPALIVE_TIMEOUT, then
Event: RECONNECT

On the server at the same time the following happened:

Code: Select all

Thu Jan 11 02:57:10 2018 xx:yy Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #8 / time = (1515650229) Thu Jan 11 02:57:09 2018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Jan 11 02:57:10 2018 xx:yy TLS Error: incoming packet authentication failed from [AF_INET]xx:yy
Thu Jan 11 02:57:10 2018 xx:yy Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #9 / time = (1515650229) Thu Jan 11 02:57:09 2018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Jan 11 02:57:10 2018 xx:yy TLS Error: incoming packet authentication failed from [AF_INET]xx:yy
Thu Jan 11 02:57:10 2018 xx:yy Authenticate/Decrypt packet error: bad packet ID (may be a replay): [ #10 / time = (1515650229) Thu Jan 11 02:57:09 2018 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
Thu Jan 11 02:57:10 2018 xx:yy TLS Error: incoming packet authentication failed from [AF_INET]xx:yy
Thu Jan 11 02:57:10 2018 xx:yy Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jan 11 02:57:10 2018 xx:yy Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Jan 11 02:57:10 2018 xx:yy Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Thu Jan 11 02:57:10 2018 xx:yy Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Jan 11 02:57:10 2018 xx:yy Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Jan 11 02:57:10 2018 xx:yy [nn] Peer Connection Initiated with [AF_INET]xx:yy
Thu Jan 11 02:57:10 2018 MULTI_sva: pool returned IPv4=zz, IPv6=(Not enabled)
Thu Jan 11 02:57:10 2018 nn/xx:yy send_push_reply(): safe_cap=940

After turning off the connection and turning it on, everything is working again.

My config is for all traffic to pass via the VPN, so I'm not sure if this problem was already reported or this is a new observation.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by ordex » Thu Jan 11, 2018 6:54 am

anatoli wrote:
Thu Jan 11, 2018 6:47 am
After turning off the connection and turning it on, everything is working again.

My config is for all traffic to pass via the VPN, so I'm not sure if this problem was already reported or this is a new observation.
I moved your post to a new thread as this is unrelated to tls-auth.

Could you please paste your full client log too?

Thanks!

anatoli
OpenVPN User
Posts: 36
Joined: Sun Nov 17, 2013 8:32 am

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by anatoli » Thu Jan 11, 2018 7:16 am

Client log:

Code: Select all

2018-01-11 02:14:30 Comp-stub init swap=0

### Here the reconnect for non-working tunnel starts ###

2018-01-11 02:57:07 Session invalidated: KEEPALIVE_TIMEOUT
2018-01-11 02:57:07 Client terminated, restarting in 2000 ms...
2018-01-11 02:57:07 Raw stats on disconnect:
  BYTES_IN : 20108977
  BYTES_OUT : 10645792
  PACKETS_IN : 30080
  PACKETS_OUT : 36215
  TUN_BYTES_IN : 7158520
  TUN_BYTES_OUT : 17196877
  TUN_PACKETS_IN : 33071
  TUN_PACKETS_OUT : 26644
  KEEPALIVE_TIMEOUT : 1
  N_PAUSE : 3
  N_RECONNECT : 3
  N_KEV_EXPIRE : 1
2018-01-11 02:57:07 Performance stats on disconnect:
  CPU usage (microseconds): 14372643
  Tunnel compression ratio (uplink): 1.48715
  Tunnel compression ratio (downlink): 1.16934
  Network bytes per CPU second: 2139813
  Tunnel bytes per CPU second: 1694566
2018-01-11 02:57:09 EVENT: RECONNECTING
2018-01-11 02:57:09 Contacting [public_ip]:public_port/UDP via UDP
2018-01-11 02:57:09 EVENT: WAIT
2018-01-11 02:57:09 Connecting to [public_ip]:public_port (public_ip) via UDPv4
2018-01-11 02:57:09 EVENT: CONNECTING
2018-01-11 02:57:09 Tunnel Options:V4,dev-type tun,link-mtu 1602,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 02:57:09 Creds: UsernameEmpty/PasswordEmpty
2018-01-11 02:57:09 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO_STUB=1
IV_COMP_STUB=1
IV_COMP_STUBv2=1
IV_IPv6=0
IV_AUTO_SESS=1

2018-01-11 02:57:09 VERIFY OK : depth=1
cert. version     : 3
xxx

2018-01-11 02:57:09 VERIFY OK : depth=0
cert. version     : 3
xxx

2018-01-11 02:57:10 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 02:57:10 Session is ACTIVE
2018-01-11 02:57:10 EVENT: GET_CONFIG
2018-01-11 02:57:10 Sending PUSH_REQUEST to server...
2018-01-11 02:57:10 OPTIONS:
0 [topology] [subnet] 
1 [route-gateway] [internal_net.1] 
2 [redirect-gateway] [def1] [autolocal] [bypass-dhcp] 
3 [dhcp-option] [DNS] [xxx] 
4 [dhcp-option] [DNS] [8.8.8.8] 
5 [dhcp-option] [NTP] [xxx] 
6 [ping] [5] 
7 [ping-restart] [15] 
8 [persist-key] 
9 [explicit-exit-notify] 
10 [ifconfig] [internal_net.100] [255.255.255.0] 
11 [block-ipv6] 

2018-01-11 02:57:10 PROTOCOL OPTIONS:
  cipher: AES-256-CBC
  digest: SHA512
  compress: LZO_STUB
  peer ID: -1
2018-01-11 02:57:10 EVENT: ASSIGN_IP
2018-01-11 02:57:10 NIP: preparing TUN network settings
2018-01-11 02:57:10 NIP: init TUN network settings with endpoint: public_ip
2018-01-11 02:57:10 NIP: adding IPv4 address to network settings internal_net.100/255.255.255.0
2018-01-11 02:57:10 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 02:57:10 NIP: adding DNS xxx
2018-01-11 02:57:10 NIP: adding DNS 8.8.8.8
2018-01-11 02:57:10 NIP: setting MTU to 1500
2018-01-11 02:57:10 Connected via NetworkExtensionTUN
2018-01-11 02:57:10 LZO-ASYM init swap=0 asym=1
2018-01-11 02:57:10 Comp-stub init swap=0
2018-01-11 02:57:10 EVENT: CONNECTED @public_ip:public_port (public_ip) via /UDPv4 on NetworkExtensionTUN/internal_net.100/ gw=[/]

### Here OpenVPN on iOS was reconnected ###

2018-01-11 03:34:21 Raw stats on disconnect:
  BYTES_IN : 20166368
  BYTES_OUT : 10700269
  PACKETS_IN : 30536
  PACKETS_OUT : 36643
  TUN_BYTES_IN : 7158520
  TUN_BYTES_OUT : 17197191
  TUN_PACKETS_IN : 33071
  TUN_PACKETS_OUT : 26648
  KEEPALIVE_TIMEOUT : 1
  N_PAUSE : 3
  N_RECONNECT : 4
  N_KEV_EXPIRE : 1
2018-01-11 03:34:21 Performance stats on disconnect:

nafj79
OpenVpn Newbie
Posts: 3
Joined: Thu Jan 11, 2018 1:28 pm

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by nafj79 » Thu Jan 11, 2018 1:28 pm

I have also that problem but I have also that the VPN icon is gone.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by ordex » Thu Jan 11, 2018 1:30 pm

nafj79 wrote:
Thu Jan 11, 2018 1:28 pm
I have also that problem but I have also that the VPN icon is gone.
Do you have an idea when it disappears? it that happens it's should be because iOS has been told to deactivate the tunnel

edit: the client log would help understanding better the problem.

nafj79
OpenVpn Newbie
Posts: 3
Joined: Thu Jan 11, 2018 1:28 pm

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by nafj79 » Thu Jan 11, 2018 3:20 pm

It goes down when the device is in sleepmode. Seamless tunnel is active so I don't know.

Here comes the log file:

Log

2018-01-11 10:35:34 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:35:34 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:35:34 Session is ACTIVE
2018-01-11 10:35:34 EVENT: GET_CONFIG
2018-01-11 10:35:34 Sending PUSH_REQUEST to server...
2018-01-11 10:35:35 Sending PUSH_REQUEST to server...
2018-01-11 10:35:36 OS Event: SLEEP
2018-01-11 10:35:36 EVENT: PAUSE
2018-01-11 10:39:13 OS Event: WAKEUP
2018-01-11 10:39:16 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:39:16 STANDARD RESUME
2018-01-11 10:39:16 EVENT: RESUME
2018-01-11 10:39:16 EVENT: RECONNECTING
2018-01-11 10:39:16 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:39:16 EVENT: WAIT
2018-01-11 10:39:16 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:39:16 EVENT: CONNECTING
2018-01-11 10:39:16 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:39:16 Creds: Username/Password
2018-01-11 10:39:16 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:39:16 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:39:16 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:39:16 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:39:16 Session is ACTIVE
2018-01-11 10:39:16 EVENT: GET_CONFIG
2018-01-11 10:39:16 Sending PUSH_REQUEST to server...
2018-01-11 10:39:18 Sending PUSH_REQUEST to server...
2018-01-11 10:39:20 Sending PUSH_REQUEST to server...
2018-01-11 10:39:20 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [46.227.67.134]
10 [dhcp-option] [DNS] [192.165.9.158]
11 [ifconfig] [10.134.209.86] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:39:20 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:39:20 EVENT: ASSIGN_IP
2018-01-11 10:39:20 NIP: preparing TUN network settings
2018-01-11 10:39:20 NIP: init TUN network settings with endpoint: 185.86.106.136
2018-01-11 10:39:20 NIP: adding IPv4 address to network settings 10.134.209.86/255.255.0.0
2018-01-11 10:39:20 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:39:20 NIP: adding DNS 46.227.67.134
2018-01-11 10:39:20 NIP: adding DNS 192.165.9.158
2018-01-11 10:39:20 Connected via NetworkExtensionTUN
2018-01-11 10:39:20 LZO-ASYM init swap=0 asym=0
2018-01-11 10:39:20 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.136) via /TCPv4 on NetworkExtensionTUN/10.134.209.86/ gw=[/]
2018-01-11 10:39:32 OS Event: SLEEP
2018-01-11 10:39:32 Raw stats on disconnect:
BYTES_IN : 4500617
BYTES_OUT : 1169867
PACKETS_IN : 5299
PACKETS_OUT : 7685
TUN_BYTES_IN : 906948
TUN_BYTES_OUT : 4162514
TUN_PACKETS_IN : 7190
TUN_PACKETS_OUT : 5677
TCP_OVERFLOW : 248
N_PAUSE : 80
N_RECONNECT : 80
2018-01-11 10:39:32 Performance stats on disconnect:
CPU usage (microseconds): 5603864
Tunnel compression ratio (uplink): 1.28989
Tunnel compression ratio (downlink): 1.08123
Network bytes per CPU second: 1011888
Tunnel bytes per CPU second: 904636
2018-01-11 10:39:32 EVENT: PAUSE
2018-01-11 10:40:12 OS Event: WAKEUP
2018-01-11 10:40:15 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:40:15 STANDARD RESUME
2018-01-11 10:40:15 EVENT: RESUME
2018-01-11 10:40:15 EVENT: RECONNECTING
2018-01-11 10:40:15 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:40:15 EVENT: WAIT
2018-01-11 10:40:15 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:40:15 EVENT: CONNECTING
2018-01-11 10:40:15 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:40:15 Creds: Username/Password
2018-01-11 10:40:15 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:40:15 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:40:15 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:40:15 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:40:15 Session is ACTIVE
2018-01-11 10:40:15 EVENT: GET_CONFIG
2018-01-11 10:40:15 Sending PUSH_REQUEST to server...
2018-01-11 10:40:16 Sending PUSH_REQUEST to server...
2018-01-11 10:40:18 Sending PUSH_REQUEST to server...
2018-01-11 10:40:18 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [46.227.67.134]
10 [dhcp-option] [DNS] [192.165.9.158]
11 [ifconfig] [10.134.2.192] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:40:18 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:40:18 EVENT: ASSIGN_IP
2018-01-11 10:40:18 NIP: preparing TUN network settings
2018-01-11 10:40:18 NIP: init TUN network settings with endpoint: 185.86.106.136
2018-01-11 10:40:18 NIP: adding IPv4 address to network settings 10.134.2.192/255.255.0.0
2018-01-11 10:40:18 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:40:18 NIP: adding DNS 46.227.67.134
2018-01-11 10:40:18 NIP: adding DNS 192.165.9.158
2018-01-11 10:40:18 Connected via NetworkExtensionTUN
2018-01-11 10:40:18 LZO-ASYM init swap=0 asym=0
2018-01-11 10:40:18 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.136) via /TCPv4 on NetworkExtensionTUN/10.134.2.192/ gw=[/]
2018-01-11 10:40:53 OS Event: SLEEP
2018-01-11 10:40:53 Raw stats on disconnect:
BYTES_IN : 4985701
BYTES_OUT : 1217673
PACKETS_IN : 5697
PACKETS_OUT : 8105
TUN_BYTES_IN : 942283
TUN_BYTES_OUT : 4635882
TUN_PACKETS_IN : 7598
TUN_PACKETS_OUT : 6149
TCP_OVERFLOW : 248
N_PAUSE : 81
N_RECONNECT : 81
2018-01-11 10:40:53 Performance stats on disconnect:
CPU usage (microseconds): 5873323
Tunnel compression ratio (uplink): 1.29226
Tunnel compression ratio (downlink): 1.07546
Network bytes per CPU second: 1056194
Tunnel bytes per CPU second: 949745
2018-01-11 10:40:53 EVENT: PAUSE
2018-01-11 10:42:03 OS Event: WAKEUP
2018-01-11 10:42:06 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:42:06 STANDARD RESUME
2018-01-11 10:42:06 EVENT: RESUME
2018-01-11 10:42:06 EVENT: RECONNECTING
2018-01-11 10:42:06 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:42:06 EVENT: WAIT
2018-01-11 10:42:06 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:42:06 EVENT: CONNECTING
2018-01-11 10:42:06 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:42:06 Creds: Username/Password
2018-01-11 10:42:06 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:42:06 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:42:06 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:42:06 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:42:06 Session is ACTIVE
2018-01-11 10:42:06 EVENT: GET_CONFIG
2018-01-11 10:42:06 Sending PUSH_REQUEST to server...
2018-01-11 10:42:07 Sending PUSH_REQUEST to server...
2018-01-11 10:42:09 Sending PUSH_REQUEST to server...
2018-01-11 10:42:09 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [46.227.67.134]
10 [dhcp-option] [DNS] [192.165.9.158]
11 [ifconfig] [10.134.188.246] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:42:09 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:42:09 EVENT: ASSIGN_IP
2018-01-11 10:42:09 NIP: preparing TUN network settings
2018-01-11 10:42:09 NIP: init TUN network settings with endpoint: 185.86.106.136
2018-01-11 10:42:09 NIP: adding IPv4 address to network settings 10.134.188.246/255.255.0.0
2018-01-11 10:42:09 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:42:09 NIP: adding DNS 46.227.67.134
2018-01-11 10:42:09 NIP: adding DNS 192.165.9.158
2018-01-11 10:42:09 Connected via NetworkExtensionTUN
2018-01-11 10:42:09 LZO-ASYM init swap=0 asym=0
2018-01-11 10:42:09 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.136) via /TCPv4 on NetworkExtensionTUN/10.134.188.246/ gw=[/]
2018-01-11 10:42:13 OS Event: SLEEP
2018-01-11 10:42:13 Raw stats on disconnect:
BYTES_IN : 5024530
BYTES_OUT : 1228300
PACKETS_IN : 5745
PACKETS_OUT : 8174
TUN_BYTES_IN : 949932
TUN_BYTES_OUT : 4671424
TUN_PACKETS_IN : 7656
TUN_PACKETS_OUT : 6194
TCP_OVERFLOW : 248
N_PAUSE : 82
N_RECONNECT : 82
2018-01-11 10:42:13 Performance stats on disconnect:
CPU usage (microseconds): 5945776
Tunnel compression ratio (uplink): 1.29304
Tunnel compression ratio (downlink): 1.07559
Network bytes per CPU second: 1051642
Tunnel bytes per CPU second: 945436
2018-01-11 10:42:13 EVENT: PAUSE
2018-01-11 10:42:14 OS Event: WAKEUP
2018-01-11 10:42:17 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:42:17 STANDARD RESUME
2018-01-11 10:42:17 EVENT: RESUME
2018-01-11 10:42:17 EVENT: RECONNECTING
2018-01-11 10:42:17 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:42:17 EVENT: WAIT
2018-01-11 10:42:17 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:42:17 EVENT: CONNECTING
2018-01-11 10:42:17 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:42:17 Creds: Username/Password
2018-01-11 10:42:17 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:42:17 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:42:17 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:42:17 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:42:17 Session is ACTIVE
2018-01-11 10:42:17 EVENT: GET_CONFIG
2018-01-11 10:42:17 Sending PUSH_REQUEST to server...
2018-01-11 10:42:18 Sending PUSH_REQUEST to server...
2018-01-11 10:42:20 Sending PUSH_REQUEST to server...
2018-01-11 10:42:20 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [192.165.9.158]
10 [dhcp-option] [DNS] [46.227.67.134]
11 [ifconfig] [10.134.42.241] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:42:20 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:42:20 EVENT: ASSIGN_IP
2018-01-11 10:42:20 NIP: preparing TUN network settings
2018-01-11 10:42:20 NIP: init TUN network settings with endpoint: 185.86.106.136
2018-01-11 10:42:20 NIP: adding IPv4 address to network settings 10.134.42.241/255.255.0.0
2018-01-11 10:42:20 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:42:20 NIP: adding DNS 192.165.9.158
2018-01-11 10:42:20 NIP: adding DNS 46.227.67.134
2018-01-11 10:42:20 Connected via NetworkExtensionTUN
2018-01-11 10:42:20 LZO-ASYM init swap=0 asym=0
2018-01-11 10:42:20 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.136) via /TCPv4 on NetworkExtensionTUN/10.134.42.241/ gw=[/]
2018-01-11 10:42:25 OS Event: SLEEP
2018-01-11 10:42:25 Raw stats on disconnect:
BYTES_IN : 5064433
BYTES_OUT : 1239540
PACKETS_IN : 5794
PACKETS_OUT : 8240
TUN_BYTES_IN : 958275
TUN_BYTES_OUT : 4707956
TUN_PACKETS_IN : 7711
TUN_PACKETS_OUT : 6243
TCP_OVERFLOW : 248
N_PAUSE : 83
N_RECONNECT : 83
2018-01-11 10:42:25 Performance stats on disconnect:
CPU usage (microseconds): 6019700
Tunnel compression ratio (uplink): 1.29351
Tunnel compression ratio (downlink): 1.07572
Network bytes per CPU second: 1047223
Tunnel bytes per CPU second: 941281
2018-01-11 10:42:25 EVENT: PAUSE
2018-01-11 10:44:23 OS Event: WAKEUP
2018-01-11 10:44:26 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:44:26 STANDARD RESUME
2018-01-11 10:44:26 EVENT: RESUME
2018-01-11 10:44:26 EVENT: RECONNECTING
2018-01-11 10:44:26 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:44:26 EVENT: WAIT
2018-01-11 10:44:26 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:44:26 EVENT: CONNECTING
2018-01-11 10:44:26 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:44:26 Creds: Username/Password
2018-01-11 10:44:26 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:44:26 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:44:26 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:44:26 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:44:26 Session is ACTIVE
2018-01-11 10:44:26 EVENT: GET_CONFIG
2018-01-11 10:44:26 Sending PUSH_REQUEST to server...
2018-01-11 10:44:27 Sending PUSH_REQUEST to server...
2018-01-11 10:44:29 Sending PUSH_REQUEST to server...
2018-01-11 10:44:29 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [46.227.67.134]
10 [dhcp-option] [DNS] [192.165.9.158]
11 [ifconfig] [10.134.185.22] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:44:29 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:44:29 EVENT: ASSIGN_IP
2018-01-11 10:44:29 NIP: preparing TUN network settings
2018-01-11 10:44:29 NIP: init TUN network settings with endpoint: 185.86.106.136
2018-01-11 10:44:29 NIP: adding IPv4 address to network settings 10.134.185.22/255.255.0.0
2018-01-11 10:44:29 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:44:29 NIP: adding DNS 46.227.67.134
2018-01-11 10:44:29 NIP: adding DNS 192.165.9.158
2018-01-11 10:44:29 Connected via NetworkExtensionTUN
2018-01-11 10:44:29 LZO-ASYM init swap=0 asym=0
2018-01-11 10:44:29 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.136) via /TCPv4 on NetworkExtensionTUN/10.134.185.22/ gw=[/]
2018-01-11 10:44:38 OS Event: SLEEP
2018-01-11 10:44:38 Raw stats on disconnect:
BYTES_IN : 5249270
BYTES_OUT : 1281627
PACKETS_IN : 5996
PACKETS_OUT : 8548
TUN_BYTES_IN : 990931
TUN_BYTES_OUT : 4888173
TUN_PACKETS_IN : 8008
TUN_PACKETS_OUT : 6496
TCP_OVERFLOW : 248
N_PAUSE : 84
N_RECONNECT : 84
2018-01-11 10:44:38 Performance stats on disconnect:
CPU usage (microseconds): 6174432
Tunnel compression ratio (uplink): 1.29336
Tunnel compression ratio (downlink): 1.07387
Network bytes per CPU second: 1057732
Tunnel bytes per CPU second: 952169
2018-01-11 10:44:38 EVENT: PAUSE
2018-01-11 10:45:39 OS Event: WAKEUP
2018-01-11 10:45:42 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:45:42 STANDARD RESUME
2018-01-11 10:45:42 EVENT: RESUME
2018-01-11 10:45:42 EVENT: RECONNECTING
2018-01-11 10:45:42 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:45:42 EVENT: WAIT
2018-01-11 10:45:42 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:45:42 EVENT: CONNECTING
2018-01-11 10:45:42 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:45:42 Creds: Username/Password
2018-01-11 10:45:42 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:45:42 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:45:42 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:45:42 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:45:42 Session is ACTIVE
2018-01-11 10:45:42 EVENT: GET_CONFIG
2018-01-11 10:45:42 Sending PUSH_REQUEST to server...
2018-01-11 10:45:43 Sending PUSH_REQUEST to server...
2018-01-11 10:45:45 Sending PUSH_REQUEST to server...
2018-01-11 10:45:45 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [192.165.9.158]
10 [dhcp-option] [DNS] [46.227.67.134]
11 [ifconfig] [10.134.221.205] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:45:45 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:45:45 EVENT: ASSIGN_IP
2018-01-11 10:45:45 NIP: preparing TUN network settings
2018-01-11 10:45:45 NIP: init TUN network settings with endpoint: 185.86.106.136
2018-01-11 10:45:45 NIP: adding IPv4 address to network settings 10.134.221.205/255.255.0.0
2018-01-11 10:45:45 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:45:45 NIP: adding DNS 192.165.9.158
2018-01-11 10:45:45 NIP: adding DNS 46.227.67.134
2018-01-11 10:45:45 Connected via NetworkExtensionTUN
2018-01-11 10:45:45 LZO-ASYM init swap=0 asym=0
2018-01-11 10:45:45 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.136) via /TCPv4 on NetworkExtensionTUN/10.134.221.205/ gw=[/]
2018-01-11 10:45:57 OS Event: SLEEP
2018-01-11 10:45:57 Raw stats on disconnect:
BYTES_IN : 5508691
BYTES_OUT : 1354406
PACKETS_IN : 6324
PACKETS_OUT : 9083
TUN_BYTES_IN : 1053765
TUN_BYTES_OUT : 5143113
TUN_PACKETS_IN : 8602
TUN_PACKETS_OUT : 6886
TCP_OVERFLOW : 276
N_PAUSE : 85
N_RECONNECT : 85
2018-01-11 10:45:57 Performance stats on disconnect:
CPU usage (microseconds): 6412640
Tunnel compression ratio (uplink): 1.2853
Tunnel compression ratio (downlink): 1.07108
Network bytes per CPU second: 1070245
Tunnel bytes per CPU second: 966353
2018-01-11 10:45:57 EVENT: PAUSE
2018-01-11 10:45:59 OS Event: WAKEUP
2018-01-11 10:46:02 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:46:02 STANDARD RESUME
2018-01-11 10:46:02 EVENT: RESUME
2018-01-11 10:46:02 EVENT: RECONNECTING
2018-01-11 10:46:02 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:46:02 EVENT: WAIT
2018-01-11 10:46:02 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:46:02 EVENT: CONNECTING
2018-01-11 10:46:02 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:46:02 Creds: Username/Password
2018-01-11 10:46:02 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:46:02 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:46:02 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:46:02 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:46:02 Session is ACTIVE
2018-01-11 10:46:02 EVENT: GET_CONFIG
2018-01-11 10:46:02 Sending PUSH_REQUEST to server...
2018-01-11 10:46:03 Sending PUSH_REQUEST to server...
2018-01-11 10:46:04 OS Event: SLEEP
2018-01-11 10:46:04 EVENT: PAUSE
2018-01-11 10:46:06 OS Event: WAKEUP
2018-01-11 10:46:09 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:46:09 STANDARD RESUME
2018-01-11 10:46:09 EVENT: RESUME
2018-01-11 10:46:09 EVENT: RECONNECTING
2018-01-11 10:46:09 Contacting [185.86.106.137]:443/TCP via TCP
2018-01-11 10:46:09 EVENT: WAIT
2018-01-11 10:46:09 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.137) via TCPv4
2018-01-11 10:46:09 EVENT: CONNECTING
2018-01-11 10:46:09 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:46:09 Creds: Username/Password
2018-01-11 10:46:09 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:46:09 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:46:09 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:46:09 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:46:09 Session is ACTIVE
2018-01-11 10:46:09 EVENT: GET_CONFIG
2018-01-11 10:46:09 Sending PUSH_REQUEST to server...
2018-01-11 10:46:10 Sending PUSH_REQUEST to server...
2018-01-11 10:46:11 OS Event: SLEEP
2018-01-11 10:46:11 EVENT: PAUSE
2018-01-11 10:46:13 OS Event: WAKEUP
2018-01-11 10:46:16 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:46:16 STANDARD RESUME
2018-01-11 10:46:16 EVENT: RESUME
2018-01-11 10:46:16 EVENT: RECONNECTING
2018-01-11 10:46:16 Contacting [185.86.106.132]:443/TCP via TCP
2018-01-11 10:46:16 EVENT: WAIT
2018-01-11 10:46:16 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.132) via TCPv4
2018-01-11 10:46:16 EVENT: CONNECTING
2018-01-11 10:46:16 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:46:16 Creds: Username/Password
2018-01-11 10:46:16 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:46:16 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:46:16 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:46:16 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:46:16 Session is ACTIVE
2018-01-11 10:46:16 EVENT: GET_CONFIG
2018-01-11 10:46:16 Sending PUSH_REQUEST to server...
2018-01-11 10:46:17 Sending PUSH_REQUEST to server...
2018-01-11 10:46:18 OS Event: SLEEP
2018-01-11 10:46:18 EVENT: PAUSE
2018-01-11 10:46:19 OS Event: WAKEUP
2018-01-11 10:46:22 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:46:22 STANDARD RESUME
2018-01-11 10:46:22 EVENT: RESUME
2018-01-11 10:46:22 EVENT: RECONNECTING
2018-01-11 10:46:22 Contacting [185.86.106.134]:443/TCP via TCP
2018-01-11 10:46:22 EVENT: WAIT
2018-01-11 10:46:22 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.134) via TCPv4
2018-01-11 10:46:22 EVENT: CONNECTING
2018-01-11 10:46:22 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:46:22 Creds: Username/Password
2018-01-11 10:46:22 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:46:23 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:46:23 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:46:23 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:46:23 Session is ACTIVE
2018-01-11 10:46:23 EVENT: GET_CONFIG
2018-01-11 10:46:23 Sending PUSH_REQUEST to server...
2018-01-11 10:46:24 Sending PUSH_REQUEST to server...
2018-01-11 10:46:25 OS Event: SLEEP
2018-01-11 10:46:25 EVENT: PAUSE
2018-01-11 10:46:26 OS Event: WAKEUP
2018-01-11 10:46:29 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:46:29 STANDARD RESUME
2018-01-11 10:46:29 EVENT: RESUME
2018-01-11 10:46:29 EVENT: RECONNECTING
2018-01-11 10:46:29 Contacting [185.86.106.135]:443/TCP via TCP
2018-01-11 10:46:29 EVENT: WAIT
2018-01-11 10:46:29 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.135) via TCPv4
2018-01-11 10:46:29 EVENT: CONNECTING
2018-01-11 10:46:29 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:46:29 Creds: Username/Password
2018-01-11 10:46:29 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:46:29 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:46:29 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:46:29 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:46:29 Session is ACTIVE
2018-01-11 10:46:29 EVENT: GET_CONFIG
2018-01-11 10:46:29 Sending PUSH_REQUEST to server...
2018-01-11 10:46:30 Sending PUSH_REQUEST to server...
2018-01-11 10:46:31 OS Event: SLEEP
2018-01-11 10:46:31 EVENT: PAUSE
2018-01-11 10:46:55 OS Event: WAKEUP
2018-01-11 10:46:58 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:46:58 STANDARD RESUME
2018-01-11 10:46:58 EVENT: RESUME
2018-01-11 10:46:58 EVENT: RECONNECTING
2018-01-11 10:46:58 Contacting [185.86.106.138]:443/TCP via TCP
2018-01-11 10:46:58 EVENT: WAIT
2018-01-11 10:46:58 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.138) via TCPv4
2018-01-11 10:46:58 EVENT: CONNECTING
2018-01-11 10:46:58 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:46:58 Creds: Username/Password
2018-01-11 10:46:58 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:46:58 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:46:58 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:46:58 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:46:58 Session is ACTIVE
2018-01-11 10:46:58 EVENT: GET_CONFIG
2018-01-11 10:46:58 Sending PUSH_REQUEST to server...
2018-01-11 10:46:59 Sending PUSH_REQUEST to server...
2018-01-11 10:47:00 OS Event: SLEEP
2018-01-11 10:47:00 EVENT: PAUSE
2018-01-11 10:47:01 OS Event: WAKEUP
2018-01-11 10:47:04 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:47:04 STANDARD RESUME
2018-01-11 10:47:04 EVENT: RESUME
2018-01-11 10:47:04 EVENT: RECONNECTING
2018-01-11 10:47:04 Contacting [185.86.106.133]:443/TCP via TCP
2018-01-11 10:47:04 EVENT: WAIT
2018-01-11 10:47:04 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.133) via TCPv4
2018-01-11 10:47:04 EVENT: CONNECTING
2018-01-11 10:47:04 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:47:04 Creds: Username/Password
2018-01-11 10:47:04 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:47:04 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:47:04 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:47:04 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:47:04 Session is ACTIVE
2018-01-11 10:47:04 EVENT: GET_CONFIG
2018-01-11 10:47:04 Sending PUSH_REQUEST to server...
2018-01-11 10:47:05 Sending PUSH_REQUEST to server...
2018-01-11 10:47:06 OS Event: SLEEP
2018-01-11 10:47:06 EVENT: PAUSE
2018-01-11 10:47:07 OS Event: WAKEUP
2018-01-11 10:47:10 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:47:10 STANDARD RESUME
2018-01-11 10:47:10 EVENT: RESUME
2018-01-11 10:47:10 EVENT: RECONNECTING
2018-01-11 10:47:10 Contacting [185.86.106.136]:443/TCP via TCP
2018-01-11 10:47:10 EVENT: WAIT
2018-01-11 10:47:10 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.136) via TCPv4
2018-01-11 10:47:10 EVENT: CONNECTING
2018-01-11 10:47:10 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:47:10 Creds: Username/Password
2018-01-11 10:47:10 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:47:11 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:47:11 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:47:11 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:47:11 Session is ACTIVE
2018-01-11 10:47:11 EVENT: GET_CONFIG
2018-01-11 10:47:11 Sending PUSH_REQUEST to server...
2018-01-11 10:47:12 Sending PUSH_REQUEST to server...
2018-01-11 10:47:13 OS Event: SLEEP
2018-01-11 10:47:13 EVENT: PAUSE
2018-01-11 10:47:15 OS Event: WAKEUP
2018-01-11 10:47:18 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:47:18 STANDARD RESUME
2018-01-11 10:47:18 EVENT: RESUME
2018-01-11 10:47:18 EVENT: RECONNECTING
2018-01-11 10:47:18 Contacting [185.86.106.137]:443/TCP via TCP
2018-01-11 10:47:18 EVENT: WAIT
2018-01-11 10:47:18 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.137) via TCPv4
2018-01-11 10:47:18 EVENT: CONNECTING
2018-01-11 10:47:18 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:47:18 Creds: Username/Password
2018-01-11 10:47:18 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:47:18 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:47:18 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:47:18 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:47:18 Session is ACTIVE
2018-01-11 10:47:18 EVENT: GET_CONFIG
2018-01-11 10:47:18 Sending PUSH_REQUEST to server...
2018-01-11 10:47:19 Sending PUSH_REQUEST to server...
2018-01-11 10:47:20 OS Event: SLEEP
2018-01-11 10:47:20 EVENT: PAUSE
2018-01-11 10:47:21 OS Event: WAKEUP
2018-01-11 10:47:24 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:47:24 STANDARD RESUME
2018-01-11 10:47:24 EVENT: RESUME
2018-01-11 10:47:24 EVENT: RECONNECTING
2018-01-11 10:47:24 Contacting [185.86.106.132]:443/TCP via TCP
2018-01-11 10:47:24 EVENT: WAIT
2018-01-11 10:47:24 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.132) via TCPv4
2018-01-11 10:47:24 EVENT: CONNECTING
2018-01-11 10:47:24 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:47:24 Creds: Username/Password
2018-01-11 10:47:24 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:47:24 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:47:24 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:47:24 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:47:24 Session is ACTIVE
2018-01-11 10:47:24 EVENT: GET_CONFIG
2018-01-11 10:47:24 Sending PUSH_REQUEST to server...
2018-01-11 10:47:25 Sending PUSH_REQUEST to server...
2018-01-11 10:47:27 OS Event: SLEEP
2018-01-11 10:47:27 EVENT: PAUSE
2018-01-11 10:48:02 OS Event: WAKEUP
2018-01-11 10:48:05 RESUME TEST: Internet:ReachableViaWiFi/-R t------
2018-01-11 10:48:05 STANDARD RESUME
2018-01-11 10:48:05 EVENT: RESUME
2018-01-11 10:48:05 EVENT: RECONNECTING
2018-01-11 10:48:05 Contacting [185.86.106.134]:443/TCP via TCP
2018-01-11 10:48:05 EVENT: WAIT
2018-01-11 10:48:05 Connecting to [pool.prd.se.malmo.ovpn.com]:443 (185.86.106.134) via TCPv4
2018-01-11 10:48:05 EVENT: CONNECTING
2018-01-11 10:48:05 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2018-01-11 10:48:05 Creds: Username/Password
2018-01-11 10:48:05 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.2.5-1
IV_VER=3.1.2
IV_PLAT=ios
IV_NCP=2
IV_TCPNL=1
IV_PROTO=2
IV_LZO=1

2018-01-11 10:48:05 VERIFY OK : depth=1
cert. version : 3
serial number : AD:9A:21:6A:A9:2E:3D:7F
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:21:29
expires on : 2034-08-12 18:21:29
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=true

2018-01-11 10:48:05 VERIFY OK : depth=0
cert. version : 3
serial number : 01
issuer name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se ca, emailAddress=info@ovpn.se
subject name : C=SE, ST=Stockholm, L=Stockholm, OU=Firma David Wibergh, CN=ovpn.se, emailAddress=info@ovpn.se
issued on : 2014-08-17 18:22:25
expires on : 2034-08-12 18:22:25
signed using : RSA with SHA1
RSA key size : 2048 bits
basic constraints : CA=false
cert. type : SSL Server
key usage : Digital Signature, Key Encipherment
ext key usage : TLS Web Server Authentication

2018-01-11 10:48:05 SSL Handshake: TLSv1.2/TLS-ECDHE-RSA-WITH-AES-256-GCM-SHA384
2018-01-11 10:48:05 Session is ACTIVE
2018-01-11 10:48:05 EVENT: GET_CONFIG
2018-01-11 10:48:05 Sending PUSH_REQUEST to server...
2018-01-11 10:48:06 Sending PUSH_REQUEST to server...
2018-01-11 10:48:08 Sending PUSH_REQUEST to server...
2018-01-11 10:48:08 OPTIONS:
0 [redirect-gateway] [ipv6]
1 [route-gateway] [10.134.0.1]
2 [topology] [subnet]
3 [ping] [10]
4 [ping-restart] [60]
5 [persist-key]
6 [redirect-gateway] [def1]
7 [explicit-exit-notify] [2]
8 [comp-lzo] [yes]
9 [dhcp-option] [DNS] [192.165.9.158]
10 [dhcp-option] [DNS] [46.227.67.134]
11 [ifconfig] [10.134.8.180] [255.255.0.0]
12 [peer-id] [0]
13 [cipher] [AES-256-GCM]

2018-01-11 10:48:08 PROTOCOL OPTIONS:
cipher: AES-256-GCM
digest: SHA1
compress: LZO
peer ID: 0
2018-01-11 10:48:08 EVENT: ASSIGN_IP
2018-01-11 10:48:08 NIP: preparing TUN network settings
2018-01-11 10:48:08 NIP: init TUN network settings with endpoint: 185.86.106.134
2018-01-11 10:48:08 NIP: adding IPv4 address to network settings 10.134.8.180/255.255.0.0
2018-01-11 10:48:08 NIP: redirecting all IPv4 traffic to TUN interface
2018-01-11 10:48:08 NIP: adding DNS 192.165.9.158
2018-01-11 10:48:08 NIP: adding DNS 46.227.67.134
2018-01-11 10:48:08 Connected via NetworkExtensionTUN
2018-01-11 10:48:08 LZO-ASYM init swap=0 asym=0
2018-01-11 10:48:08 EVENT: CONNECTED nafj79@pool.prd.se.malmo.ovpn.com:443 (185.86.106.134) via /TCPv4 on NetworkExtensionTUN/10.134.8.180/ gw=[/]

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by ordex » Thu Jan 11, 2018 3:39 pm

do you know when it stopped working?

anatoli
OpenVPN User
Posts: 36
Joined: Sun Nov 17, 2013 8:32 am

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by anatoli » Thu Jan 11, 2018 11:05 pm

I just found how to reproduce the problem.

First, I've discovered an interesting non-documented behavior related to maintaining the tunnel in 1.2.5 (and 1.2.6.1 beta, which, so far, is working fine except this issue): the tunnel is permanently maintained even during sleep only when the phone is connected to a power source. When on battery, the tunnel is lost on sleep and reconnected on wakeup, i.e. the 1.1.1 behavior. So, with respect to what we've talked in another thread, there's no drawback for the battery to discharge faster because when on battery, the tunnel is not maintained (though I would prefer to have an option to always maintain the tunnel, no matter the power state).

