Code: Select all
Mon Mar 16 21:45:56 2015 LZO compression initialized
Mon Mar 16 21:45:56 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:45:56 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:45:56 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:45:56 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:45:56 2015 TCP connection established with 67.207.202.9:59535
Mon Mar 16 21:45:56 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:45:56 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:45:56 2015 TCPv4_SERVER link remote: 67.207.202.9:59535
Mon Mar 16 21:45:56 2015 67.207.202.9:59535 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:45:56 2015 67.207.202.9:59535 Connection reset, restarting [0]
Mon Mar 16 21:45:56 2015 67.207.202.9:59535 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:45:56 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:34 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:34 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:34 2015 LZO compression initialized
Mon Mar 16 21:55:34 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:34 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:34 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:34 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:34 2015 TCP connection established with 175.17.207.234:27503
Mon Mar 16 21:55:34 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:34 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:34 2015 TCPv4_SERVER link remote: 175.17.207.234:27503
Mon Mar 16 21:55:40 2015 175.17.207.234:27503 WARNING: Bad encapsulated packet length from peer (20304), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:40 2015 175.17.207.234:27503 Connection reset, restarting [0]
Mon Mar 16 21:55:40 2015 175.17.207.234:27503 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:40 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:40 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:40 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:40 2015 LZO compression initialized
Mon Mar 16 21:55:40 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:40 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:40 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:40 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:40 2015 TCP connection established with 175.17.198.71:62114
Mon Mar 16 21:55:40 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:40 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:40 2015 TCPv4_SERVER link remote: 175.17.198.71:62114
Mon Mar 16 21:55:40 2015 175.17.198.71:62114 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:40 2015 175.17.198.71:62114 Connection reset, restarting [0]
Mon Mar 16 21:55:40 2015 175.17.198.71:62114 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:40 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:41 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:41 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:41 2015 LZO compression initialized
Mon Mar 16 21:55:41 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:41 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:41 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:41 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:41 2015 TCP connection established with 175.17.198.71:22009
Mon Mar 16 21:55:41 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:41 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:41 2015 TCPv4_SERVER link remote: 175.17.198.71:22009
Mon Mar 16 21:55:41 2015 175.17.198.71:22009 WARNING: Bad encapsulated packet length from peer (32926), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:41 2015 175.17.198.71:22009 Connection reset, restarting [0]
Mon Mar 16 21:55:41 2015 175.17.198.71:22009 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:41 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:42 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:42 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:42 2015 LZO compression initialized
Mon Mar 16 21:55:42 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:42 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:42 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:42 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:42 2015 TCP connection established with 175.17.196.162:64492
Mon Mar 16 21:55:42 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link remote: 175.17.196.162:64492
Mon Mar 16 21:55:42 2015 175.17.196.162:64492 WARNING: Bad encapsulated packet length from peer (27648), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:42 2015 175.17.196.162:64492 Connection reset, restarting [0]
Mon Mar 16 21:55:42 2015 175.17.196.162:64492 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:42 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:42 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:42 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:42 2015 LZO compression initialized
Mon Mar 16 21:55:42 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:42 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:42 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:42 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:42 2015 TCP connection established with 175.17.204.21:34157
Mon Mar 16 21:55:42 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:42 2015 TCPv4_SERVER link remote: 175.17.204.21:34157
Mon Mar 16 21:55:42 2015 175.17.204.21:34157 WARNING: Bad encapsulated packet length from peer (15475), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:42 2015 175.17.204.21:34157 Connection reset, restarting [0]
Mon Mar 16 21:55:42 2015 175.17.204.21:34157 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:42 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:43 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:43 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:43 2015 LZO compression initialized
Mon Mar 16 21:55:43 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:43 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:43 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:43 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:43 2015 TCP connection established with 175.17.205.189:45444
Mon Mar 16 21:55:43 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:43 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:43 2015 TCPv4_SERVER link remote: 175.17.205.189:45444
Mon Mar 16 21:55:43 2015 175.17.205.189:45444 WARNING: Bad encapsulated packet length from peer (3338), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:43 2015 175.17.205.189:45444 Connection reset, restarting [0]
Mon Mar 16 21:55:43 2015 175.17.205.189:45444 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:43 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:44 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:44 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:44 2015 LZO compression initialized
Mon Mar 16 21:55:44 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:44 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:44 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:44 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:44 2015 TCP connection established with 175.17.205.189:38764
Mon Mar 16 21:55:44 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link remote: 175.17.205.189:38764
Mon Mar 16 21:55:44 2015 175.17.205.189:38764 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:44 2015 175.17.205.189:38764 Connection reset, restarting [0]
Mon Mar 16 21:55:44 2015 175.17.205.189:38764 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:44 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:44 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:44 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:44 2015 LZO compression initialized
Mon Mar 16 21:55:44 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:44 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:44 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:44 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:44 2015 TCP connection established with 175.17.204.21:14246
Mon Mar 16 21:55:44 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:44 2015 TCPv4_SERVER link remote: 175.17.204.21:14246
Mon Mar 16 21:55:44 2015 175.17.204.21:14246 WARNING: Bad encapsulated packet length from peer (20304), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:44 2015 175.17.204.21:14246 Connection reset, restarting [0]
Mon Mar 16 21:55:44 2015 175.17.204.21:14246 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:44 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:45 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:45 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:45 2015 LZO compression initialized
Mon Mar 16 21:55:45 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:45 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:45 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:45 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:45 2015 TCP connection established with 175.17.208.212:22603
Mon Mar 16 21:55:45 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:45 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:45 2015 TCPv4_SERVER link remote: 175.17.208.212:22603
Mon Mar 16 21:55:45 2015 175.17.208.212:22603 WARNING: Bad encapsulated packet length from peer (32768), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:45 2015 175.17.208.212:22603 Connection reset, restarting [0]
Mon Mar 16 21:55:45 2015 175.17.208.212:22603 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:45 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:46 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:46 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:46 2015 LZO compression initialized
Mon Mar 16 21:55:46 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:46 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:46 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:46 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:46 2015 TCP connection established with 175.17.197.52:2227
Mon Mar 16 21:55:46 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link remote: 175.17.197.52:2227
Mon Mar 16 21:55:46 2015 175.17.197.52:2227 TLS Error: unknown opcode received from 175.17.197.52:2227 op=0
Mon Mar 16 21:55:46 2015 175.17.197.52:2227 Fatal TLS error (check_tls_errors_co), restarting
Mon Mar 16 21:55:46 2015 175.17.197.52:2227 SIGUSR1[soft,tls-error] received, client-instance restarting
Mon Mar 16 21:55:46 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:46 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:46 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:46 2015 LZO compression initialized
Mon Mar 16 21:55:46 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:46 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:46 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:46 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:46 2015 TCP connection established with 175.17.202.113:43782
Mon Mar 16 21:55:46 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:46 2015 TCPv4_SERVER link remote: 175.17.202.113:43782
Mon Mar 16 21:55:46 2015 175.17.202.113:43782 TLS Error: unknown opcode received from 175.17.202.113:43782 op=0
Mon Mar 16 21:55:46 2015 175.17.202.113:43782 Fatal TLS error (check_tls_errors_co), restarting
Mon Mar 16 21:55:46 2015 175.17.202.113:43782 SIGUSR1[soft,tls-error] received, client-instance restarting
Mon Mar 16 21:55:46 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:47 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:47 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:47 2015 LZO compression initialized
Mon Mar 16 21:55:47 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:47 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:47 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:47 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:47 2015 TCP connection established with 175.17.201.98:58613
Mon Mar 16 21:55:47 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:47 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:47 2015 TCPv4_SERVER link remote: 175.17.201.98:58613
Mon Mar 16 21:55:47 2015 175.17.201.98:58613 WARNING: Bad encapsulated packet length from peer (18501), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:47 2015 175.17.201.98:58613 Connection reset, restarting [0]
Mon Mar 16 21:55:47 2015 175.17.201.98:58613 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:47 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:48 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:48 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:48 2015 LZO compression initialized
Mon Mar 16 21:55:48 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:48 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:48 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:48 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:48 2015 TCP connection established with 175.17.207.234:2035
Mon Mar 16 21:55:48 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link remote: 175.17.207.234:2035
Mon Mar 16 21:55:48 2015 175.17.207.234:2035 WARNING: Bad encapsulated packet length from peer (0), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:48 2015 175.17.207.234:2035 Connection reset, restarting [0]
Mon Mar 16 21:55:48 2015 175.17.207.234:2035 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:48 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:48 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:48 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:48 2015 LZO compression initialized
Mon Mar 16 21:55:48 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:48 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:48 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:48 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:48 2015 TCP connection established with 175.17.192.106:21853
Mon Mar 16 21:55:48 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:48 2015 TCPv4_SERVER link remote: 175.17.192.106:21853
Mon Mar 16 21:55:48 2015 175.17.192.106:21853 WARNING: Bad encapsulated packet length from peer (0), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:48 2015 175.17.192.106:21853 Connection reset, restarting [0]
Mon Mar 16 21:55:48 2015 175.17.192.106:21853 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:48 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:49 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:49 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:49 2015 LZO compression initialized
Mon Mar 16 21:55:49 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:49 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:49 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:49 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:49 2015 TCP connection established with 175.17.203.30:4743
Mon Mar 16 21:55:49 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:49 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:49 2015 TCPv4_SERVER link remote: 175.17.203.30:4743
Mon Mar 16 21:55:49 2015 175.17.203.30:4743 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:49 2015 175.17.203.30:4743 Connection reset, restarting [0]
Mon Mar 16 21:55:49 2015 175.17.203.30:4743 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:49 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:50 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:50 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:50 2015 LZO compression initialized
Mon Mar 16 21:55:50 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:50 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:50 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:50 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:50 2015 TCP connection established with 175.17.201.71:49120
Mon Mar 16 21:55:50 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:50 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:50 2015 TCPv4_SERVER link remote: 175.17.201.71:49120
Mon Mar 16 21:55:55 2015 175.17.201.71:49120 Connection reset, restarting [0]
Mon Mar 16 21:55:55 2015 175.17.201.71:49120 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:55 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:55 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:55 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:55 2015 LZO compression initialized
Mon Mar 16 21:55:55 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:55 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:55 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:55 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:55 2015 TCP connection established with 175.17.203.30:1599
Mon Mar 16 21:55:55 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:55 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:55 2015 TCPv4_SERVER link remote: 175.17.203.30:1599
Mon Mar 16 21:55:55 2015 175.17.203.30:1599 WARNING: Bad encapsulated packet length from peer (12300), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:55 2015 175.17.203.30:1599 Connection reset, restarting [0]
Mon Mar 16 21:55:55 2015 175.17.203.30:1599 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:55 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:56 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:56 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:56 2015 LZO compression initialized
Mon Mar 16 21:55:56 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:56 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:56 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:56 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:56 2015 TCP connection established with 175.17.194.181:27731
Mon Mar 16 21:55:56 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link remote: 175.17.194.181:27731
Mon Mar 16 21:55:56 2015 175.17.194.181:27731 WARNING: Bad encapsulated packet length from peer (20304), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:56 2015 175.17.194.181:27731 Connection reset, restarting [0]
Mon Mar 16 21:55:56 2015 175.17.194.181:27731 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:56 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:56 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:56 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:56 2015 LZO compression initialized
Mon Mar 16 21:55:56 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:56 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:56 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:56 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:56 2015 TCP connection established with 175.17.195.114:18374
Mon Mar 16 21:55:56 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:56 2015 TCPv4_SERVER link remote: 175.17.195.114:18374
Mon Mar 16 21:55:56 2015 175.17.195.114:18374 WARNING: Bad encapsulated packet length from peer (21582), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:55:56 2015 175.17.195.114:18374 Connection reset, restarting [0]
Mon Mar 16 21:55:56 2015 175.17.195.114:18374 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:55:56 2015 TCP/UDP: Closing socket
Mon Mar 16 21:55:57 2015 MULTI: multi_create_instance called
Mon Mar 16 21:55:57 2015 Re-using SSL/TLS context
Mon Mar 16 21:55:57 2015 LZO compression initialized
Mon Mar 16 21:55:57 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:55:57 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:55:57 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:55:57 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:55:57 2015 TCP connection established with 175.17.195.114:49804
Mon Mar 16 21:55:57 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:55:57 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:55:57 2015 TCPv4_SERVER link remote: 175.17.195.114:49804
Mon Mar 16 21:56:02 2015 175.17.195.114:49804 Connection reset, restarting [0]
Mon Mar 16 21:56:02 2015 175.17.195.114:49804 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:56:02 2015 TCP/UDP: Closing socket
Mon Mar 16 21:56:02 2015 MULTI: multi_create_instance called
Mon Mar 16 21:56:02 2015 Re-using SSL/TLS context
Mon Mar 16 21:56:02 2015 LZO compression initialized
Mon Mar 16 21:56:02 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:56:02 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:56:02 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:56:02 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:56:02 2015 TCP connection established with 175.17.200.186:7520
Mon Mar 16 21:56:02 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:56:02 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:56:02 2015 TCPv4_SERVER link remote: 175.17.200.186:7520
Mon Mar 16 21:56:02 2015 175.17.200.186:7520 WARNING: Bad encapsulated packet length from peer (17517), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:56:02 2015 175.17.200.186:7520 Connection reset, restarting [0]
Mon Mar 16 21:56:02 2015 175.17.200.186:7520 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:56:02 2015 TCP/UDP: Closing socket
Mon Mar 16 21:56:03 2015 MULTI: multi_create_instance called
Mon Mar 16 21:56:03 2015 Re-using SSL/TLS context
Mon Mar 16 21:56:03 2015 LZO compression initialized
Mon Mar 16 21:56:03 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Mon Mar 16 21:56:03 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Mon Mar 16 21:56:03 2015 Local Options hash (VER=V4): 'c0103fa8'
Mon Mar 16 21:56:03 2015 Expected Remote Options hash (VER=V4): '69109d17'
Mon Mar 16 21:56:03 2015 TCP connection established with 175.17.198.204:54218
Mon Mar 16 21:56:03 2015 Socket flags: TCP_NODELAY=1 succeeded
