2020-10-12 19:46:15 F-Droid built and signed version 0.7.21 running on ZTE ZTE A2017G (ailsa_ii), Android 8.1.0 (OPM7.181205.001) API 27, ABI arm64-v8a, (ZTE/P996A01_O/ailsa_ii:8.0.0/OPR1.170623.032/20180718.100630:user/release-keys)
[...] (edited because post exceeds 10000 character)
2020-10-12 19:46:52 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2020-10-12 19:46:52 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2020-10-12 19:46:52 LZO compression initializing
2020-10-12 19:46:52 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2020-10-12 19:46:52 MANAGEMENT: >STATE:1602524812,RESOLVE,,,,,,
2020-10-12 19:46:53 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
2020-10-12 19:46:53 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-client'
2020-10-12 19:46:53 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,tls-auth,key-method 2,tls-server'
2020-10-12 19:46:53 TCP/UDP: Preserving recently used remote address: [AF_INET]xx.xx.xx.xx:1194
2020-10-12 19:46:53 Socket Buffers: R=[212992->212992] S=[212992->212992]
2020-10-12 19:46:53 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
2020-10-12 19:46:53 UDP link local: (not bound)
2020-10-12 19:46:53 UDP link remote: [AF_INET]xx.xx.xx.xx:1194
2020-10-12 19:46:53 MANAGEMENT: >STATE:1602524813,WAIT,,,,,,
2020-10-12 19:46:53 MANAGEMENT: >STATE:1602524813,AUTH,,,,,,
2020-10-12 19:46:53 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:1194, sid=e5ffad75 20efc2e9
2020-10-12 19:46:53 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-10-12 19:46:53 VERIFY KU OK
2020-10-12 19:46:53 Validating certificate extended key usage
2020-10-12 19:46:53 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2020-10-12 19:46:53 VERIFY EKU OK
2020-10-12 19:46:53 VERIFY OK: depth=0, C=TW, ST=TW, L=Taipei, O=ASUS, CN=RT-N66U, emailAddress=me@myhost.mydomain
2020-10-12 19:46:53 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 1024 bit RSA, signature: RSA-SHA256
2020-10-12 19:46:53 [RT-N66U] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:1194
2020-10-12 19:46:54 MANAGEMENT: >STATE:1602524814,GET_CONFIG,,,,,,
2020-10-12 19:46:54 SENT CONTROL [RT-N66U]: 'PUSH_REQUEST' (status=1)
2020-10-12 19:46:54 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DOMAIN orion,dhcp-option DNS 192.168.1.1,route 192.168.1.0 255.255.255.0,route-gateway 10.8.0.1,topology subnet,ping 15,ping-restart 60,ifconfig 10.8.0.3 255.255.255.0,peer-id 1,cipher AES-128-GCM'
2020-10-12 19:46:54 OPTIONS IMPORT: timers and/or timeouts modified
2020-10-12 19:46:54 OPTIONS IMPORT: --ifconfig/up options modified
2020-10-12 19:46:54 OPTIONS IMPORT: route options modified
2020-10-12 19:46:54 OPTIONS IMPORT: route-related options modified
2020-10-12 19:46:54 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2020-10-12 19:46:54 OPTIONS IMPORT: peer-id set
2020-10-12 19:46:54 OPTIONS IMPORT: adjusting link_mtu to 1625
2020-10-12 19:46:54 OPTIONS IMPORT: data channel crypto options modified
2020-10-12 19:46:54 Data Channel: using negotiated cipher 'AES-128-GCM'
2020-10-12 19:46:54 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
2020-10-12 19:46:54 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2020-10-12 19:46:54 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
2020-10-12 19:46:54 ROUTE_GATEWAY 127.100.103.119 IFACE=android-gw
2020-10-12 19:46:54 do_ifconfig, ipv4=1, ipv6=0
2020-10-12 19:46:54 MANAGEMENT: >STATE:1602524814,ASSIGN_IP,,10.8.0.3,,,,
2020-10-12 19:46:54 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
2020-10-12 19:46:54 MANAGEMENT: >STATE:1602524814,ADD_ROUTES,,,,,,
2020-10-12 19:46:54 MANAGEMENT: CMD 'needok 'ROUTE' ok'
2020-10-12 19:46:54 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
2020-10-12 19:46:54 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
2020-10-12 19:46:54 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
2020-10-12 19:46:54 Opening tun interface:
2020-10-12 19:46:54 Local IPv4: 10.8.0.3/24 IPv6: (not set) MTU: 1500
2020-10-12 19:46:54 DNS Server: 192.168.1.1, Domain: orion
2020-10-12 19:46:54 Routes: 10.8.0.0/24, 192.168.1.0/24
2020-10-12 19:46:54 Routes excluded:
2020-10-12 19:46:54 VpnService routes installed: 10.8.0.0/24, 192.168.1.0/24
2020-10-12 19:46:54 Disallowed VPN apps:
2020-10-12 19:46:54 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
2020-10-12 19:46:54 Initialization Sequence Completed
2020-10-12 19:46:54 MANAGEMENT: >STATE:1602524814,CONNECTED,SUCCESS,10.8.0.3,xx.xx.xx.xx,1194,,
2020-10-12 19:46:55 Debug state info: CONNECTED LTE to MOBILE internet, pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED