ECHT KLASSE
Das hat ja lange gehalten! Am 12. September hieß es, OpenVPN sei „gefixt“. Genau eine Woche lief’s – und seit eben geht wieder nix. Keine Verbindung über OpenVPN möglich, bei allen Servern das gleiche Problem. Hat jemand das auch oder kriegt ihr’s irgendwie hin?
Fri Sep 19 13:52:05 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:05 2025 MANAGEMENT: >STATE:1758282725,WAIT,,,,,,
Fri Sep 19 13:52:05 2025 MANAGEMENT: >STATE:1758282725,AUTH,,,,,,
Fri Sep 19 13:52:05 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=af18c4ae 8d386888
Fri Sep 19 13:52:05 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:05 2025 VERIFY KU OK
Fri Sep 19 13:52:05 2025 Validating certificate extended key usage
Fri Sep 19 13:52:05 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:05 2025 VERIFY EKU OK
Fri Sep 19 13:52:05 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:05 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:05 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:05 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:05 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:06 2025 MANAGEMENT: >STATE:1758282726,GET_CONFIG,,,,,,
Fri Sep 19 13:52:06 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:06 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:06 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:06 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:06 2025 MANAGEMENT: >STATE:1758282726,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:06 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:07 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:07 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:07 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:07 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:07 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:07 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:07 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:07 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:07 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:07 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:07 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:07 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:07 2025 MANAGEMENT: >STATE:1758282727,WAIT,,,,,,
Fri Sep 19 13:52:07 2025 MANAGEMENT: >STATE:1758282727,AUTH,,,,,,
Fri Sep 19 13:52:07 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=7d255c0f 07574f96
Fri Sep 19 13:52:07 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:07 2025 VERIFY KU OK
Fri Sep 19 13:52:07 2025 Validating certificate extended key usage
Fri Sep 19 13:52:07 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:07 2025 VERIFY EKU OK
Fri Sep 19 13:52:07 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:07 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:07 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:07 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:07 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:09 2025 MANAGEMENT: >STATE:1758282729,GET_CONFIG,,,,,,
Fri Sep 19 13:52:09 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:09 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:09 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:09 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:09 2025 MANAGEMENT: >STATE:1758282729,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:09 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:10 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:10 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:10 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:10 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:10 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:10 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:10 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:10 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:10 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:10 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:10 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:10 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:10 2025 MANAGEMENT: >STATE:1758282730,WAIT,,,,,,
Fri Sep 19 13:52:10 2025 MANAGEMENT: >STATE:1758282730,AUTH,,,,,,
Fri Sep 19 13:52:10 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=ee6e65b7 68d32266
Fri Sep 19 13:52:10 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:10 2025 VERIFY KU OK
Fri Sep 19 13:52:10 2025 Validating certificate extended key usage
Fri Sep 19 13:52:10 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:10 2025 VERIFY EKU OK
Fri Sep 19 13:52:10 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:10 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:10 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:10 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:10 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:11 2025 MANAGEMENT: >STATE:1758282731,GET_CONFIG,,,,,,
Fri Sep 19 13:52:11 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:11 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:11 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:11 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:11 2025 MANAGEMENT: >STATE:1758282731,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:11 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:12 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:12 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:12 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:12 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:12 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:12 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:12 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:12 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:12 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:12 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:12 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:12 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:12 2025 MANAGEMENT: >STATE:1758282732,WAIT,,,,,,
Fri Sep 19 13:52:12 2025 MANAGEMENT: >STATE:1758282732,AUTH,,,,,,
Fri Sep 19 13:52:12 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=65611dc3 03430022
Fri Sep 19 13:52:12 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:12 2025 VERIFY KU OK
Fri Sep 19 13:52:12 2025 Validating certificate extended key usage
Fri Sep 19 13:52:12 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:12 2025 VERIFY EKU OK
Fri Sep 19 13:52:12 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:12 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:12 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:12 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:12 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:13 2025 MANAGEMENT: >STATE:1758282733,GET_CONFIG,,,,,,
Fri Sep 19 13:52:13 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:13 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:13 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:13 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:13 2025 MANAGEMENT: >STATE:1758282733,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:13 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:14 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:14 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:14 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:14 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:14 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:14 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:14 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:14 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:14 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:14 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:14 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:14 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:14 2025 MANAGEMENT: >STATE:1758282734,WAIT,,,,,,