Mon Mar 16 21:56:03 2015 TCPv4_SERVER link local: [undef]
Mon Mar 16 21:56:03 2015 TCPv4_SERVER link remote: 175.17.198.204:54218
Mon Mar 16 21:56:03 2015 175.17.198.204:54218 WARNING: Bad encapsulated packet length from peer (14848), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Mon Mar 16 21:56:03 2015 175.17.198.204:54218 Connection reset, restarting [0]
Mon Mar 16 21:56:03 2015 175.17.198.204:54218 SIGUSR1[soft,connection-reset] received, client-instance restarting
Mon Mar 16 21:56:03 2015 TCP/UDP: Closing socket
Tue Mar 17 06:42:55 2015 MULTI: multi_create_instance called
Tue Mar 17 06:42:55 2015 Re-using SSL/TLS context
Tue Mar 17 06:42:55 2015 LZO compression initialized
Tue Mar 17 06:42:55 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 06:42:55 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 06:42:55 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 06:42:55 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 06:42:55 2015 TCP connection established with 184.105.247.195:37000
Tue Mar 17 06:42:55 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 06:42:55 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 06:42:55 2015 TCPv4_SERVER link remote: 184.105.247.195:37000
Tue Mar 17 06:42:56 2015 184.105.247.195:37000 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 06:42:56 2015 184.105.247.195:37000 Connection reset, restarting [0]
Tue Mar 17 06:42:56 2015 184.105.247.195:37000 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 06:42:56 2015 TCP/UDP: Closing socket
Tue Mar 17 09:31:44 2015 MULTI: multi_create_instance called
Tue Mar 17 09:31:44 2015 Re-using SSL/TLS context
Tue Mar 17 09:31:44 2015 LZO compression initialized
Tue Mar 17 09:31:44 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 09:31:44 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 09:31:44 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 09:31:44 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 09:31:44 2015 TCP connection established with 141.212.122.34:51656
Tue Mar 17 09:31:44 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 09:31:44 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 09:31:44 2015 TCPv4_SERVER link remote: 141.212.122.34:51656
Tue Mar 17 09:31:44 2015 141.212.122.34:51656 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 09:31:44 2015 141.212.122.34:51656 Connection reset, restarting [0]
Tue Mar 17 09:31:44 2015 141.212.122.34:51656 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 09:31:44 2015 TCP/UDP: Closing socket
Tue Mar 17 09:32:37 2015 MULTI: multi_create_instance called
Tue Mar 17 09:32:37 2015 Re-using SSL/TLS context
Tue Mar 17 09:32:37 2015 LZO compression initialized
Tue Mar 17 09:32:37 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 09:32:37 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 09:32:37 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 09:32:37 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 09:32:37 2015 TCP connection established with 141.212.122.58:54538
Tue Mar 17 09:32:37 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 09:32:37 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 09:32:37 2015 TCPv4_SERVER link remote: 141.212.122.58:54538
Tue Mar 17 09:32:37 2015 141.212.122.58:54538 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 09:32:37 2015 141.212.122.58:54538 Connection reset, restarting [0]
Tue Mar 17 09:32:37 2015 141.212.122.58:54538 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 09:32:37 2015 TCP/UDP: Closing socket
Tue Mar 17 10:38:39 2015 MULTI: multi_create_instance called
Tue Mar 17 10:38:39 2015 Re-using SSL/TLS context
Tue Mar 17 10:38:39 2015 LZO compression initialized
Tue Mar 17 10:38:39 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 10:38:39 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 10:38:39 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 10:38:39 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 10:38:39 2015 TCP connection established with 188.138.9.50:58568
Tue Mar 17 10:38:39 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 10:38:39 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 10:38:39 2015 TCPv4_SERVER link remote: 188.138.9.50:58568
Tue Mar 17 10:38:39 2015 188.138.9.50:58568 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 10:38:39 2015 188.138.9.50:58568 Connection reset, restarting [0]
Tue Mar 17 10:38:39 2015 188.138.9.50:58568 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 10:38:39 2015 TCP/UDP: Closing socket
Tue Mar 17 17:45:00 2015 MULTI: multi_create_instance called
Tue Mar 17 17:45:00 2015 Re-using SSL/TLS context
Tue Mar 17 17:45:00 2015 LZO compression initialized
Tue Mar 17 17:45:00 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 17:45:00 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 17:45:00 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 17:45:00 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 17:45:00 2015 TCP connection established with 141.212.122.26:25642
Tue Mar 17 17:45:00 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 17:45:00 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 17:45:00 2015 TCPv4_SERVER link remote: 141.212.122.26:25642
Tue Mar 17 17:45:00 2015 141.212.122.26:25642 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 17:45:00 2015 141.212.122.26:25642 Connection reset, restarting [0]
Tue Mar 17 17:45:00 2015 141.212.122.26:25642 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 17:45:00 2015 TCP/UDP: Closing socket
Tue Mar 17 19:32:59 2015 MULTI: multi_create_instance called
Tue Mar 17 19:32:59 2015 Re-using SSL/TLS context
Tue Mar 17 19:32:59 2015 LZO compression initialized
Tue Mar 17 19:32:59 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 19:32:59 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 19:32:59 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 19:32:59 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 19:32:59 2015 TCP connection established with 188.132.207.46:45292
Tue Mar 17 19:32:59 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 19:32:59 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 19:32:59 2015 TCPv4_SERVER link remote: 188.132.207.46:45292
Tue Mar 17 19:32:59 2015 188.132.207.46:45292 WARNING: Bad encapsulated packet length from peer (32871), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 19:32:59 2015 188.132.207.46:45292 Connection reset, restarting [0]
Tue Mar 17 19:32:59 2015 188.132.207.46:45292 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 19:32:59 2015 TCP/UDP: Closing socket
Tue Mar 17 21:49:55 2015 MULTI: multi_create_instance called
Tue Mar 17 21:49:55 2015 Re-using SSL/TLS context
Tue Mar 17 21:49:55 2015 LZO compression initialized
Tue Mar 17 21:49:55 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Tue Mar 17 21:49:55 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Mar 17 21:49:55 2015 Local Options hash (VER=V4): 'c0103fa8'
Tue Mar 17 21:49:55 2015 Expected Remote Options hash (VER=V4): '69109d17'
Tue Mar 17 21:49:55 2015 TCP connection established with 67.207.202.9:32967
Tue Mar 17 21:49:55 2015 Socket flags: TCP_NODELAY=1 succeeded
Tue Mar 17 21:49:55 2015 TCPv4_SERVER link local: [undef]
Tue Mar 17 21:49:55 2015 TCPv4_SERVER link remote: 67.207.202.9:32967
Tue Mar 17 21:49:55 2015 67.207.202.9:32967 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Tue Mar 17 21:49:55 2015 67.207.202.9:32967 Connection reset, restarting [0]
Tue Mar 17 21:49:55 2015 67.207.202.9:32967 SIGUSR1[soft,connection-reset] received, client-instance restarting
Tue Mar 17 21:49:55 2015 TCP/UDP: Closing socket
Wed Mar 18 02:22:01 2015 MULTI: multi_create_instance called
Wed Mar 18 02:22:01 2015 Re-using SSL/TLS context
Wed Mar 18 02:22:01 2015 LZO compression initialized
Wed Mar 18 02:22:01 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Wed Mar 18 02:22:01 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Mar 18 02:22:01 2015 Local Options hash (VER=V4): 'c0103fa8'
Wed Mar 18 02:22:01 2015 Expected Remote Options hash (VER=V4): '69109d17'
Wed Mar 18 02:22:01 2015 TCP connection established with 61.240.144.66:60000
Wed Mar 18 02:22:01 2015 Socket flags: TCP_NODELAY=1 succeeded
Wed Mar 18 02:22:01 2015 TCPv4_SERVER link local: [undef]
Wed Mar 18 02:22:01 2015 TCPv4_SERVER link remote: 61.240.144.66:60000
Wed Mar 18 02:22:03 2015 61.240.144.66:60000 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Wed Mar 18 02:22:03 2015 61.240.144.66:60000 Connection reset, restarting [0]
Wed Mar 18 02:22:03 2015 61.240.144.66:60000 SIGUSR1[soft,connection-reset] received, client-instance restarting
Wed Mar 18 02:22:03 2015 TCP/UDP: Closing socket
Wed Mar 18 06:19:05 2015 MULTI: multi_create_instance called
Wed Mar 18 06:19:05 2015 Re-using SSL/TLS context
Wed Mar 18 06:19:05 2015 LZO compression initialized
Wed Mar 18 06:19:05 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Wed Mar 18 06:19:05 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Mar 18 06:19:05 2015 Local Options hash (VER=V4): 'c0103fa8'
Wed Mar 18 06:19:05 2015 Expected Remote Options hash (VER=V4): '69109d17'
Wed Mar 18 06:19:05 2015 TCP connection established with 74.82.47.2:39528
Wed Mar 18 06:19:05 2015 Socket flags: TCP_NODELAY=1 succeeded
Wed Mar 18 06:19:05 2015 TCPv4_SERVER link local: [undef]
Wed Mar 18 06:19:05 2015 TCPv4_SERVER link remote: 74.82.47.2:39528
Wed Mar 18 06:19:06 2015 74.82.47.2:39528 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Wed Mar 18 06:19:06 2015 74.82.47.2:39528 Connection reset, restarting [0]
Wed Mar 18 06:19:06 2015 74.82.47.2:39528 SIGUSR1[soft,connection-reset] received, client-instance restarting
Wed Mar 18 06:19:06 2015 TCP/UDP: Closing socket
Wed Mar 18 11:45:09 2015 MULTI: multi_create_instance called
Wed Mar 18 11:45:09 2015 Re-using SSL/TLS context
Wed Mar 18 11:45:09 2015 LZO compression initialized
Wed Mar 18 11:45:09 2015 Control Channel MTU parms [ L:1544 D:140 EF:40 EB:0 ET:0 EL:0 ]
Wed Mar 18 11:45:09 2015 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Wed Mar 18 11:45:09 2015 Local Options hash (VER=V4): 'c0103fa8'
Wed Mar 18 11:45:09 2015 Expected Remote Options hash (VER=V4): '69109d17'
Wed Mar 18 11:45:09 2015 TCP connection established with 91.123.201.238:60000
Wed Mar 18 11:45:09 2015 Socket flags: TCP_NODELAY=1 succeeded
Wed Mar 18 11:45:09 2015 TCPv4_SERVER link local: [undef]
Wed Mar 18 11:45:09 2015 TCPv4_SERVER link remote: 91.123.201.238:60000
Wed Mar 18 11:45:11 2015 91.123.201.238:60000 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1544 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attemping restart...]
Wed Mar 18 11:45:11 2015 91.123.201.238:60000 Connection reset, restarting [0]
Wed Mar 18 11:45:11 2015 91.123.201.238:60000 SIGUSR1[soft,connection-reset] received, client-instance restarting
Wed Mar 18 11:45:11 2015 TCP/UDP: Closing socket