Code: Select all
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=5781cc6c 6acaae6c
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:21:07 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:21:08 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:21:08 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:21:08 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:21:46 vuzero authpriv.info dropbear[469]: Child connection from 61.85.170.178:37552
Jan 5 21:21:46 vuzero authpriv.info dropbear[470]: Child connection from 61.85.170.178:37558
Jan 5 21:21:47 vuzero authpriv.warn dropbear[469]: Login attempt for nonexistent user from 61.85.170.178:37552[b][u] ====> I don't know what is this ip adress [/u][/b]
Jan 5 21:21:47 vuzero authpriv.warn dropbear[470]: Login attempt for nonexistent user from 61.85.170.178:37558
Jan 5 21:21:48 vuzero authpriv.warn dropbear[469]: pam_unix(dropbear:auth): check pass; user unknown
Jan 5 21:21:48 vuzero authpriv.notice dropbear[469]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.85.170.178
Jan 5 21:21:48 vuzero authpriv.warn dropbear[470]: pam_unix(dropbear:auth): check pass; user unknown
Jan 5 21:21:48 vuzero authpriv.notice dropbear[470]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.85.170.178
Jan 5 21:21:50 vuzero authpriv.warn dropbear[469]: pam_authenticate() failed, rc=7, Authentication failure
Jan 5 21:21:50 vuzero authpriv.warn dropbear[469]: Bad PAM password attempt for '<invalid username>' from 61.85.170.178:37552
Jan 5 21:21:50 vuzero authpriv.warn dropbear[470]: pam_authenticate() failed, rc=7, Authentication failure
Jan 5 21:21:50 vuzero authpriv.warn dropbear[470]: Bad PAM password attempt for '<invalid username>' from 61.85.170.178:37558
Jan 5 21:21:51 vuzero authpriv.info dropbear[469]: Exit before auth: Exited normally
Jan 5 21:21:51 vuzero authpriv.info dropbear[470]: Exit before auth: Exited normally
Jan 5 21:22:01 vuzero authpriv.info crond[499]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:22:01 vuzero cron.info CROND[502]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:22:03 vuzero authpriv.info CROND[499]: pam_unix(crond:session): session closed for user root
Jan 5 21:23:01 vuzero authpriv.info crond[629]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:23:01 vuzero cron.info CROND[630]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:23:02 vuzero authpriv.info CROND[629]: pam_unix(crond:session): session closed for user root
Jan 5 21:24:01 vuzero authpriv.info crond[736]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:24:01 vuzero cron.info CROND[737]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:24:01 vuzero authpriv.info CROND[736]: pam_unix(crond:session): session closed for user root
Jan 5 21:25:01 vuzero authpriv.info crond[839]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:25:01 vuzero cron.info CROND[840]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:25:03 vuzero authpriv.info CROND[839]: pam_unix(crond:session): session closed for user root
Jan 5 21:26:01 vuzero authpriv.info crond[942]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:26:01 vuzero cron.info CROND[943]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:26:02 vuzero authpriv.info CROND[942]: pam_unix(crond:session): session closed for user root
Jan 5 21:26:08 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:26:08 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:26:08 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=67ef4114 8873703d
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:26:09 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:26:09 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:26:14 vuzero authpriv.info dropbear[969]: Child connection from 221.181.185.200:15188
Jan 5 21:26:16 vuzero authpriv.info dropbear[969]: Exit before auth: Disconnect received
Jan 5 21:27:01 vuzero authpriv.info crond[1045]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:27:01 vuzero cron.info CROND[1046]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:27:02 vuzero authpriv.info CROND[1045]: pam_unix(crond:session): session closed for user root
Jan 5 21:28:01 vuzero authpriv.info crond[1149]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:28:01 vuzero cron.info CROND[1150]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:28:02 vuzero authpriv.info CROND[1149]: pam_unix(crond:session): session closed for user root
Jan 5 21:29:01 vuzero authpriv.info crond[1253]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:29:01 vuzero cron.info CROND[1254]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:29:02 vuzero authpriv.info CROND[1253]: pam_unix(crond:session): session closed for user root
Jan 5 21:30:01 vuzero authpriv.info crond[1355]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:30:01 vuzero cron.info CROND[1357]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:30:01 vuzero authpriv.info crond[1356]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:30:01 vuzero cron.info CROND[1358]: (root) CMD (/usr/bin/ntpdate-sync silent)
Jan 5 21:30:02 vuzero authpriv.info CROND[1355]: pam_unix(crond:session): session closed for user root
Jan 5 21:30:08 vuzero daemon.notice ntpdate[1363]: adjust time server 82.66.249.102 offset 0.012882 sec
Jan 5 21:30:08 vuzero daemon.notice stb-hwclock: Current system time has been written into FP pseudo RTC.
