ccd folder location:
[root@webadm1 ccd]# pwd
/opt/mfavpn/ccd
Permissions of ccd folder :
drwxrwx---. 2 root mfavpn 40 Jan 31 14:33 ccd
Content of ccd folder and permissions:
[root@webadm1 ccd]# ll
-rw-r-----. 1 root mfavpn 39 Jan 31 14:33 administrator
-rw-r-----. 1 root mfavpn 39 Jan 31 14:08 yoann
Content of files:
[root@webadm1 ccd]# cat administrator
ifconfig-push 10.8.0.115 255.255.255.0
[root@webadm1 ccd]# cat yoann
ifconfig-push 10.8.0.114 255.255.255.0
Declaration of ccd configuration in /opt/mfavpn/conf/openvpn.conf :
ccd-exclusive
client-config-dir /opt/mfavpn/ccd
(I putted here the ccd-exclusive directive in order to enforce it for my logins and to be required for all authentications. If not found for a specific user, then the authentication fail.)
Below the whole openvpn.conf file (for reference):
openssl x509 -in administrator.crt -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
a0:5d:87:db:7d:89:25:6f:63:4c:d7:29:2b:27:48:fc
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=RCDevs Support CA, OU=IT, O=RCDevs Support SA, C=LU
Validity
Not Before: Jan 31 13:43:07 2024 GMT
Not After : Jan 30 13:43:07 2027 GMT
Subject: CN=administrator, description=CLIENT, O=RCDevs Support, organizationIdentifier=VATLU-00000000
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:f3:4f:c6:a0:6d:e6:14:db:0f:98:33:c2:5e:80:
9c:fb:80:0a:c5:f6:64:fd:8d:0c:82:8c:8d:de:db:
24:a3:56:d1:01:d2:27:88:6e:a1:29:23:09:8a:6b:
4b:b6:b7:8f:61:40:22:51:ac:af:fc:37:c9:b4:71:
93:b8:f2:77:7a:36:02:fb:a2:af:8d:04:f3:d8:a8:
a5:67:fa:80:45:23:ac:33:e6:94:9b:0c:ec:51:f7:
07:22:da:58:da:f5:07:70:b4:39:45:83:55:17:84:
c8:16:cd:0e:a7:26:bd:03:90:c5:33:48:a5:7a:36:
ed:69:7c:c3:41:c6:2a:0b:3b:fa:18:90:a9:19:c6:
93:71:43:3e:b2:ea:ed:ed:6e:fc:14:96:ea:3b:46:
7a:dc:9f:58:b6:71:75:c5:dc:97:f1:1a:8f:d9:bc:
2e:99:06:3d:b8:0b:b1:3d:af:96:b7:6b:6a:bb:be:
b3:8c:18:30:71:99:dd:f7:37:d7:30:32:85:f6:d4:
58:9a:60:97:af:ac:3c:a3:91:e2:be:b0:e3:e8:d7:
93:60:ab:64:5d:9f:d9:39:fa:de:69:30:e2:94:a1:
74:05:d3:bc:97:44:ee:ce:1f:ed:ea:81:a9:8e:55:
2d:4d:dd:cb:ce:a7:db:44:53:5b:a7:4f:0f:88:26:
fc:b5
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Key Usage:
Digital Signature, Non Repudiation, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Client Authentication
Authority Information Access:
OCSP - URI:http://waproxy.support.rcdevs.com/ocsp/
CA Issuers - URI:http://waproxy.support.rcdevs.com/cacert/?format=der
X509v3 CRL Distribution Points:
Full Name:
URI:http://waproxy.support.rcdevs.com/crl/
Signature Algorithm: sha256WithRSAEncryption
Signature Value:
6e:cb:8c:be:25:cd:bd:96:18:53:08:5b:45:9f:d9:c4:14:47:
38:cd:da:aa:fa:e7:d4:19:9b:d7:e9:aa:09:96:b9:c3:bd:83:
4b:13:f5:ad:15:b6:dd:fe:f2:f3:b7:19:c2:6a:67:6c:8d:c4:
92:31:03:ff:4d:ff:5a:9c:76:93:66:c4:7d:20:fb:15:c4:af:
bd:b9:db:bc:35:ad:6d:48:37:f7:49:65:8f:87:7e:b9:29:35:
37:cc:9e:d5:fe:ab:0b:1d:e4:3f:3e:2e:ca:cb:03:21:19:b9:
10:c8:c1:a4:e1:dd:5c:1e:7d:c1:99:46:45:b0:27:80:19:18:
f8:7a:be:e1:95:5e:fa:7a:33:ff:c7:3f:ee:3c:89:9f:73:86:
fe:17:1e:20:78:1a:ac:75:08:23:f7:b8:95:a1:e1:7d:cb:83:
ca:1a:ca:f1:e9:21:f6:80:35:81:dd:e5:3a:94:14:37:aa:c2:
ac:a7:ff:6d:7d:44:1c:a7:ba:99:72:ac:71:c9:47:97:48:05:
e1:3b:80:ef:0e:0f:65:56:4f:ed:dd:b7:f3:b3:29:0c:22:f5:
47:8d:e3:2a:56:66:a9:a2:c2:85:c3:f8:ef:2c:e6:14:37:9c:
ef:0e:e8:7c:1d:bf:66:2b:a2:aa:68:ce:b8:83:07:99:14:71:
d5:3e:cb:73:56:c8:18:b7:5f:ae:b0:00:ac:74:91:7d:94:35:
4e:ce:ec:62:25:c7:a3:1f:6b:c0:a2:dc:93:a5:16:6c:d5:cd:
59:55:33:60:cb:03:95:b0:b4:08:85:b2:02:cd:65:d0:04:98:
16:17:ad:be:db:58:d5:fb:ab:79:ee:a2:30:4b:da:1b:37:1b:
bf:6f:08:b3:8a:5c:3b:53:c7:98:c4:dc:59:0e:76:88:10:a6:
3c:f5:14:1a:f9:84:a7:f3:05:b3:79:03:fd:cf:8c:82:30:e1:
fc:7b:83:70:1a:ea:2e:03:d7:b6:f4:fe:c3:a8:7f:86:df:d3:
14:30:65:26:6e:0a:40:8c:ba:ed:89:53:a7:5e:c2:3c:c1:45:
a4:39:40:a9:8a:b3:e2:86:76:e8:03:57:2c:ea:b2:04:08:7b:
b8:eb:45:00:33:8e:93:4c:e7:8a:30:d3:3d:af:d5:14:91:0c:
25:c1:a2:24:27:e5:48:d1:a2:41:81:db:d1:c9:2a:06:06:00:
9f:17:c6:02:dd:e6:65:3b:8c:6e:da:21:88:8c:7f:ed:02:33:
17:bd:9d:4a:bb:38:ba:f7:c9:bb:59:64:64:cf:1d:b6:6e:d7:
1b:a3:5f:22:43:e8:4e:1f:b1:4d:8d:4a:5d:11:0f:19:57:54:
55:8e:95:a7:60:a0:6e:bb
==> /opt/mfavpn/logs/openvpn.log <==
2024-01-31 15:05:56 us=474232 MULTI: multi_create_instance called
2024-01-31 15:05:56 us=474513 192.168.3.205:53767 Re-using SSL/TLS context
2024-01-31 15:05:56 us=474674 192.168.3.205:53767 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2024-01-31 15:05:56 us=474742 192.168.3.205:53767 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2024-01-31 15:05:56 us=474958 192.168.3.205:53767 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2024-01-31 15:05:56 us=474991 192.168.3.205:53767 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2024-01-31 15:05:56 us=475045 192.168.3.205:53767 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
2024-01-31 15:05:56 us=475062 192.168.3.205:53767 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
2024-01-31 15:05:56 us=475189 192.168.3.205:53767 TLS: Initial packet from [AF_INET]192.168.3.205:53767, sid=ad733a7c dd03c3bf
2024-01-31 15:05:56 us=490966 192.168.3.205:53767 VERIFY OK: depth=1, CN=RCDevs Support CA, OU=IT, O=RCDevs Support SA, C=LU
2024-01-31 15:05:56 us=491507 192.168.3.205:53767 VERIFY OK: depth=0, CN=administrator, description=CLIENT, O=RCDevs Support, organizationIdentifier=VATLU-00000000
2024-01-31 15:05:56 us=491817 192.168.3.205:53767 peer info: IV_VER=3.8.2connect3
2024-01-31 15:05:56 us=491848 192.168.3.205:53767 peer info: IV_PLAT=mac
2024-01-31 15:05:56 us=491860 192.168.3.205:53767 peer info: IV_NCP=2
2024-01-31 15:05:56 us=491868 192.168.3.205:53767 peer info: IV_TCPNL=1
2024-01-31 15:05:56 us=491876 192.168.3.205:53767 peer info: IV_PROTO=990
2024-01-31 15:05:56 us=491884 192.168.3.205:53767 peer info: IV_MTU=1600
2024-01-31 15:05:56 us=491893 192.168.3.205:53767 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2024-01-31 15:05:56 us=491901 192.168.3.205:53767 peer info: IV_GUI_VER=OCmacOS_3.4.8-4792
2024-01-31 15:05:56 us=491909 192.168.3.205:53767 peer info: IV_SSO=webauth,crtext
2024-01-31 15:05:56 us=492000 192.168.3.205:53767 TLS: Username/Password authentication deferred for username 'administrator'
2024-01-31 15:05:56 us=493069 192.168.3.205:53767 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-01-31 15:05:56 us=493197 192.168.3.205:53767 [administrator] Peer Connection Initiated with [AF_INET]192.168.3.205:53767
