Sat Jun 16 14:42:38 2018 us=279297 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat Jun 16 14:42:38 2018 us=279297 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
Sat Jun 16 14:42:38 2018 us=279297 Control Channel MTU parms [ L:1621 D:1172 EF:78 EB:0 ET:0 EL:3 ]
Sat Jun 16 14:42:38 2018 us=279297 MANAGEMENT: >STATE:1529145758,RESOLVE,,,,,,
Sat Jun 16 14:42:38 2018 us=508785 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
Sat Jun 16 14:42:38 2018 us=508785 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,keydir 1,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-client'
Sat Jun 16 14:42:38 2018 us=508785 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,keydir 0,cipher AES-256-CBC,auth SHA256,keysize 256,tls-auth,key-method 2,tls-server'
Sat Jun 16 14:42:38 2018 us=508785 TCP/UDP: Preserving recently used remote address: [AF_INET]83.110.65.114:56500
Sat Jun 16 14:42:38 2018 us=508785 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Jun 16 14:42:38 2018 us=508785 UDP link local: (not bound)
Sat Jun 16 14:42:38 2018 us=508785 UDP link remote: [AF_INET]83.110.65.114:56500
Sat Jun 16 14:42:38 2018 us=508785 MANAGEMENT: >STATE:1529145758,WAIT,,,,,,
Sat Jun 16 14:42:38 2018 us=509282 UDP WRITE [54] to [AF_INET]83.110.65.114:56500: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 pid=[ #1 ] [ ] pid=0 DATA len=0
Sat Jun 16 14:42:38 2018 us=509746 UDP READ [0] from [AF_UNSPEC]: DATA UNDEF len=-1
Sat Jun 16 14:42:38 2018 us=598612 UDP READ [66] from [AF_INET]83.110.65.114:56500: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #1 ] [ 0 ] pid=0 DATA len=0
Sat Jun 16 14:42:38 2018 us=599105 MANAGEMENT: >STATE:1529145758,AUTH,,,,,,
Sat Jun 16 14:42:38 2018 us=599105 TLS: Initial packet from [AF_INET]83.110.65.114:56500, sid=2ff359db d89876e5
Sat Jun 16 14:42:38 2018 us=599105 UDP WRITE [62] to [AF_INET]83.110.65.114:56500: P_ACK_V1 kid=0 pid=[ #2 ] [ 0 ]
Sat Jun 16 14:42:38 2018 us=599105 UDP WRITE [227] to [AF_INET]83.110.65.114:56500: P_CONTROL_V1 kid=0 pid=[ #3 ] [ ] pid=1 DATA len=173
Sat Jun 16 14:42:39 2018 us=839444 UDP READ [54] from [AF_INET]83.110.65.114:56500: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #2 ] [ ] pid=0 DATA len=0
Sat Jun 16 14:42:39 2018 us=839779 UDP WRITE [62] to [AF_INET]83.110.65.114:56500: P_ACK_V1 kid=0 pid=[ #4 ] [ 0 ]
Sat Jun 16 14:42:41 2018 us=78944 UDP WRITE [227] to [AF_INET]83.110.65.114:56500: P_CONTROL_V1 kid=0 pid=[ #5 ] [ ] pid=1 DATA len=173
Sat Jun 16 14:42:44 2018 us=680367 UDP READ [54] from [AF_INET]83.110.65.114:56500: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #3 ] [ ] pid=0 DATA len=0
Sat Jun 16 14:42:44 2018 us=680367 UDP WRITE [62] to [AF_INET]83.110.65.114:56500: P_ACK_V1 kid=0 pid=[ #6 ] [ 0 ]
Sat Jun 16 14:42:45 2018 us=910916 UDP WRITE [227] to [AF_INET]83.110.65.114:56500: P_CONTROL_V1 kid=0 pid=[ #7 ] [ ] pid=1 DATA len=173
Sat Jun 16 14:42:52 2018 us=526406 UDP READ [54] from [AF_INET]83.110.65.114:56500: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #4 ] [ ] pid=0 DATA len=0
Sat Jun 16 14:42:52 2018 us=526406 UDP WRITE [62] to [AF_INET]83.110.65.114:56500: P_ACK_V1 kid=0 pid=[ #8 ] [ 0 ]
Sat Jun 16 14:42:53 2018 us=682404 UDP WRITE [227] to [AF_INET]83.110.65.114:56500: P_CONTROL_V1 kid=0 pid=[ #9 ] [ ] pid=1 DATA len=173
Sat Jun 16 14:43:08 2018 us=79082 UDP READ [54] from [AF_INET]83.110.65.114:56500: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 pid=[ #5 ] [ ] pid=0 DATA len=0
Sat Jun 16 14:43:08 2018 us=79082 UDP WRITE [62] to [AF_INET]83.110.65.114:56500: P_ACK_V1 kid=0 pid=[ #10 ] [ 0 ]
Sat Jun 16 14:43:09 2018 us=267996 UDP WRITE [227] to [AF_INET]83.110.65.114:56500: P_CONTROL_V1 kid=0 pid=[ #11 ] [ ] pid=1 DATA len=173
Sat Jun 16 14:43:17 2018 us=190831 TCP/UDP: Closing socket
Sat Jun 16 14:43:17 2018 us=190831 SIGTERM[hard,] received, process exiting
Sat Jun 16 14:43:17 2018 us=190831 MANAGEMENT: >STATE:1529145797,EXITING,SIGTERM,,,,,