But... with respect to the issue in question, in my case the non-working tunnel was established during sleep while connected to power, probably due to WiFi having a short connectivity issue (I had the cellular network turned off, so WiFi was the only source of internet). In other words, WiFi lost the connection, the tunnel broke due to ping-restart and when WiFi returned, the newly established tunnel was somehow non-working.

So, to reproduce the problem, I leave the phone alone for some time for it to enter the sleep mode (while connected to power), then I turn off my WiFi router, wait for, say, one minute (the delay should be longer than the ping-restart interval), then connect it again and wait a couple of minutes for OpenVPN to reestablish the tunnel (all this in the sleep mode). Now I wake up the phone and observe that the newly created tunnel is non-working, i.e. internal (protocol-level) pings pass but no other traffic.

Ordex, please let me know if you need additional details. The configs are exactly the same as in the thread about tls-auth and the logs are the same as mentioned here before.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by ordex » Fri Jan 12, 2018 4:42 am

anatoli wrote:
Thu Jan 11, 2018 11:05 pm
I just found how to reproduce the problem.

First, I've discovered an interesting non-documented behavior related to maintaining the tunnel in 1.2.5 (and 1.2.6.1 beta, which, so far, is working fine except this issue): the tunnel is permanently maintained even during sleep only when the phone is connected to a power source. When on battery, the tunnel is lost on sleep and reconnected on wakeup, i.e. the 1.1.1 behavior. So, with respect to what we've talked in another thread, there's no drawback for the battery to discharge faster because when on battery, the tunnel is not maintained (though I would prefer to have an option to always maintain the tunnel, no matter the power state).
To explain this behaviour a bit better: when the device is connected to a power source, iOS does not enter sleep mode. It locks the screen, but all the Apps keep on running. So does OpenVPN Connect and therefore the tunnel is kept alive.

In case of no power source, after some time that the device has been locked, iOS sends the device to sleep and all the apps are frozen. This means OpenVPN Connect has no chance to keep the tunnel alive (no way we can influence this life cycle), therefore what it does is to "stop" the VPN connection upon sleep and resume it after wakeup.

The steps I described above can be checked by looking in the log for the events SLEEP and WAKE. Those are reactions to the iOS lifecycle. When you see SLEEP it's the app reacting to the sleep mode triggered by iOS. When you see WAKE, the App is exiting sleep mode and should re-attempt a connection as soon as an uplink is available.

During sleep the tunnel interface still exists, but it is "deconfigured". If you enable "Seamless Tunnel", then the interface is expected to stay configured and avoid traffic leaks (because IPs and routes will still be in place).
anatoli wrote:
Thu Jan 11, 2018 11:05 pm
But... with respect to the issue in question, in my case the non-working tunnel was established during sleep while connected to power, probably due to WiFi having a short connectivity issue (I had the cellular network turned off, so WiFi was the only source of internet). In other words, WiFi lost the connection, the tunnel broke due to ping-restart and when WiFi returned, the newly established tunnel was somehow non-working.

So, to reproduce the problem, I leave the phone alone for some time for it to enter the sleep mode (while connected to power), then I turn off my WiFi router, wait for, say, one minute (the delay should be longer than the ping-restart interval), then connect it again and wait a couple of minutes for OpenVPN to reestablish the tunnel (all this in the sleep mode). Now I wake up the phone and observe that the newly created tunnel is non-working, i.e. internal (protocol-level) pings pass but no other traffic.

Ordex, please let me know if you need additional details. The configs are exactly the same as in the thread about tls-auth and the logs are the same as mentioned here before.

Thanks a lot for this. It sounds very interesting. Sounds like there is some hitchup triggered by the TIMEOUT event together with the interface reconfiguration.

I'll add these details to our internal ticket. Stay tuned!

anatoli
OpenVPN User
Posts: 36
Joined: Sun Nov 17, 2013 8:32 am

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by anatoli » Fri Jan 12, 2018 4:59 am

Ordex, thanks for the insight, quite interesting.

There's a simpler way to trigger this behavior: when no cellular connection (i.e. WiFi only) just turn WiFi off (I mean WiFi of the phone), wait 5 sec, turn it on. OpenVPN reconnects but the new tunnel is broken.

anatoli
OpenVPN User
Posts: 36
Joined: Sun Nov 17, 2013 8:32 am

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by anatoli » Sat Jan 13, 2018 7:57 pm

For me this issue is solved in the 1.2.6.3 beta, so waiting for the release in AppStore.

With respect to the sleep/no-sleep behavior when the screen is turned off, I've found that the phone doesn't enter the sleep mode only when connected to a computer via USB. It enters the sleep mode as always when connected to a wall power adapter.

nafj79
OpenVpn Newbie
Posts: 3
Joined: Thu Jan 11, 2018 1:28 pm

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by nafj79 » Tue Jan 16, 2018 12:30 am

How to get beta versions for iOS???

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by ordex » Tue Jan 16, 2018 12:35 am

nafj79 wrote:
Tue Jan 16, 2018 12:30 am
How to get beta versions for iOS???
The beta program is closed at the moment. We are waiting for Apple to approve our next release.

Please, let's not hijack threads with unrelated posts.

User avatar
ordex
OpenVPN Inc.
Posts: 444
Joined: Wed Dec 28, 2016 2:32 am
Location: IRC #openvpn-devel @ libera.chat

Re: Upgrade to OpenVPN 1.2.5 (iOS): no traffic after an hour

Post by ordex » Wed Jan 17, 2018 6:03 am

OpenVPN Connect for iOS 1.2.6 is out!

Please refer to this post if you want to submit bugs of feature requests: viewtopic.php?f=36&t=25650

Thanks!

Locked