Fri Sep 19 13:52:14 2025 MANAGEMENT: >STATE:1758282734,AUTH,,,,,,
Fri Sep 19 13:52:14 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=296fe8b3 bee9f7b3
Fri Sep 19 13:52:14 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:14 2025 VERIFY KU OK
Fri Sep 19 13:52:14 2025 Validating certificate extended key usage
Fri Sep 19 13:52:14 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:14 2025 VERIFY EKU OK
Fri Sep 19 13:52:14 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:14 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:14 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:14 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:14 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:15 2025 MANAGEMENT: >STATE:1758282735,GET_CONFIG,,,,,,
Fri Sep 19 13:52:15 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:15 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:15 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:15 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:15 2025 MANAGEMENT: >STATE:1758282735,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:15 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:16 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:16 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:16 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:16 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:16 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:16 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:16 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:16 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:16 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:16 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:16 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:16 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:16 2025 MANAGEMENT: >STATE:1758282736,WAIT,,,,,,
Fri Sep 19 13:52:16 2025 MANAGEMENT: >STATE:1758282736,AUTH,,,,,,
Fri Sep 19 13:52:16 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=e34cd6dd 9c7c0257
Fri Sep 19 13:52:16 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:16 2025 VERIFY KU OK
Fri Sep 19 13:52:16 2025 Validating certificate extended key usage
Fri Sep 19 13:52:16 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:16 2025 VERIFY EKU OK
Fri Sep 19 13:52:16 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:17 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:17 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:17 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:17 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:18 2025 MANAGEMENT: >STATE:1758282738,GET_CONFIG,,,,,,
Fri Sep 19 13:52:18 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:18 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:18 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:18 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:18 2025 MANAGEMENT: >STATE:1758282738,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:18 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:19 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:19 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:19 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:19 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:19 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:19 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:19 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:19 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:19 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:19 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:19 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:19 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:19 2025 MANAGEMENT: >STATE:1758282739,WAIT,,,,,,
Fri Sep 19 13:52:19 2025 MANAGEMENT: >STATE:1758282739,AUTH,,,,,,
Fri Sep 19 13:52:19 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=f7e10353 36064e80
Fri Sep 19 13:52:19 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:19 2025 VERIFY KU OK
Fri Sep 19 13:52:19 2025 Validating certificate extended key usage
Fri Sep 19 13:52:19 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:19 2025 VERIFY EKU OK
Fri Sep 19 13:52:19 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:19 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:19 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:19 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:19 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:20 2025 MANAGEMENT: >STATE:1758282740,GET_CONFIG,,,,,,
Fri Sep 19 13:52:20 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:20 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:20 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:20 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:20 2025 MANAGEMENT: >STATE:1758282740,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:20 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:21 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:21 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:21 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:21 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:21 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:21 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:21 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:21 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:21 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:21 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:21 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:21 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:21 2025 MANAGEMENT: >STATE:1758282741,WAIT,,,,,,
Fri Sep 19 13:52:21 2025 MANAGEMENT: >STATE:1758282741,AUTH,,,,,,
Fri Sep 19 13:52:21 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=bcca23ae c7931289
Fri Sep 19 13:52:21 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:21 2025 VERIFY KU OK
Fri Sep 19 13:52:21 2025 Validating certificate extended key usage
Fri Sep 19 13:52:21 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:21 2025 VERIFY EKU OK
Fri Sep 19 13:52:21 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:21 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:21 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:21 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:21 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:22 2025 MANAGEMENT: >STATE:1758282742,GET_CONFIG,,,,,,
Fri Sep 19 13:52:22 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:22 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:22 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:22 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:22 2025 MANAGEMENT: >STATE:1758282742,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:22 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:23 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:23 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:23 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:23 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:23 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:23 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:23 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:23 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:23 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:23 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:23 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:23 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:23 2025 MANAGEMENT: >STATE:1758282743,WAIT,,,,,,
Fri Sep 19 13:52:23 2025 MANAGEMENT: >STATE:1758282743,AUTH,,,,,,
Fri Sep 19 13:52:23 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=03b2e42f 8bd933ec
Fri Sep 19 13:52:23 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:23 2025 VERIFY KU OK
Fri Sep 19 13:52:23 2025 Validating certificate extended key usage
Fri Sep 19 13:52:23 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:23 2025 VERIFY EKU OK
Fri Sep 19 13:52:23 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:23 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:23 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:23 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:23 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:24 2025 MANAGEMENT: >STATE:1758282744,GET_CONFIG,,,,,,
Fri Sep 19 13:52:24 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:24 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:24 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:24 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:24 2025 MANAGEMENT: >STATE:1758282744,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:24 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:25 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:25 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:25 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:25 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:25 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:25 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:25 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:25 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:25 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:25 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:25 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:25 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:25 2025 MANAGEMENT: >STATE:1758282745,WAIT,,,,,,
Fri Sep 19 13:52:25 2025 MANAGEMENT: >STATE:1758282745,AUTH,,,,,,
Fri Sep 19 13:52:25 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=626a9a98 ebc84f63
Fri Sep 19 13:52:25 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:25 2025 VERIFY KU OK
Fri Sep 19 13:52:25 2025 Validating certificate extended key usage
Fri Sep 19 13:52:25 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:25 2025 VERIFY EKU OK
Fri Sep 19 13:52:25 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:26 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:26 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:26 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:26 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:27 2025 MANAGEMENT: >STATE:1758282747,GET_CONFIG,,,,,,
Fri Sep 19 13:52:27 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:27 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:27 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:27 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:27 2025 MANAGEMENT: >STATE:1758282747,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:27 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:28 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:28 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:28 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:28 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:28 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:28 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:28 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:28 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:28 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:28 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:28 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:28 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:28 2025 MANAGEMENT: >STATE:1758282748,WAIT,,,,,,
Fri Sep 19 13:52:28 2025 MANAGEMENT: >STATE:1758282748,AUTH,,,,,,
Fri Sep 19 13:52:28 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=c68a448a 50f64385
Fri Sep 19 13:52:28 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:28 2025 VERIFY KU OK
Fri Sep 19 13:52:28 2025 Validating certificate extended key usage
Fri Sep 19 13:52:28 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:28 2025 VERIFY EKU OK
Fri Sep 19 13:52:28 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:28 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:28 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:28 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:28 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:29 2025 MANAGEMENT: >STATE:1758282749,GET_CONFIG,,,,,,
Fri Sep 19 13:52:29 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:29 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:29 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:29 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:29 2025 MANAGEMENT: >STATE:1758282749,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:29 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:30 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:30 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:30 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:30 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:30 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:30 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:30 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:30 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:30 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:30 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:30 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:30 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:30 2025 MANAGEMENT: >STATE:1758282750,WAIT,,,,,,
Fri Sep 19 13:52:30 2025 MANAGEMENT: >STATE:1758282750,AUTH,,,,,,
Fri Sep 19 13:52:30 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=314f34d0 0ce8f53e
Fri Sep 19 13:52:30 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:30 2025 VERIFY KU OK
Fri Sep 19 13:52:30 2025 Validating certificate extended key usage
Fri Sep 19 13:52:30 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:30 2025 VERIFY EKU OK
Fri Sep 19 13:52:30 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:30 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:30 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:30 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:30 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:32 2025 MANAGEMENT: >STATE:1758282752,GET_CONFIG,,,,,,
Fri Sep 19 13:52:32 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:32 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:32 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:32 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:32 2025 MANAGEMENT: >STATE:1758282752,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:32 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:33 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:33 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:33 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:33 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:33 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:33 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:33 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:33 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:33 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:33 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:33 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:33 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:33 2025 MANAGEMENT: >STATE:1758282753,WAIT,,,,,,
Fri Sep 19 13:52:33 2025 MANAGEMENT: >STATE:1758282753,AUTH,,,,,,
Fri Sep 19 13:52:33 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=1c5bdae7 4f4bc0de
Fri Sep 19 13:52:33 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:33 2025 VERIFY KU OK
Fri Sep 19 13:52:33 2025 Validating certificate extended key usage
Fri Sep 19 13:52:33 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:33 2025 VERIFY EKU OK
Fri Sep 19 13:52:33 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:33 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:33 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:33 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:33 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:34 2025 MANAGEMENT: >STATE:1758282754,GET_CONFIG,,,,,,
Fri Sep 19 13:52:34 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:34 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:34 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:34 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:34 2025 MANAGEMENT: >STATE:1758282754,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:34 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:35 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:35 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:35 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:35 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:35 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:35 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:35 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:35 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:35 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:35 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:35 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:35 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:35 2025 MANAGEMENT: >STATE:1758282755,WAIT,,,,,,
Fri Sep 19 13:52:35 2025 MANAGEMENT: >STATE:1758282755,AUTH,,,,,,
Fri Sep 19 13:52:35 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=c2df7638 493ca456
Fri Sep 19 13:52:35 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:35 2025 VERIFY KU OK
Fri Sep 19 13:52:35 2025 Validating certificate extended key usage
Fri Sep 19 13:52:35 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:35 2025 VERIFY EKU OK
Fri Sep 19 13:52:35 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:35 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:35 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:35 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:35 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:36 2025 MANAGEMENT: >STATE:1758282756,GET_CONFIG,,,,,,
Fri Sep 19 13:52:36 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:36 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:36 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:36 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:36 2025 MANAGEMENT: >STATE:1758282756,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:36 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:37 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:37 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:37 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:37 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:37 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:37 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:37 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:37 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:37 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:37 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:37 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:37 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:37 2025 MANAGEMENT: >STATE:1758282757,WAIT,,,,,,
Fri Sep 19 13:52:37 2025 MANAGEMENT: >STATE:1758282757,AUTH,,,,,,
Fri Sep 19 13:52:37 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=bea08be1 14de71a6
Fri Sep 19 13:52:37 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:37 2025 VERIFY KU OK
Fri Sep 19 13:52:37 2025 Validating certificate extended key usage
Fri Sep 19 13:52:37 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:37 2025 VERIFY EKU OK
Fri Sep 19 13:52:37 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:37 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:37 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:37 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:37 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted
Fri Sep 19 13:52:38 2025 MANAGEMENT: >STATE:1758282758,GET_CONFIG,,,,,,
Fri Sep 19 13:52:38 2025 SENT CONTROL [Server_duesseldorf.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
Fri Sep 19 13:52:38 2025 AUTH: Received control message: AUTH_FAILED
Fri Sep 19 13:52:38 2025 TCP/UDP: Closing socket
Fri Sep 19 13:52:38 2025 SIGUSR1[soft,auth-failure] received, process restarting
Fri Sep 19 13:52:38 2025 MANAGEMENT: >STATE:1758282758,RECONNECTING,auth-failure,,,,,
Fri Sep 19 13:52:38 2025 Restart pause, 1 second(s)
Fri Sep 19 13:52:39 2025 Re-using SSL/TLS context
Fri Sep 19 13:52:39 2025 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:39 2025 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:39 2025 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
Fri Sep 19 13:52:39 2025 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
Fri Sep 19 13:52:39 2025 Control Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1250 tun_max_mtu:0 headroom:126 payload:1600 tailroom:126 ET:0 ]
Fri Sep 19 13:52:39 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:39 2025 Data Channel MTU parms [ mss_fix:0 max_frag:0 tun_mtu:1500 tun_max_mtu:1600 headroom:136 payload:1800 tailroom:568 ET:32 ]
Fri Sep 19 13:52:39 2025 TCP/UDP: Preserving recently used remote address: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:39 2025 Socket Buffers: R=[8192->8192] S=[8192->8192]
Fri Sep 19 13:52:39 2025 UDPv4 link local: (not bound)
Fri Sep 19 13:52:39 2025 UDPv4 link remote: [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:39 2025 MANAGEMENT: >STATE:1758282759,WAIT,,,,,,
Fri Sep 19 13:52:39 2025 MANAGEMENT: >STATE:1758282759,AUTH,,,,,,
Fri Sep 19 13:52:39 2025 TLS: Initial packet from [AF_INET]89.163.146.159:44, sid=dde4ad06 bbd813cb
Fri Sep 19 13:52:39 2025 VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:39 2025 VERIFY KU OK
Fri Sep 19 13:52:39 2025 Validating certificate extended key usage
Fri Sep 19 13:52:39 2025 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Sep 19 13:52:39 2025 VERIFY EKU OK
Fri Sep 19 13:52:39 2025 VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_duesseldorf.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
Fri Sep 19 13:52:39 2025 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
Fri Sep 19 13:52:39 2025 [Server_duesseldorf.perfect-privacy.com] Peer Connection Initiated with [AF_INET]89.163.146.159:44
Fri Sep 19 13:52:39 2025 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
Fri Sep 19 13:52:39 2025 TLS: tls_multi_process: initial untrusted session promoted to trusted