15:17:43.576 -- ----- OpenVPN Start ----- 15:17:43.614 -- EVENT: CORE_THREAD_ACTIVE 15:17:43.629 -- OpenVPN core 3.git::728733ae:Release android i386 32-bit PT_PROXY built on Aug 14 2019 14:12:51 15:17:43.634 -- Frame=512/2048/512 mssfix-ctrl=1250 15:17:43.653 -- UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 14 [route-delay] [4] 15 [verb] [3] 15:17:43.658 -- EVENT: RESOLVE 15:17:43.719 -- Contacting 94.175.241.190:8443 via TCPv4 15:17:43.720 -- EVENT: WAIT 15:17:43.753 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4 15:17:43.771 -- EVENT: CONNECTING 15:17:43.788 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client 15:17:43.799 -- Creds: Username/Password 15:17:43.800 -- Peer Info: IV_GUI_VER=OC30Android IV_VER=3.git::728733ae:Release IV_PLAT=android IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 15:17:44.126 -- VERIFY OK : depth=1 cert. version : 3 serial number : 94:2C:96:F9:40:D8:6B:BC issuer name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com subject name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com issued on : 2019-05-13 17:32:43 expires on : 2036-12-31 17:32:43 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true 15:17:44.126 -- VERIFY OK : depth=0 cert. version : 3 serial number : 15:57:76:87:62 issuer name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com subject name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=SophosApplianceCertificate_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com issued on : 2015-08-01 00:00:00 expires on : 2036-12-31 23:59:59 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=false 15:17:45.335 -- SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA 15:17:45.336 -- Session is ACTIVE 15:17:45.336 -- EVENT: GET_CONFIG 15:17:45.343 -- Sending PUSH_REQUEST to server... 15:17:46.244 -- OPTIONS: 0 [route-gateway] [192.168.10.1] 1 [ping] [45] 2 [ping-restart] [180] 3 [route] [91.220.234.128] [255.255.255.128] 4 [route] [172.16.0.0] [255.255.0.0] 5 [route] [192.168.42.0] [255.255.255.0] 6 [topology] [subnet] 7 [route] [remote_host] [255.255.255.255] [net_gateway] 8 [inactive] [900] [7680] 9 [ifconfig] [192.168.10.16] [255.255.255.0] 15:17:46.244 -- PROTOCOL OPTIONS: cipher: AES-128-CBC digest: SHA256 compress: LZO_STUB peer ID: -1 15:17:46.245 -- EVENT: ASSIGN_IP 15:17:46.260 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway] : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument 15:17:46.378 -- Connected via tun 15:17:46.378 -- LZO-ASYM init swap=0 asym=1 15:17:46.378 -- Comp-stub init swap=0 15:17:46.394 -- EVENT: CONNECTED info='guy.dawson@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.16/ gw=[192.168.10.1/]' trans=TO_CONNECTED 15:21:57.126 -- ----- OpenVPN Start ----- 15:21:57.135 -- EVENT: CORE_THREAD_ACTIVE 15:21:57.165 -- OpenVPN core 3.git::728733ae:Release android i386 32-bit PT_PROXY built on Aug 14 2019 14:12:51 15:21:57.210 -- Frame=512/2048/512 mssfix-ctrl=1250 15:21:57.247 -- UNUSED OPTIONS 3 [resolv-retry] [infinite] 4 [nobind] 5 [persist-key] 6 [persist-tun] 14 [route-delay] [4] 15 [verb] [3] 15:21:57.262 -- EVENT: RESOLVE 15:21:57.299 -- Contacting 94.175.241.190:8443 via TCPv4 15:21:57.300 -- EVENT: WAIT 15:21:57.482 -- Connecting to [94.175.241.190]:8443 (94.175.241.190) via TCPv4 15:21:57.495 -- EVENT: CONNECTING 15:21:57.510 -- Tunnel Options:V4,dev-type tun,link-mtu 1572,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-128-CBC,auth SHA256,keysize 128,key-method 2,tls-client 15:21:57.510 -- Creds: Username/Password 15:21:57.510 -- Peer Info: IV_GUI_VER=OC30Android IV_VER=3.git::728733ae:Release IV_PLAT=android IV_NCP=2 IV_TCPNL=1 IV_PROTO=2 IV_LZO_STUB=1 IV_COMP_STUB=1 IV_COMP_STUBv2=1 15:21:58.331 -- VERIFY OK : depth=1 cert. version : 3 serial number : 94:2C:96:F9:40:D8:6B:BC issuer name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com subject name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com issued on : 2019-05-13 17:32:43 expires on : 2036-12-31 17:32:43 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=true 15:21:58.332 -- VERIFY OK : depth=0 cert. version : 3 serial number : 15:57:76:87:62 issuer name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=Sophos_CA_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com subject name : C=GB, ST=Berkshire, L=Slough, O=Crossflight Limited, OU=OU, CN=SophosApplianceCertificate_C330AC73MVJ2YF5, emailAddress=it.operations@crossflight.com issued on : 2015-08-01 00:00:00 expires on : 2036-12-31 23:59:59 signed using : RSA with SHA-256 RSA key size : 2048 bits basic constraints : CA=false 15:22:00.474 -- SSL Handshake: TLSv1.0/TLS-DHE-RSA-WITH-3DES-EDE-CBC-SHA 15:22:00.475 -- Session is ACTIVE 15:22:00.475 -- EVENT: GET_CONFIG 15:22:00.493 -- Sending PUSH_REQUEST to server... 15:22:01.223 -- OPTIONS: 0 [route-gateway] [192.168.10.1] 1 [ping] [45] 2 [ping-restart] [180] 3 [route] [91.220.234.128] [255.255.255.128] 4 [route] [172.16.0.0] [255.255.0.0] 5 [route] [192.168.42.0] [255.255.255.0] 6 [topology] [subnet] 7 [route] [remote_host] [255.255.255.255] [net_gateway] 8 [inactive] [900] [7680] 9 [ifconfig] [192.168.10.16] [255.255.255.0] 15:22:01.224 -- PROTOCOL OPTIONS: cipher: AES-128-CBC digest: SHA256 compress: LZO_STUB peer ID: -1 15:22:01.232 -- EVENT: ASSIGN_IP 15:22:01.268 -- exception parsing IPv4 route: [route] [remote_host] [255.255.255.255] [net_gateway] : addr_pair_mask_parse_error: AddrMaskPair parse error 'route': remote_host/255.255.255.255 : ip_exception: error parsing route IP address 'remote_host' : Invalid argument 15:22:01.388 -- Connected via tun 15:22:01.390 -- LZO-ASYM init swap=0 asym=1 15:22:01.390 -- Comp-stub init swap=0 15:22:01.395 -- EVENT: CONNECTED info='guy.dawson@94.175.241.190:8443 (94.175.241.190) via /TCPv4 on tun/192.168.10.16/ gw=[192.168.10.1/]'