Re: 【外部邮件】Re: openconnect connection is successful, unable to receive data

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Execution log:

note: setting 'plain' as primary authentication method
note: enabling 'certificate' as authentication method
note: setting 'file' as supplemental config option
listening (TCP) on 0.0.0.0:443...
listening (TCP) on [::]:443...
ocserv[14830]: main: initializing control unix socket: /var/run/occtl.socket
ocserv[14830]: main: initialized ocserv 0.11.9
ocserv[14831]: sec-mod: reading supplemental config from files
ocserv[14831]: sec-mod: sec-mod initialized (socket: /var/lib/ocserv/ocserv.sock.14830)
ocserv[14830]: TLS[<3>]: ASSERT: extensions.c:65
ocserv[14831]: sec-mod: received request from pid 14830 and uid 0
ocserv[14831]: sec-mod: cmd [size=57] sm: sign
ocserv[14830]: main: processed 1 CA certificate(s)
ocserv[14830]: main: added 1 points (total 1) for IP '192.168.35.65' to ban list
ocserv[14832]: worker:  accepted connection
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Allocating epoch #0
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_constate.c:586
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Allocating epoch #1
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.1 Handshake packet received. Epoch 0, length: 219
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 219
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[0] Handshake(22) with length: 219
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: CLIENT HELLO (1) was received. Length 215[215], frag offset 0, frag length: 215, sequence: 0
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Client's version: 3.3
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_db.c:263
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'STATUS REQUEST/5'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SESSION TICKET/35' (0 bytes)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC/10'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SIGNATURE ALGORITHMS/13'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'STATUS REQUEST/5'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SAFE RENEGOTIATION/65281'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SESSION TICKET/35'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC/10'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SIGNATURE ALGORITHMS/13'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SAFE RENEGOTIATION/65281'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SESSION TICKET/35'
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Selected ECC curve SECP256R1 (2)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SIGNATURE ALGORITHMS/13' (22 bytes)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (4.1) RSA-SHA256
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (4.3) ECDSA-SHA256
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (5.1) RSA-SHA384
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (5.3) ECDSA-SHA384
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (6.1) RSA-SHA512
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (6.3) ECDSA-SHA512
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (3.1) RSA-SHA224
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (3.3) ECDSA-SHA224
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (2.1) RSA-SHA1
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (2.3) ECDSA-SHA1
ocserv[14832]: TLS[<3>]: ASSERT: server_name.c:301
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Requested PK algorithm: EC (4) -- ctype: X.509 (1)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_256_GCM_SHA384 (00.9D)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA256 (00.BA)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA256 (00.C0)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Requested cipher suites[size: 108]:
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Selected cipher suite: ECDHE_RSA_AES_128_GCM_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Selected Compression Method: NULL
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Safe renegotiation succeeded
ocserv[14832]: TLS[<3>]: ASSERT: status_request.c:181
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Sending extension SAFE RENEGOTIATION (1 bytes)
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: SessionID: d8481129cd226888952e295996c2d12453228dfadb10869c3ee7f148ca7573b4
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: SERVER HELLO was queued [87 bytes]
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE was queued [849 bytes]
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: signing handshake data: using RSA-SHA256
ocserv[14831]: sec-mod: received request from pid 14832 and uid 986
ocserv[14831]: sec-mod: cmd [size=57] sm: sign
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: SERVER KEY EXCHANGE was queued [333 bytes]
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (4.1) RSA-SHA256
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (4.2) DSA-SHA256
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (4.3) ECDSA-SHA256
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (5.1) RSA-SHA384
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (5.3) ECDSA-SHA384
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (6.1) RSA-SHA512
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (6.3) ECDSA-SHA512
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (3.1) RSA-SHA224
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (3.2) DSA-SHA224
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (3.3) ECDSA-SHA224
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (2.1) RSA-SHA1
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (2.2) DSA-SHA1
ocserv[14832]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (2.3) ECDSA-SHA1
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE REQUEST was queued [78 bytes]
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: SERVER HELLO DONE was queued [4 bytes]
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 87 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[1] Handshake(22) in epoch 0 and length: 92
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 849 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[2] Handshake(22) in epoch 0 and length: 854
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 78 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[4] Handshake(22) in epoch 0 and length: 83
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 846
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 846
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[1] Handshake(22) with length: 846
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE (11) was received. Length 842[842], frag offset 0, frag length: 842, sequence: 0
ocserv[14832]: TLS[<3>]: ASSERT: status_request.c:332
ocserv[14832]: TLS[<3>]: ASSERT: dn.c:990
ocserv[14832]: TLS[<3>]: ASSERT: common.c:1106
ocserv[14832]: TLS[<3>]: ASSERT: extensions.c:65
ocserv[14832]: TLS[<3>]: ASSERT: name_constraints.c:173
ocserv[14832]: TLS[<3>]: ASSERT: mpi.c:240
ocserv[14832]: worker:  client certificate verification succeeded
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 70
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[2] Handshake(22) with length: 70
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 264
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 264
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[3] Handshake(22) with length: 264
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE VERIFY (15) was received. Length 260[260], frag offset 0, frag length: 260, sequence: 0
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: verify cert vrfy: using RSA-SHA256
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet ChangeCipherSpec(20)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet ChangeCipherSpec(20) with length: 1
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[4] ChangeCipherSpec(20) with length: 1
ocserv[14832]: TLS[<9>]: INT: PREMASTER SECRET[32]: de6345619822e02b12cb6b2e13b1f3e384761c464feff7f417906eb544e50021
ocserv[14832]: TLS[<9>]: INT: CLIENT RANDOM[32]: 5a14e31215f1b64a6009825bbd1ea3112b7b3839ab5d43d75b3fdc0f62f7de93
ocserv[14832]: TLS[<9>]: INT: SERVER RANDOM[32]: 5a14e34635213f1912adc926626266f253ab2409ac46071afe7f87d08569faaa
ocserv[14832]: TLS[<9>]: INT: MASTER SECRET: b528fe530f3232d6fb17dbb358b937acc2c0d198b4c3f9353df158f4063df422ddd03616349f4924afd7a43df19a8df2
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Initializing epoch #1
ocserv[14832]: TLS[<9>]: INT: KEY BLOCK[40]: b6520bd26f31710580607baceb03bf548acfd0bb43b2faa88f390b3d30a4574d
ocserv[14832]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: b6520bd26f31710580607baceb03bf54
ocserv[14832]: TLS[<9>]: INT: SERVER WRITE KEY [16]: 8acfd0bb43b2faa88f390b3d30a4574d
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Epoch #1 ready
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Cipher Suite: ECDHE_RSA_AES_128_GCM_SHA256
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 40
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 40
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[0] Handshake(22) with length: 16
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: recording tls-unique CB (recv)
ocserv[14832]: TLS[<4>]: REC[0x7f0ff24f5010]: Sent ChangeCipherSpec
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Cipher Suite: ECDHE_RSA_AES_128_GCM_SHA256
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: Initializing internal [write] cipher sessions
ocserv[14832]: TLS[<4>]: HSK[0x7f0ff24f5010]: FINISHED was queued [16 bytes]
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45
ocserv[14832]: worker:  sending message 'resume data store request' to secmod
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Start of epoch cleanup
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Epoch #0 freed
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: End of epoch cleanup
ocserv[14832]: worker:  TLS handshake completed
ocserv[14832]: worker:  sending message 'session info' to main