Jan 5 21:30:08 vuzero authpriv.info CROND[1356]: pam_unix(crond:session): session closed for user root
Jan 5 21:31:01 vuzero authpriv.info crond[1469]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:31:01 vuzero cron.info CROND[1470]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:31:02 vuzero authpriv.info CROND[1469]: pam_unix(crond:session): session closed for user root
Jan 5 21:31:09 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:31:09 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:31:09 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=21b3c445 6e72b21e
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:31:10 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:31:10 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:32:01 vuzero authpriv.info crond[1570]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:32:01 vuzero cron.info CROND[1572]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:32:02 vuzero authpriv.info CROND[1570]: pam_unix(crond:session): session closed for user root
Jan 5 21:33:01 vuzero authpriv.info crond[1676]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:33:01 vuzero cron.info CROND[1677]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:33:02 vuzero authpriv.info CROND[1676]: pam_unix(crond:session): session closed for user root
Jan 5 21:34:01 vuzero authpriv.info crond[1780]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:34:01 vuzero cron.info CROND[1781]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:34:02 vuzero authpriv.info CROND[1780]: pam_unix(crond:session): session closed for user root
Jan 5 21:35:01 vuzero authpriv.info crond[1878]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:35:01 vuzero cron.info CROND[1879]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:35:02 vuzero authpriv.info CROND[1878]: pam_unix(crond:session): session closed for user root
Jan 5 21:36:01 vuzero authpriv.info crond[1982]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:36:01 vuzero cron.info CROND[1983]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:36:02 vuzero authpriv.info CROND[1982]: pam_unix(crond:session): session closed for user root
Jan 5 21:36:10 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:36:10 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:36:10 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=a9c570ec cf492255
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:36:11 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:36:12 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:36:12 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:36:12 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:36:47 vuzero authpriv.info dropbear[2064]: Child connection from 221.131.165.124:57853
Jan 5 21:36:49 vuzero authpriv.info dropbear[2064]: Exit before auth: Disconnect received
Jan 5 21:37:01 vuzero authpriv.info crond[2089]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:37:01 vuzero cron.info CROND[2090]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:37:02 vuzero authpriv.info CROND[2089]: pam_unix(crond:session): session closed for user root
Jan 5 21:38:01 vuzero authpriv.info crond[2191]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:38:01 vuzero cron.info CROND[2192]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:38:01 vuzero authpriv.info CROND[2191]: pam_unix(crond:session): session closed for user root
Jan 5 21:38:20 vuzero authpriv.info dropbear[2225]: Child connection from 221.181.185.135:40375
Jan 5 21:38:23 vuzero authpriv.info dropbear[2225]: Exit before auth: Disconnect received
Jan 5 21:39:01 vuzero authpriv.info crond[2292]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:39:01 vuzero cron.info CROND[2293]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:39:03 vuzero authpriv.info CROND[2292]: pam_unix(crond:session): session closed for user root
Jan 5 21:39:45 vuzero authpriv.info dropbear[2369]: Child connection from IP ADRESS XXXXXXXXX:64127
Jan 5 21:39:48 vuzero authpriv.notice dropbear[2369]: PAM password auth succeeded for 'root' from IP ADRESS XXXXXXXXX:64127
Jan 5 21:40:01 vuzero authpriv.info crond[2397]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:40:01 vuzero cron.info CROND[2398]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:40:01 vuzero authpriv.info CROND[2397]: pam_unix(crond:session): session closed for user root
Jan 5 21:41:01 vuzero authpriv.info crond[2503]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:41:01 vuzero cron.info CROND[2504]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:41:01 vuzero authpriv.info CROND[2503]: pam_unix(crond:session): session closed for user root
Jan 5 21:41:12 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:41:12 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:41:12 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=2e46da8d 73753add
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:41:13 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:41:13 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:42:01 vuzero authpriv.info crond[2614]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:42:01 vuzero cron.info CROND[2615]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:42:03 vuzero authpriv.info CROND[2614]: pam_unix(crond:session): session closed for user root
Jan 5 21:43:01 vuzero authpriv.info crond[2717]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:43:01 vuzero cron.info CROND[2718]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:43:02 vuzero authpriv.info CROND[2717]: pam_unix(crond:session): session closed for user root
Jan 5 21:44:01 vuzero authpriv.info crond[2825]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:44:01 vuzero cron.info CROND[2826]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:44:01 vuzero authpriv.info CROND[2825]: pam_unix(crond:session): session closed for user root
Jan 5 21:44:13 vuzero authpriv.info dropbear[2850]: Child connection from 221.181.185.221:12726
Jan 5 21:44:15 vuzero authpriv.info dropbear[2850]: Exit before auth: Disconnect received
Jan 5 21:45:02 vuzero authpriv.info crond[2930]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:45:02 vuzero cron.info CROND[2931]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:45:03 vuzero authpriv.info CROND[2930]: pam_unix(crond:session): session closed for user root
Jan 5 21:46:01 vuzero authpriv.info crond[3037]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:46:01 vuzero cron.info CROND[3038]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:46:02 vuzero authpriv.info CROND[3037]: pam_unix(crond:session): session closed for user root
Jan 5 21:46:13 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:46:13 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:46:13 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=0049b6c2 3727ddc9
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:46:14 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:46:14 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:47:01 vuzero authpriv.info crond[3144]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:47:01 vuzero cron.info CROND[3145]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:47:01 vuzero authpriv.info CROND[3144]: pam_unix(crond:session): session closed for user root
Jan 5 21:48:01 vuzero authpriv.info crond[3249]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:48:01 vuzero cron.info CROND[3250]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:48:01 vuzero authpriv.info CROND[3249]: pam_unix(crond:session): session closed for user root
Jan 5 21:49:01 vuzero authpriv.info crond[3357]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:49:01 vuzero cron.info CROND[3358]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:49:03 vuzero authpriv.info CROND[3357]: pam_unix(crond:session): session closed for user root
Jan 5 21:50:01 vuzero authpriv.info crond[3460]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:50:01 vuzero cron.info CROND[3461]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:50:01 vuzero authpriv.info CROND[3460]: pam_unix(crond:session): session closed for user root
Jan 5 21:50:17 vuzero authpriv.info dropbear[3494]: Child connection from 222.187.227.224:16459
Jan 5 21:50:18 vuzero authpriv.info dropbear[3494]: Exit before auth: Disconnect received
Jan 5 21:51:01 vuzero authpriv.info crond[3570]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:51:01 vuzero cron.info CROND[3571]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:51:03 vuzero authpriv.info CROND[3570]: pam_unix(crond:session): session closed for user root
Jan 5 21:51:14 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:51:14 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:51:14 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=2216ae33 8b390d19
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:51:15 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:51:16 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:51:16 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:51:16 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:52:01 vuzero authpriv.info crond[3679]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:52:01 vuzero cron.info CROND[3680]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:52:02 vuzero authpriv.info CROND[3679]: pam_unix(crond:session): session closed for user root
Jan 5 21:53:01 vuzero authpriv.info crond[3786]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:53:01 vuzero cron.info CROND[3787]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:53:02 vuzero authpriv.info CROND[3786]: pam_unix(crond:session): session closed for user root
Jan 5 21:54:01 vuzero authpriv.info crond[3893]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:54:01 vuzero cron.info CROND[3894]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:54:01 vuzero authpriv.info CROND[3893]: pam_unix(crond:session): session closed for user root
Jan 5 21:55:01 vuzero authpriv.info crond[4001]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:55:01 vuzero cron.info CROND[4002]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:55:03 vuzero authpriv.info CROND[4001]: pam_unix(crond:session): session closed for user root
Jan 5 21:55:20 vuzero authpriv.info dropbear[4037]: Child connection from IP ADRESS XXXXXXXXX:64180
Jan 5 21:55:22 vuzero authpriv.notice dropbear[4037]: PAM password auth succeeded for 'root' from IP ADRESS XXXXXXXXX:64180
Jan 5 21:56:01 vuzero authpriv.info crond[4108]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:56:01 vuzero cron.info CROND[4109]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:56:02 vuzero authpriv.info CROND[4108]: pam_unix(crond:session): session closed for user root
Jan 5 21:56:16 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:16 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 21:56:16 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=1b342dc5 1adf4c8f
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 21:56:17 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 21:56:17 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 21:56:19 vuzero daemon.err openvpn[19495]: Connection reset command was pushed by server ('')
Jan 5 21:56:19 vuzero daemon.notice openvpn[19495]: SIGUSR1[soft,server-pushed-connection-reset] received, process restarting
Jan 5 21:56:24 vuzero daemon.notice openvpn[19495]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:24 vuzero daemon.notice openvpn[19495]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 21:56:25 vuzero daemon.notice openvpn[19495]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:25 vuzero daemon.notice openvpn[19495]: TCP_CLIENT link local: (not bound)
Jan 5 21:56:25 vuzero daemon.notice openvpn[19495]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1583', remote='link-mtu 1591'
Jan 5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-128-CBC'
Jan 5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
Jan 5 21:56:25 vuzero daemon.warn openvpn[19495]: WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
Jan 5 21:56:25 vuzero daemon.notice openvpn[19495]: [Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed] Peer Connection Initiated with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 21:56:32 vuzero daemon.notice openvpn[19495]: TUN/TAP device tap0 opened
Jan 5 21:56:32 vuzero daemon.notice openvpn[19495]: Initialization Sequence Completed
Jan 5 21:56:51 vuzero authpriv.info dropbear[4205]: Child connection from 221.181.185.143:29943
Jan 5 21:56:53 vuzero authpriv.info dropbear[4205]: Exit before auth: Disconnect received
Jan 5 21:57:01 vuzero authpriv.info crond[4223]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:57:01 vuzero cron.info CROND[4224]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:57:01 vuzero authpriv.info CROND[4223]: pam_unix(crond:session): session closed for user root
Jan 5 21:58:01 vuzero authpriv.info crond[4327]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:58:01 vuzero cron.info CROND[4328]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:58:03 vuzero authpriv.info CROND[4327]: pam_unix(crond:session): session closed for user root
Jan 5 21:59:01 vuzero authpriv.info crond[4430]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 21:59:01 vuzero cron.info CROND[4431]: (root) CMD (/etc/RELOAD.sh)
Jan 5 21:59:02 vuzero authpriv.info CROND[4430]: pam_unix(crond:session): session closed for user root
Jan 5 22:00:01 vuzero authpriv.info crond[4535]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:00:01 vuzero cron.info CROND[4537]: (root) CMD (/etc/SUPAUTO.sh)
Jan 5 22:00:01 vuzero authpriv.info crond[4536]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:00:01 vuzero cron.info CROND[4538]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (/etc/SUPAUTO.sh: line 3: ifconfig: command not found)
Jan 5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (invalid data)
Jan 5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (CODE : 787775009098078)
Jan 5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (MAC : )
Jan 5 22:00:01 vuzero cron.info CROND[4535]: (root) CMDOUT (HASH : 94855ae73151287949585342e84d24ea)
Jan 5 22:00:01 vuzero authpriv.info CROND[4535]: pam_unix(crond:session): session closed for user root
Jan 5 22:00:02 vuzero authpriv.info CROND[4536]: pam_unix(crond:session): session closed for user root
Jan 5 22:01:01 vuzero authpriv.info crond[4648]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:01:01 vuzero cron.info CROND[4649]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:01:02 vuzero authpriv.info CROND[4648]: pam_unix(crond:session): session closed for user root
Jan 5 22:01:12 vuzero authpriv.info dropbear[4672]: Child connection from 81.161.63.100:34092
Jan 5 22:01:13 vuzero authpriv.info dropbear[4672]: Exit before auth: Exited normally
Jan 5 22:01:13 vuzero authpriv.info dropbear[4673]: Child connection from 81.161.63.100:44658
Jan 5 22:01:13 vuzero authpriv.info dropbear[4674]: Child connection from 81.161.63.100:44684