2024-01-31 15:05:56 us=493256 192.168.3.205:53767 PUSH: Received control message: 'PUSH_REQUEST'
2024-01-31 15:05:56 us=903197 MANAGEMENT: CMD 'client-auth-nt 16 0'
R2024-01-31 15:05:57 us=493577 192.168.3.205:53767 PUSH: Received control message: 'PUSH_REQUEST'
2024-01-31 15:05:57 us=493775 administrator/192.168.3.205:53767 MULTI_sva: pool returned IPv4=10.8.0.4, IPv6=(Not enabled)
2024-01-31 15:05:57 us=493941 administrator/192.168.3.205:53767 OPTIONS IMPORT: reading client specific options from: /opt/mfavpn/ccd/administrator
2024-01-31 15:05:57 us=494109 administrator/192.168.3.205:53767 MULTI: Learn: 10.8.0.115 -> administrator/192.168.3.205:53767
2024-01-31 15:05:57 us=494142 administrator/192.168.3.205:53767 MULTI: primary virtual IP for administrator/192.168.3.205:53767: 10.8.0.115
2024-01-31 15:05:57 us=494235 administrator/192.168.3.205:53767 Data Channel: using negotiated cipher 'AES-256-GCM'
2024-01-31 15:05:57 us=494271 administrator/192.168.3.205:53767 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
2024-01-31 15:05:57 us=494423 administrator/192.168.3.205:53767 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-01-31 15:05:57 us=494453 administrator/192.168.3.205:53767 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-01-31 15:05:57 us=494552 administrator/192.168.3.205:53767 SENT CONTROL [administrator]: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.115 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
2024-01-31 15:07:57 us=435266 192.168.3.205:52537 Re-using SSL/TLS context
2024-01-31 15:07:57 us=435344 192.168.3.205:52537 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2024-01-31 15:07:57 us=435358 192.168.3.205:52537 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2024-01-31 15:07:57 us=435449 192.168.3.205:52537 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2024-01-31 15:07:57 us=435476 192.168.3.205:52537 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2024-01-31 15:07:57 us=435548 192.168.3.205:52537 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
2024-01-31 15:07:57 us=435572 192.168.3.205:52537 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
R2024-01-31 15:07:57 us=435634 192.168.3.205:52537 TLS: Initial packet from [AF_INET]192.168.3.205:52537, sid=ad3835e0 18685af5
2024-01-31 15:07:57 us=449644 192.168.3.205:52537 VERIFY OK: depth=1, CN=RCDevs Support CA, OU=IT, O=RCDevs Support SA, C=LU
2024-01-31 15:07:57 us=450302 192.168.3.205:52537 VERIFY OK: depth=0, CN=yoann, description=CLIENT, O=RCDevs Support, organizationIdentifier=VATLU-00000000
2024-01-31 15:07:57 us=450697 192.168.3.205:52537 peer info: IV_VER=3.8.2connect3
2024-01-31 15:07:57 us=450733 192.168.3.205:52537 peer info: IV_PLAT=mac
2024-01-31 15:07:57 us=450745 192.168.3.205:52537 peer info: IV_NCP=2
2024-01-31 15:07:57 us=450754 192.168.3.205:52537 peer info: IV_TCPNL=1
2024-01-31 15:07:57 us=450762 192.168.3.205:52537 peer info: IV_PROTO=990
2024-01-31 15:07:57 us=450770 192.168.3.205:52537 peer info: IV_MTU=1600
2024-01-31 15:07:57 us=450778 192.168.3.205:52537 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2024-01-31 15:07:57 us=450810 192.168.3.205:52537 peer info: IV_GUI_VER=OCmacOS_3.4.8-4792
2024-01-31 15:07:57 us=450826 192.168.3.205:52537 peer info: IV_SSO=webauth,crtext
2024-01-31 15:07:57 us=450906 192.168.3.205:52537 TLS: Username/Password authentication deferred for username 'administrator'
2024-01-31 15:07:57 us=452030 192.168.3.205:52537 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-01-31 15:07:57 us=452060 192.168.3.205:52537 [yoann] Peer Connection Initiated with [AF_INET]192.168.3.205:52537
2024-01-31 15:07:57 us=452334 192.168.3.205:52537 PUSH: Received control message: 'PUSH_REQUEST'
2024-01-31 15:07:57 us=640406 MANAGEMENT: CMD 'client-auth-nt 17 0'
R2024-01-31 15:07:58 us=452524 192.168.3.205:52537 PUSH: Received control message: 'PUSH_REQUEST'
2024-01-31 15:07:58 us=452580 yoann/192.168.3.205:52537 MULTI_sva: pool returned IPv4=10.8.0.4, IPv6=(Not enabled)
2024-01-31 15:07:58 us=452642 yoann/192.168.3.205:52537 OPTIONS IMPORT: reading client specific options from: /opt/mfavpn/ccd/yoann
2024-01-31 15:07:58 us=452738 yoann/192.168.3.205:52537 MULTI: Learn: 10.8.0.114 -> yoann/192.168.3.205:52537
2024-01-31 15:07:58 us=452760 yoann/192.168.3.205:52537 MULTI: primary virtual IP for yoann/192.168.3.205:52537: 10.8.0.114
2024-01-31 15:07:58 us=452778 yoann/192.168.3.205:52537 Data Channel: using negotiated cipher 'AES-256-GCM'
2024-01-31 15:07:58 us=452816 yoann/192.168.3.205:52537 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
2024-01-31 15:07:58 us=452888 yoann/192.168.3.205:52537 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-01-31 15:07:58 us=452910 yoann/192.168.3.205:52537 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-01-31 15:07:58 us=452958 yoann/192.168.3.205:52537 SENT CONTROL [yoann]: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.114 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
[root@webadm1 ccd]# ll
total 12
-rw-r-----. 1 root mfavpn 39 Jan 31 15:33 'SUPPORT\Administrator'
-rw-r-----. 1 root mfavpn 39 Jan 31 14:33 administrator
-rw-r-----. 1 root mfavpn 39 Jan 31 14:08 yoann
User certificate info:
openssl x509 -in administrator.crt -text -noout
Certificate:
Data:
Version: 3 (0x2)
Serial Number:
e7:93:c8:30:9a:76:0d:d8:27:8b:99:64:1b:c9:87:eb
Signature Algorithm: sha256WithRSAEncryption
Issuer: CN=RCDevs Support CA, OU=IT, O=RCDevs Support SA, C=LU
Validity
Not Before: Jan 31 14:30:50 2024 GMT
Not After : Oct 26 14:30:50 2026 GMT
Subject: description=USER, CN=SUPPORT\Administrator, UID=Administrator, DC=SUPPORT, O=RCDevs Support, organizationIdentifier=VATLU-00000000
2024-01-31 15:34:48 us=45481 192.168.3.205:55468 Re-using SSL/TLS context
2024-01-31 15:34:48 us=45548 192.168.3.205:55468 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2024-01-31 15:34:48 us=45561 192.168.3.205:55468 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
2024-01-31 15:34:48 us=45645 192.168.3.205:55468 Control Channel MTU parms [ L:1621 D:1184 EF:66 EB:0 ET:0 EL:3 ]
2024-01-31 15:34:48 us=45666 192.168.3.205:55468 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
2024-01-31 15:34:48 us=45701 192.168.3.205:55468 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 0,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
2024-01-31 15:34:48 us=45716 192.168.3.205:55468 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,keydir 1,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
R2024-01-31 15:34:48 us=45766 192.168.3.205:55468 TLS: Initial packet from [AF_INET]192.168.3.205:55468, sid=6c2ea23e 20e2ac4b
WRWWWWWRRRRWRWR2024-01-31 15:34:48 us=58250 192.168.3.205:55468 VERIFY OK: depth=1, CN=RCDevs Support CA, OU=IT, O=RCDevs Support SA, C=LU
2024-01-31 15:34:48 us=58918 192.168.3.205:55468 VERIFY OK: depth=0, description=USER, CN=SUPPORT\\Administrator, UID=Administrator, DC=SUPPORT, O=RCDevs Support, organizationIdentifier=VATLU-00000000
WR2024-01-31 15:34:48 us=59314 192.168.3.205:55468 peer info: IV_VER=3.8.2connect3
2024-01-31 15:34:48 us=59338 192.168.3.205:55468 peer info: IV_PLAT=mac
2024-01-31 15:34:48 us=59348 192.168.3.205:55468 peer info: IV_NCP=2
2024-01-31 15:34:48 us=59356 192.168.3.205:55468 peer info: IV_TCPNL=1
2024-01-31 15:34:48 us=59363 192.168.3.205:55468 peer info: IV_PROTO=990
2024-01-31 15:34:48 us=59371 192.168.3.205:55468 peer info: IV_MTU=1600
2024-01-31 15:34:48 us=59380 192.168.3.205:55468 peer info: IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305
2024-01-31 15:34:48 us=59399 192.168.3.205:55468 peer info: IV_GUI_VER=OCmacOS_3.4.8-4792
2024-01-31 15:34:48 us=59408 192.168.3.205:55468 peer info: IV_SSO=webauth,crtext
2024-01-31 15:34:48 us=59485 192.168.3.205:55468 TLS: Username/Password authentication deferred for username 'administrator'
WRR2024-01-31 15:34:48 us=60347 192.168.3.205:55468 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2024-01-31 15:34:48 us=60372 192.168.3.205:55468 [SUPPORT\Administrator] Peer Connection Initiated with [AF_INET]192.168.3.205:55468
R2024-01-31 15:34:48 us=60605 192.168.3.205:55468 PUSH: Received control message: 'PUSH_REQUEST'
W2024-01-31 15:34:48 us=256051 MANAGEMENT: CMD 'client-auth-nt 22 0'
R2024-01-31 15:34:49 us=61133 192.168.3.205:55468 PUSH: Received control message: 'PUSH_REQUEST'
2024-01-31 15:34:49 us=61185 SUPPORT\Administrator/192.168.3.205:55468 MULTI_sva: pool returned IPv4=10.8.0.4, IPv6=(Not enabled)
2024-01-31 15:34:49 us=61249 SUPPORT\Administrator/192.168.3.205:55468 OPTIONS IMPORT: reading client specific options from: /opt/mfavpn/ccd/SUPPORT\Administrator
2024-01-31 15:34:49 us=70447 SUPPORT\Administrator/192.168.3.205:55468 MULTI: Learn: 10.8.0.115 -> SUPPORT\Administrator/192.168.3.205:55468
2024-01-31 15:34:49 us=70485 SUPPORT\Administrator/192.168.3.205:55468 MULTI: primary virtual IP for SUPPORT\Administrator/192.168.3.205:55468: 10.8.0.115
2024-01-31 15:34:49 us=70505 SUPPORT\Administrator/192.168.3.205:55468 Data Channel: using negotiated cipher 'AES-256-GCM'
2024-01-31 15:34:49 us=70528 SUPPORT\Administrator/192.168.3.205:55468 Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
2024-01-31 15:34:49 us=70603 SUPPORT\Administrator/192.168.3.205:55468 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-01-31 15:34:49 us=70623 SUPPORT\Administrator/192.168.3.205:55468 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2024-01-31 15:34:49 us=70664 SUPPORT\Administrator/192.168.3.205:55468 SENT CONTROL [SUPPORT\Administrator]: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.115 255.255.255.0,peer-id 0,cipher AES-256-GCM' (status=1)
Regards