ocserv[14831]: sec-mod: received request from pid 14832 and uid 986
ocserv[14831]: sec-mod: cmd [size=1187] resume data store request
ocserv[14831]: sec-mod: TLS session DB storing d8481129cd226888952e295996c2d12453228dfadb10869c3ee7f148ca7573b4
ocserv[14830]: main: 192.168.35.65:43694 main received worker's message 'session info' of 6 bytes
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Application Data packet received. Epoch 0, length: 602
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Application Data(23)
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Application Data(23) with length: 602
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[1] Application Data(23) with length: 578
ocserv[14832]: worker: 192.168.35.65 HTTP processing: Host: 192.168.35.54
ocserv[14832]: worker: 192.168.35.65 HTTP processing: User-Agent: OpenConnect VPN Agent (NetworkManager) v7.06
ocserv[14832]: worker: 192.168.35.65 User-agent: 'OpenConnect VPN Agent (NetworkManager) v7.06'
ocserv[14832]: worker: 192.168.35.65 HTTP processing: Accept: */*
ocserv[14832]: worker: 192.168.35.65 HTTP processing: Accept-Encoding: identity
ocserv[14832]: worker: 192.168.35.65 HTTP processing: X-Transcend-Version: 1
ocserv[14832]: worker: 192.168.35.65 HTTP processing: X-Aggregate-Auth: 1
ocserv[14832]: worker: 192.168.35.65 HTTP processing: X-AnyConnect-Platform: linux-64
ocserv[14832]: worker: 192.168.35.65 HTTP processing: X-Support-HTTP-Auth: true
ocserv[14832]: worker: 192.168.35.65 HTTP processing: X-Pad: 0000000000000000000000000000000000000000000000000
ocserv[14832]: worker: 192.168.35.65 HTTP processing: Content-Type: application/x-www-form-urlencoded
ocserv[14832]: worker: 192.168.35.65 HTTP processing: Content-Length: 207
ocserv[14832]: worker: 192.168.35.65 HTTP POST /
ocserv[14832]: worker: 192.168.35.65 POST body: '<?xml version="1.0" encoding="UTF-8"?>
<config-auth client="vpn" type="init"><version who="vpn">v7.06</version><device-id>linux-64</device-id><group-access>https://192.168.35.54</group-access></config-auth>
'
ocserv[14832]: worker: 192.168.35.65 cannot find 'group-select' in client XML message
ocserv[14832]: worker: 192.168.35.65 cannot find 'group-select' in client XML message
ocserv[14832]: worker: 192.168.35.65 failed reading groupname
ocserv[14832]: worker: 192.168.35.65 sending message 'sm: auth init' to secmod
ocserv[14831]: sec-mod: received request from pid 14832 and uid 986
ocserv[14831]: sec-mod: cmd [size=88] sm: auth init
ocserv[14831]: sec-mod: using 'certificate' authentication to authenticate user (session: d4WYzD)
ocserv[14831]: sec-mod: auth init (with cert) for user '' (session: d4WYzD) of group: '' from '192.168.35.65'
ocserv[14832]: worker: 192.168.35.65 received auth reply message (value: 1)
ocserv[14832]: worker[user]: 192.168.35.65 user 'user' obtained cookie
ocserv[14832]: worker[user]: 192.168.35.65 HTTP sending: 200 OK
ocserv[14832]: worker[user]: 192.168.35.65 sent session id: d4WYzDksOfE9sstjTG+DhO2fMDc=
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Application Data(23) with length: 1026 and min pad: 0
ocserv[14832]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
ocserv[14832]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[2] Application Data(23) in epoch 1 and length: 1055
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_buffers.c:576
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_record.c:1063
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_record.c:1184
ocserv[14832]: TLS[<3>]: ASSERT: gnutls_record.c:1436
ocserv[14830]: main: 192.168.35.65:43694 worker terminated
ocserv[14830]: main: 192.168.35.65:43694 user disconnected (reason: unspecified, rx: 0, tx: 0)
ocserv[14830]: main: added 1 points (total 2) for IP '192.168.35.65' to ban list
ocserv[14833]: worker:  accepted connection
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Allocating epoch #0
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_constate.c:586
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Allocating epoch #1
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.1 Handshake packet received. Epoch 0, length: 219
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 219
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[0] Handshake(22) with length: 219
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: CLIENT HELLO (1) was received. Length 215[215], frag offset 0, frag length: 215, sequence: 0
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Client's version: 3.3
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_db.c:263
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'STATUS REQUEST/5'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SAFE RENEGOTIATION/65281' (1 bytes)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SESSION TICKET/35' (0 bytes)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC/10'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SIGNATURE ALGORITHMS/13'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'STATUS REQUEST/5'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SAFE RENEGOTIATION/65281'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SESSION TICKET/35'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC/10'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SUPPORTED ECC POINT FORMATS/11'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SIGNATURE ALGORITHMS/13'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'STATUS REQUEST/5' (5 bytes)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SAFE RENEGOTIATION/65281'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Found extension 'SESSION TICKET/35'
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SUPPORTED ECC/10' (12 bytes)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Selected ECC curve SECP256R1 (2)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SUPPORTED ECC POINT FORMATS/11' (2 bytes)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Parsing extension 'SIGNATURE ALGORITHMS/13' (22 bytes)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (4.1) RSA-SHA256
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (4.3) ECDSA-SHA256
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (5.1) RSA-SHA384
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (5.3) ECDSA-SHA384
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (6.1) RSA-SHA512
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (6.3) ECDSA-SHA512
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (3.1) RSA-SHA224
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (3.3) ECDSA-SHA224
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (2.1) RSA-SHA1
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: rcvd signature algo (2.3) ECDSA-SHA1
ocserv[14833]: TLS[<3>]: ASSERT: server_name.c:301
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Requested PK algorithm: EC (4) -- ctype: X.509 (1)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Requested PK algorithm: RSA (1) -- ctype: X.509 (1)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: certificate[0] PK algorithm: RSA (1) - ctype: X.509 (1)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_128_GCM_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_256_GCM_SHA384
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_GCM_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_GCM_SHA384
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_128_CBC_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_AES_256_CBC_SHA384
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_128_CBC_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_CAMELLIA_256_CBC_SHA384
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_3DES_EDE_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: ECDHE_ECDSA_ARCFOUR_128_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_128_GCM_SHA256 (C0.2F)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_256_GCM_SHA384 (C0.30)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_GCM_SHA256 (C0.8A)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_GCM_SHA384 (C0.8B)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA1 (C0.13)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_128_CBC_SHA256 (C0.27)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA1 (C0.14)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_AES_256_CBC_SHA384 (C0.28)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_128_CBC_SHA256 (C0.76)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_CAMELLIA_256_CBC_SHA384 (C0.77)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_3DES_EDE_CBC_SHA1 (C0.12)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: ECDHE_RSA_ARCFOUR_128_SHA1 (C0.11)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_128_GCM_SHA256 (00.9C)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_256_GCM_SHA384 (00.9D)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_128_GCM_SHA256 (C0.7A)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_256_GCM_SHA384 (C0.7B)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_128_CBC_SHA1 (00.2F)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_128_CBC_SHA256 (00.3C)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_256_CBC_SHA1 (00.35)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_AES_256_CBC_SHA256 (00.3D)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA1 (00.41)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_128_CBC_SHA256 (00.BA)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA1 (00.84)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_CAMELLIA_256_CBC_SHA256 (00.C0)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_3DES_EDE_CBC_SHA1 (00.0A)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_ARCFOUR_128_SHA1 (00.05)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Keeping ciphersuite: RSA_ARCFOUR_128_MD5 (00.04)
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_128_GCM_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_256_GCM_SHA384
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_GCM_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_GCM_SHA384
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA1
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_128_CBC_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA1
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_AES_256_CBC_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA1
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_128_CBC_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA1
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_CAMELLIA_256_CBC_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_handshake.c:3376
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_RSA_3DES_EDE_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_128_GCM_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_256_GCM_SHA384
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_GCM_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_GCM_SHA384
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_128_CBC_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_AES_256_CBC_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_128_CBC_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_CAMELLIA_256_CBC_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_3DES_EDE_CBC_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Removing ciphersuite: DHE_DSS_ARCFOUR_128_SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Requested cipher suites[size: 108]:
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Selected cipher suite: ECDHE_RSA_AES_128_GCM_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Selected Compression Method: NULL
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Safe renegotiation succeeded
ocserv[14833]: TLS[<3>]: ASSERT: status_request.c:181
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Sending extension SAFE RENEGOTIATION (1 bytes)
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: Sending extension SUPPORTED ECC POINT FORMATS (2 bytes)
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: SessionID: 813b69661fc8809d9ecb5687e649046df4fd93d75af67ed85b751d2735e6a824
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: SERVER HELLO was queued [87 bytes]
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE was queued [849 bytes]
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: signing handshake data: using RSA-SHA256
ocserv[14831]: sec-mod: received request from pid 14833 and uid 986
ocserv[14831]: sec-mod: cmd [size=57] sm: sign
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: SERVER KEY EXCHANGE was queued [333 bytes]
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (4.1) RSA-SHA256
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (4.2) DSA-SHA256
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (4.3) ECDSA-SHA256
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (5.1) RSA-SHA384
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (5.3) ECDSA-SHA384
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (6.1) RSA-SHA512
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (6.3) ECDSA-SHA512
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (3.1) RSA-SHA224
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (3.2) DSA-SHA224
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (3.3) ECDSA-SHA224
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (2.1) RSA-SHA1
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (2.2) DSA-SHA1
ocserv[14833]: TLS[<4>]: EXT[0x7f0ff24f5010]: sent signature algo (2.3) ECDSA-SHA1
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE REQUEST was queued [78 bytes]
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: SERVER HELLO DONE was queued [4 bytes]
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 87 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[1] Handshake(22) in epoch 0 and length: 92
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 849 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[2] Handshake(22) in epoch 0 and length: 854
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 333 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[3] Handshake(22) in epoch 0 and length: 338
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 78 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[4] Handshake(22) in epoch 0 and length: 83
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 4 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[5] Handshake(22) in epoch 0 and length: 9
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 7
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 7
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[1] Handshake(22) with length: 7
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: CERTIFICATE (11) was received. Length 3[3], frag offset 0, frag length: 3, sequence: 0
ocserv[14833]: TLS[<3>]: ASSERT: cert.c:1060
ocserv[14833]: worker:  tlslib.c:488: no certificate was found
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 70
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 70
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[2] Handshake(22) with length: 70
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: CLIENT KEY EXCHANGE (16) was received. Length 66[66], frag offset 0, frag length: 66, sequence: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 ChangeCipherSpec packet received. Epoch 0, length: 1
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet ChangeCipherSpec(20)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet ChangeCipherSpec(20) with length: 1
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[3] ChangeCipherSpec(20) with length: 1
ocserv[14833]: TLS[<9>]: INT: PREMASTER SECRET[32]: 5b5c33bdd2778545129f5e322c8c119c49037ffff723979bfc8f1791abfbe94f
ocserv[14833]: TLS[<9>]: INT: CLIENT RANDOM[32]: 5a14e37e719ccf3178e1d9f28660236250eb2e5bb574873cc4076617b503f00a
ocserv[14833]: TLS[<9>]: INT: SERVER RANDOM[32]: 5a14e3894357299d46b059cc678c12ed6b4bc5a0636a3db1757c0e467bc68d08
ocserv[14833]: TLS[<9>]: INT: MASTER SECRET: 07b80a3930548ba6c3dd7f4a5cbcc2f85d0eeb49f30bb6ab940fdc24b33dbbbdd45f354b328cab893a6735cee5b0ef3d
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Initializing epoch #1
ocserv[14833]: TLS[<9>]: INT: KEY BLOCK[40]: fca85cd499011e849198e22e44136e6a37aa69531750df710c698475b002949f
ocserv[14833]: TLS[<9>]: INT: CLIENT WRITE KEY [16]: fca85cd499011e849198e22e44136e6a
ocserv[14833]: TLS[<9>]: INT: SERVER WRITE KEY [16]: 37aa69531750df710c698475b002949f
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Epoch #1 ready
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Cipher Suite: ECDHE_RSA_AES_128_GCM_SHA256
ocserv[14833]: TLS[<3>]: ASSERT: gnutls_buffers.c:1138
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Handshake packet received. Epoch 0, length: 40
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Handshake(22)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Handshake(22) with length: 40
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[0] Handshake(22) with length: 16
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: FINISHED (20) was received. Length 12[12], frag offset 0, frag length: 12, sequence: 0
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: recording tls-unique CB (recv)
ocserv[14833]: TLS[<4>]: REC[0x7f0ff24f5010]: Sent ChangeCipherSpec
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Cipher Suite: ECDHE_RSA_AES_128_GCM_SHA256
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: Initializing internal [write] cipher sessions
ocserv[14833]: TLS[<4>]: HSK[0x7f0ff24f5010]: FINISHED was queued [16 bytes]
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet ChangeCipherSpec(20) with length: 1 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: NULL, MAC: MAC-NULL, Epoch: 0
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[6] ChangeCipherSpec(20) in epoch 0 and length: 6
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Handshake(22) with length: 16 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[1] Handshake(22) in epoch 1 and length: 45
ocserv[14833]: worker:  sending message 'resume data store request' to secmod
ocserv[14831]: sec-mod: received request from pid 14833 and uid 986
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Start of epoch cleanup
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Epoch #0 freed
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: End of epoch cleanup
ocserv[14833]: worker:  TLS handshake completed
ocserv[14833]: worker:  sending message 'session info' to main
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Application Data packet received. Epoch 0, length: 623
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Application Data(23)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Application Data(23) with length: 623
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[1] Application Data(23) with length: 599
ocserv[14833]: worker: 192.168.35.65 HTTP processing: Host: 192.168.35.54
ocserv[14833]: worker: 192.168.35.65 HTTP processing: User-Agent: Open AnyConnect VPN Agent v7.06
ocserv[14830]: main: 192.168.35.65:43696 main received worker's message 'session info' of 6 bytes
ocserv[14833]: worker: 192.168.35.65 User-agent: 'Open AnyConnect VPN Agent v7.06'
ocserv[14833]: worker: 192.168.35.65 HTTP processing: Cookie: webvpn=cq9MrwrZXFyJSv+9uu2SSQFrLRch6XsRuOz7cP13QBE=
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-CSTP-Version: 1
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-CSTP-Hostname: zhangsan
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-CSTP-Accept-Encoding: oc-lz4,lzs
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-CSTP-MTU: 1406
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-CSTP-Address-Type: IPv6,IPv4
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-CSTP-Full-IPv6-Capability: true
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-DTLS-Master-Secret: E13BFF3EA0C3D8DF17091D81064574DA892910B87EC5A54B2BC0BE968D6B0934E7CFD6B8F07F573653CB134D1333B1A5
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-DTLS-CipherSuite: OC-DTLS1_2-AES256-GCM:OC-DTLS1_2-AES128-GCM:AES256-SHA:AES128-SHA:DES-CBC3-SHA:DES-CBC-SHA
ocserv[14833]: worker: 192.168.35.65 HTTP processing: X-DTLS-Accept-Encoding: oc-lz4,lzs
ocserv[14833]: worker: 192.168.35.65 HTTP CONNECT /CSCOSSLC/tunnel
ocserv[14833]: worker: 192.168.35.65 sending message 'auth cookie request' to main
ocserv[14831]: sec-mod: cmd [size=347] resume data store request
ocserv[14831]: sec-mod: TLS session DB storing 813b69661fc8809d9ecb5687e649046df4fd93d75af67ed85b751d2735e6a824
ocserv[14830]: main: 192.168.35.65:43696 main received worker's message 'auth cookie request' of 34 bytes
ocserv[14830]: main: 192.168.35.65:43696 sending msg sm: session open to sec-mod
ocserv[14831]: sec-mod: received request sm: session open
ocserv[14831]: sec-mod: cmd [size=34] sm: session open
ocserv[14831]: sec-mod: initiating session for user 'user' (session: d4WYzD)
ocserv[14830]: main[user]: 192.168.35.65:43696 new user session
ocserv[14830]: main[user]: 192.168.35.65:43696 selected IP: 192.168.1.193
ocserv[14830]: main[user]: 192.168.35.65:43696 assigned IPv4: 192.168.1.193
ocserv[14830]: main[user]: 192.168.35.65:43696 assigning tun device vpns0
ocserv[14830]: main[user]: 192.168.35.65:43696 user of group '[unknown]' authenticated (using cookie)
ocserv[14830]: main[user]: 192.168.35.65:43696 sending (socket) message 2 to worker
ocserv[14830]: main[user]: 192.168.35.65:43696 user logged in
ocserv[14833]: worker: 192.168.35.65 received auth reply message (value: 1)
ocserv[14833]: worker[user]: 192.168.35.65 suggesting DPD of 90 secs
ocserv[14833]: worker[user]: 192.168.35.65 disabling UDP (DTLS) connection
ocserv[14833]: worker[user]: 192.168.35.65 configured link MTU is 1500
ocserv[14833]: worker[user]: 192.168.35.65 peer's data MTU is 1406 / link is 1500
ocserv[14833]: worker[user]: 192.168.35.65 sending IPv4 192.168.1.193
ocserv[14833]: worker[user]: 192.168.35.65 adding DNS 192.168.0.1
ocserv[14833]: worker[user]: 192.168.35.65 adding DNS 192.168.0.2
ocserv[14833]: worker[user]: 192.168.35.65 Link MTU is 1500 bytes
ocserv[14833]: worker[user]: 192.168.35.65 sending message 'tun mtu change' to main
ocserv[14833]: worker[user]: 192.168.35.65 setting data MTU to 1472
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Preparing Packet Application Data(23) with length: 626 and min pad: 0
ocserv[14833]: TLS[<9>]: ENC[0x7f0ff24f5010]: cipher: AES-128-GCM, MAC: AEAD, Epoch: 1
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Sent Packet[2] Application Data(23) in epoch 1 and length: 655
ocserv[14830]: main[user]: 192.168.35.65:43696 main received worker's message 'tun mtu change' of 3 bytes
ocserv[14830]: main[user]: 192.168.35.65:43696 setting vpns0 MTU to 1472
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: SSL 3.3 Application Data packet received. Epoch 0, length: 80
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Expected Packet Application Data(23)
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Received Packet Application Data(23) with length: 80
ocserv[14833]: TLS[<5>]: REC[0x7f0ff24f5010]: Decrypted Packet[2] Application Data(23) with length: 56
ocserv[14833]: worker[user]: 192.168.35.65 received 56 byte(s) (TLS)

> ? 2017?11?21????7:11?Nikos Mavrogiannopoulos <n.mavrogiannopoulos at gmail.com> ???
> 
> Do you use the rhel7.4 version of centos7? That seems like a
> regression from the epel to the rhel protobuf-c libraries.
> 
> Does the new build over that version address that?
> https://bodhi.fedoraproject.org/updates/FEDORA-EPEL-2017-35c633c003
> 
> On Tue, Nov 21, 2017 at 8:35 AM, ping gao ??(0) <ping.gao at corp.elong.com> wrote:
>> hi all
>>   I use openconnect to connect ocserv server, you can connect successfully, but can not receive downlink data?
>> Trouble to help answer the next
>> 
>> OS Info:
>> 
>> Server:
>>   Centos7
>>  Ocserv 0.11.8
>> Compiled with: seccomp, tcp-wrappers, oath, radius, gssapi, PAM, PKCS#11, AnyConnect
>> GnuTLS version: 3.3.26 (compiled with 3.3.24)
>> 
>> Client:
>>   Ubuntu 16.04
>>  OpenConnect version v7.06
>> Using GnuTLS. Features present: PKCS#11, RSA software token, HOTP software token, TOTP software token, System keys, DTLS
>> 
>> The following ocserv server debug 100 output?
>> 
>> ocserv[5123]: main: performing maintenance (banned IPs: 1)
>> ocserv[5124]: sec-mod: performing maintenance
>> ocserv[5124]: sec-mod: active sessions 1
>> ocserv[5123]: main: main received message 'unknown (248)' from sec-mod of 10 bytes
>> ocserv[5127]: TLS[<5>]: REC[0x7f6c443e1010]: SSL 3.3 Application Data packet received. Epoch 0, length: 108
>> ocserv[5127]: TLS[<5>]: REC[0x7f6c443e1010]: Expected Packet Application Data(23)
>> ocserv[5127]: TLS[<5>]: REC[0x7f6c443e1010]: Received Packet Application Data(23) with length: 108
>> ocserv[5127]: TLS[<5>]: REC[0x7f6c443e1010]: Decrypted Packet[590] Application Data(23) with length: 84
>> ocserv[5127]: worker[user]: 192.168.35.65 received 84 byte(s) (TLS)
>> ocserv[5127]: worker[user]: 192.168.35.65 writing 76 byte(s) to TUN
>> _______________________________________________
>> openconnect-devel mailing list
>> openconnect-devel at lists.infradead.org
>> http://lists.infradead.org/mailman/listinfo/openconnect-devel



[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux