当我使用了错误的客户端 证书 连接服务端时,就会出现如下 log
TLS: Initial packet from [AF_INET]
会一直报这个 init 建立 TLS 相关的 log,永远建立不起来
2023-06-20 08:56:33 Initialization Sequence Completed
2023-06-20 08:56:44 192.168.0.100:58480 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1179)
2023-06-20 08:56:44 192.168.0.100:58480 TLS: Initial packet from [AF_INET]192.168.0.100:58480, sid=378c6458 3aee681f
2023-06-20 08:56:56 192.168.0.100:57771 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1179)
2023-06-20 08:56:56 192.168.0.100:57771 TLS: Initial packet from [AF_INET]192.168.0.100:57771, sid=d339ef85 586c33af
2023-06-20 08:56:56 192.168.0.100:51595 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1179)
2023-06-20 09:01:39 192.168.0.100:63530 TLS Error: TLS handshake failed
2023-06-20 09:01:39 192.168.0.100:63530 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:40 192.168.0.100:59471 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-06-20 09:01:40 192.168.0.100:59471 TLS Error: TLS handshake failed
2023-06-20 09:01:40 192.168.0.100:59471 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:40 192.168.0.100:56481 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-06-20 09:01:40 192.168.0.100:56481 TLS Error: TLS handshake failed
2023-06-20 09:01:40 192.168.0.100:56481 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:40 192.168.0.100:62373 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-06-20 09:01:40 192.168.0.100:62373 TLS Error: TLS handshake failed
2023-06-20 09:01:40 192.168.0.100:62373 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:41 192.168.0.100:62393 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-06-20 09:01:41 192.168.0.100:62393 TLS Error: TLS handshake failed
2023-06-20 09:01:41 192.168.0.100:62393 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:41 192.168.0.100:49621 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-06-20 09:01:41 192.168.0.100:49621 TLS Error: TLS handshake failed
2023-06-20 09:01:41 192.168.0.100:49621 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:41 192.168.0.100:57435 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-06-20 09:01:41 192.168.0.100:57435 TLS Error: TLS handshake failed
2023-06-20 09:01:41 192.168.0.100:57435 SIGUSR1[soft,tls-error] received, client-instance restarting
2023-06-20 09:01:52 192.168.0.100:62444 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1179)
2023-06-20 09:01:52 192.168.0.100:62444 TLS: Initial packet from [AF_INET]192.168.0.100:62444, sid=02b32b65 cb957da8
2023-06-20 09:01:52 192.168.0.100:62444 VERIFY OK: depth=1, CN=ChangeMe
2023-06-20 09:01:52 192.168.0.100:62444 VERIFY OK: depth=0, CN=test
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_VER=2.5.9
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_PLAT=mac
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_PROTO=6
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_NCP=2
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_CIPHERS=AES-256-GCM:AES-128-GCM
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_LZ4=1
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_LZ4v2=1
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_LZO=1
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_COMP_STUB=1
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_COMP_STUBv2=1
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_TCPNL=1
2023-06-20 09:01:52 192.168.0.100:62444 peer info: IV_GUI_VER="net.tunnelblick.tunnelblick_5860_4.0.0beta06__build_5860)"
2023-06-20 09:01:52 192.168.0.100:62444 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1300', remote='link-mtu 1541'
2023-06-20 09:01:52 192.168.0.100:62444 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1179', remote='tun-mtu 1500'
2023-06-20 09:01:52 192.168.0.100:62444 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
2023-06-20 09:01:52 192.168.0.100:62444 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
2023-06-20 09:01:52 192.168.0.100:62444 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-06-20 09:01:52 192.168.0.100:62444 [test] Peer Connection Initiated with [AF_INET]192.168.0.100:62444
2023-06-20 09:01:52 test/192.168.0.100:62444 MULTI_sva: pool returned IPv4=10.240.0.6, IPv6=(Not enabled)
2023-06-20 09:01:52 test/192.168.0.100:62444 MULTI: Learn: 10.240.0.6 -> test/192.168.0.100:62444
2023-06-20 09:01:52 test/192.168.0.100:62444 MULTI: primary virtual IP for test/192.168.0.100:62444: 10.240.0.6
2023-06-20 09:01:52 test/192.168.0.100:62444 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2023-06-20 09:01:52 test/192.168.0.100:62444 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2023-06-20 09:01:52 test/192.168.0.100:62444 SENT CONTROL [test]: 'PUSH_REPLY,route 10.1.0.0 255.255.255.0,dhcp-option DOMAIN-SEARCH ns1.svc.cluster.local,dhcp-option DOMAIN-SEARCH svc.cluster.local,dhcp-option DOMAIN-SEARCH cluster.local,route 10.240.0.1,topology net30,ping 10,ping-restart 600,ifconfig 10.240.0.6 10.240.0.5,peer-id 0,cipher AES-256-GCM' (status=1)