Jan 5 22:01:16 vuzero authpriv.notice dropbear[4673]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.161.63.100 user=root
Jan 5 22:01:16 vuzero authpriv.notice dropbear[4674]: pam_unix(dropbear:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.161.63.100 user=root
Jan 5 22:01:17 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 22:01:17 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 22:01:17 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=73de7e60 7b7abdfb
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 22:01:18 vuzero authpriv.warn dropbear[4673]: pam_authenticate() failed, rc=7, Authentication failure
Jan 5 22:01:18 vuzero authpriv.warn dropbear[4673]: Bad PAM password attempt for 'root' from 81.161.63.100:44658
Jan 5 22:01:18 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 22:01:18 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 22:01:18 vuzero authpriv.warn dropbear[4674]: pam_authenticate() failed, rc=7, Authentication failure
Jan 5 22:01:18 vuzero authpriv.warn dropbear[4674]: Bad PAM password attempt for 'root' from 81.161.63.100:44684
Jan 5 22:01:19 vuzero authpriv.info dropbear[4673]: Exit before auth (user 'root', 1 fails): Exited normally
Jan 5 22:01:19 vuzero authpriv.info dropbear[4674]: Exit before auth (user 'root', 1 fails): Exited normally
Jan 5 22:02:01 vuzero authpriv.info crond[4756]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:02:01 vuzero cron.info CROND[4757]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:02:02 vuzero authpriv.info CROND[4756]: pam_unix(crond:session): session closed for user root
Jan 5 22:02:07 vuzero authpriv.info dropbear[4769]: Child connection from 221.181.185.222:23047
Jan 5 22:02:09 vuzero authpriv.info dropbear[4769]: Exit before auth: Disconnect received
Jan 5 22:03:01 vuzero authpriv.info crond[4860]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:03:01 vuzero cron.info CROND[4861]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:03:01 vuzero authpriv.info CROND[4860]: pam_unix(crond:session): session closed for user root
Jan 5 22:04:01 vuzero authpriv.info crond[4965]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:04:01 vuzero cron.info CROND[4966]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:04:01 vuzero authpriv.info CROND[4965]: pam_unix(crond:session): session closed for user root
Jan 5 22:04:15 vuzero authpriv.info dropbear[4992]: Child connection from 192.241.206.31:56112
Jan 5 22:04:25 vuzero authpriv.info dropbear[4992]: Exit before auth: Exited normally
Jan 5 22:05:01 vuzero authpriv.info crond[5072]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:05:01 vuzero cron.info CROND[5073]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:05:03 vuzero authpriv.info CROND[5072]: pam_unix(crond:session): session closed for user root
Jan 5 22:06:01 vuzero authpriv.info crond[5172]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:06:01 vuzero cron.info CROND[5173]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:06:02 vuzero authpriv.info CROND[5172]: pam_unix(crond:session): session closed for user root
Jan 5 22:06:18 vuzero daemon.notice openvpn[19498]: TCP/UDP: Preserving recently used remote address: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 22:06:18 vuzero daemon.notice openvpn[19498]: Socket Buffers: R=[87380->87380] S=[16384->16384]
Jan 5 22:06:18 vuzero daemon.notice openvpn[19498]: Attempting to establish TCP connection with [AF_INET]IP ADRESS XXXXXXXXX:62281 [nonblock]
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: TCP connection established with [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link local: (not bound)
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: TCP_CLIENT link remote: [AF_INET]IP ADRESS XXXXXXXXX:62281
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: TLS: Initial packet from [AF_INET]IP ADRESS XXXXXXXXX:62281, sid=bfa9591d 2fcd12ff
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=1, C=FR, O=Freebox SA, CN=Freebox OpenVPN server CA for a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY KU OK
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: Validating certificate extended key usage
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY EKU OK
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY X509NAME OK: C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 22:06:19 vuzero daemon.notice openvpn[19498]: VERIFY OK: depth=0, C=FR, O=Freebox SA, CN=Freebox OpenVPN server a151ab2c98d4d3dd2f9cc9114a0080ed
Jan 5 22:06:20 vuzero daemon.err openvpn[19498]: Connection reset, restarting [0]
Jan 5 22:06:20 vuzero daemon.notice openvpn[19498]: SIGUSR1[soft,connection-reset] received, process restarting
Jan 5 22:06:20 vuzero daemon.notice openvpn[19498]: Restart pause, 300 second(s)
Jan 5 22:07:01 vuzero authpriv.info crond[5278]: pam_unix(crond:session): session opened for user root by (uid=0)
Jan 5 22:07:01 vuzero cron.info CROND[5279]: (root) CMD (/etc/RELOAD.sh)
Jan 5 22:07:02 vuzero authpriv.info CROND[5278]: pam_unix(crond:session): session closed for user root