|
softethervirtual**搭建的openvirtual** Layer-2 Ethernet Bridgine Mode下出现反复重连的现象
Sun Dec 31 20:45:50 2017 Openvirtual** 2.3.18 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 26 2017
Sun Dec 31 20:45:50 2017 Windows version 6.2 (Windows 8 or greater) 64bit
Sun Dec 31 20:45:50 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Sun Dec 31 20:45:50 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Sun Dec 31 20:45:50 2017 Need hold release from management interface, waiting...
Sun Dec 31 20:45:50 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Sun Dec 31 20:45:50 2017 MANAGEMENT: CMD 'state on'
Sun Dec 31 20:45:50 2017 MANAGEMENT: CMD 'log all on'
Sun Dec 31 20:45:50 2017 MANAGEMENT: CMD 'hold off'
Sun Dec 31 20:45:50 2017 MANAGEMENT: CMD 'hold release'
Sun Dec 31 20:46:00 2017 MANAGEMENT: CMD 'username "Auth" "ra3"'
Sun Dec 31 20:46:00 2017 MANAGEMENT: CMD 'password [...]'
Sun Dec 31 20:46:00 2017 WARNING: No server certificate verification method has been enabled. See http://openvirtual**.net/howto.html#mitm for more info.
Sun Dec 31 20:46:01 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Dec 31 20:46:01 2017 MANAGEMENT: >STATE:1514724361,RESOLVE,,,
Sun Dec 31 20:46:01 2017 UDPv4 link local: [undef]
Sun Dec 31 20:46:01 2017 UDPv4 link remote: [AF_INET]119.189.250.242:1194
Sun Dec 31 20:46:01 2017 MANAGEMENT: >STATE:1514724361,WAIT,,,
Sun Dec 31 20:46:01 2017 MANAGEMENT: >STATE:1514724361,AUTH,,,
Sun Dec 31 20:46:01 2017 TLS: Initial packet from [AF_INET]119.189.250.242:1194, sid=9cec055e c0be8378
Sun Dec 31 20:46:01 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Dec 31 20:46:01 2017 VERIFY OK: depth=0, CN=LEDE-X64, O=LEDE-X64, OU=LEDE-X64, C=US
Sun Dec 31 20:46:02 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sun Dec 31 20:46:02 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 31 20:46:02 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sun Dec 31 20:46:02 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 31 20:46:03 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sun Dec 31 20:46:03 2017 [LEDE-X64] Peer Connection Initiated with [AF_INET]119.189.250.242:1194
Sun Dec 31 20:46:04 2017 MANAGEMENT: >STATE:1514724364,GET_CONFIG,,,
Sun Dec 31 20:46:06 2017 SENT CONTROL [LEDE-X64]: 'PUSH_REQUEST' (status=1)
Sun Dec 31 20:46:07 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10'
Sun Dec 31 20:46:07 2017 OPTIONS IMPORT: timers and/or timeouts modified
Sun Dec 31 20:46:07 2017 open_tun, tt->ipv6=0
Sun Dec 31 20:46:07 2017 TAP-WIN32 device [以太网 2] opened: \\.\Global\{D359070A-F517-438A-B62D-F39982189D31}.tap
Sun Dec 31 20:46:07 2017 TAP-Windows Driver Version 9.21
Sun Dec 31 20:46:07 2017 Successful ARP Flush on interface [20] {D359070A-F517-438A-B62D-F39982189D31}
Sun Dec 31 20:46:12 2017 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Sun Dec 31 20:46:12 2017 Initialization Sequence Completed
Sun Dec 31 20:46:12 2017 MANAGEMENT: >STATE:1514724372,CONNECTED,SUCCESS,,119.189.250.242
------------------------以下开始重连------------------------
Sun Dec 31 20:46:46 2017 [LEDE-X64] Inactivity timeout (--ping-restart), restarting
Sun Dec 31 20:46:46 2017 SIGUSR1[soft,ping-restart] received, process restarting
Sun Dec 31 20:46:46 2017 MANAGEMENT: >STATE:1514724406,RECONNECTING,ping-restart,,
Sun Dec 31 20:46:46 2017 Restart pause, 2 second(s)
Sun Dec 31 20:46:48 2017 WARNING: No server certificate verification method has been enabled. See http://openvirtual**.net/howto.html#mitm for more info.
Sun Dec 31 20:46:48 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sun Dec 31 20:46:48 2017 MANAGEMENT: >STATE:1514724408,RESOLVE,,,
Sun Dec 31 20:47:00 2017 UDPv4 link local: [undef]
Sun Dec 31 20:47:00 2017 UDPv4 link remote: [AF_INET]119.189.250.242:1194
Sun Dec 31 20:47:00 2017 MANAGEMENT: >STATE:1514724420,WAIT,,,
Sun Dec 31 20:47:00 2017 MANAGEMENT: >STATE:1514724420,AUTH,,,
Sun Dec 31 20:47:00 2017 TLS: Initial packet from [AF_INET]119.189.250.242:1194, sid=d389a6b8 74ac108b
Sun Dec 31 20:47:00 2017 VERIFY OK: depth=0, CN=LEDE-X64, O=LEDE-X64, OU=LEDE-X64, C=US
Sun Dec 31 20:47:01 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sun Dec 31 20:47:01 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 31 20:47:01 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sun Dec 31 20:47:01 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Dec 31 20:47:01 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sun Dec 31 20:47:01 2017 [LEDE-X64] Peer Connection Initiated with [AF_INET]119.189.250.242:1194
Sun Dec 31 20:47:02 2017 MANAGEMENT: >STATE:1514724422,GET_CONFIG,,,
Sun Dec 31 20:47:03 2017 SENT CONTROL [LEDE-X64]: 'PUSH_REQUEST' (status=1)
Sun Dec 31 20:47:03 2017 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping-restart 10'
Sun Dec 31 20:47:03 2017 OPTIONS IMPORT: timers and/or timeouts modified
Sun Dec 31 20:47:03 2017 Preserving previous TUN/TAP instance: 以太网 2
Sun Dec 31 20:47:03 2017 Initialization Sequence Completed
Sun Dec 31 20:47:03 2017 MANAGEMENT: >STATE:1514724423,CONNECTED,SUCCESS,,119.189.250.242
请不要胡乱输入以及粘贴、复制等方式灌水
请尊重作者、并共同维护网站的正常阅读,否则账户将会被限制发帖、回帖,并且积分可能会被清零,站内短信以及阅读权限等都会受到影响,谢谢。
具体限制方式:https://www.right.com.cn/forum/thread-8307840-1-1.html
|
|