VPN Logs
200 log entries
| Timestamp | Event Class | Severity | Common Name | Real IP | Message | Source |
|---|---|---|---|---|---|---|
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | warning | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | warning | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | warning | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 VERIFY OK: depth=0, CN=cy-derb-02 | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:58 | Tls negotiation | info | cy-derb-02 | 208.127.199.211 | cy-derb-02/208.127.199.211:34516 TLS: soft reset sec=0 bytes=350924/67108864 pkts=1161/0 | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | warning | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | warning | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | warning | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | warning | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | warning | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | warning | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 VERIFY OK: depth=0, CN=cy-ggcl-01 | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-ggcl-01 | 86.28.80.75 | cy-ggcl-01/86.28.80.75:46244 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 VERIFY OK: depth=0, CN=cy-bpth-02 | Kubernetes logs |
| 04-06 21:55:57 | Tls negotiation | info | cy-bpth-02 | 208.127.192.26 | cy-bpth-02/208.127.192.26:34929 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | warning | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | warning | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | warning | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 VERIFY OK: depth=0, CN=cy-brad-01 | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:54 | Tls negotiation | info | cy-brad-01 | 213.146.148.135 | cy-brad-01/213.146.148.135:25229 TLS: soft reset sec=0 bytes=2366004/67108864 pkts=4875/0 | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | warning | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | warning | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | warning | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 VERIFY OK: depth=0, CN=cy-impl-03 | Kubernetes logs |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:53 | Client disconnected | error | 85.154.88.154 | 85.154.88.154:65451 SIGUSR1[soft,tls-error] received, client-instance restarting | Kubernetes logs | |
| 04-06 21:55:53 | Tls error | error | 85.154.88.154 | 85.154.88.154:65451 Fatal TLS error (check_tls_errors_co), restarting | Kubernetes logs | |
| 04-06 21:55:53 | Tls error | error | 85.154.88.154 | 85.154.88.154:65451 TLS Error: TLS handshake failed | Kubernetes logs | |
| 04-06 21:55:53 | Tls error | error | 85.154.88.154 | 85.154.88.154:65451 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | Kubernetes logs | |
| 04-06 21:55:53 | Tls negotiation | info | cy-impl-03 | 193.39.80.21 | cy-impl-03/193.39.80.21:9249 TLS: soft reset sec=-1 bytes=2441571/67108864 pkts=5133/0 | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | warning | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | warning | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | warning | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 VERIFY OK: depth=0, CN=cy-dgsc-01 | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:51 | Tls negotiation | info | cy-dgsc-01 | 81.145.194.98 | cy-dgsc-01/81.145.194.98:38288 TLS: soft reset sec=0 bytes=2366858/67108864 pkts=5154/0 | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | warning | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | warning | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | warning | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | warning | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | warning | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | warning | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 VERIFY OK: depth=0, CN=cy-dgft-01 | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 VERIFY OK: depth=0, CN=cy-cwft-02 | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:56764 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:56764 send_push_reply(): safe_cap=940 | Kubernetes logs |
| 04-06 21:55:50 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:56764 PUSH: Received control message: 'PUSH_REQUEST' | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | warning | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 VERIFY OK: depth=0, CN=cy-bord-01 | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 VERIFY OK: depth=0, CN=cy-shnd-01 | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 VERIFY OK: depth=0, CN=cy-ulhn-08 | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-dgft-01 | 208.127.199.140 | cy-dgft-01/208.127.199.140:4318 TLS: tls_process: killed expiring key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-bord-01 | 62.172.67.19 | cy-bord-01/62.172.67.19:41928 TLS: soft reset sec=0 bytes=2107477/67108864 pkts=4705/0 | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-cwft-02 | 208.127.199.157 | cy-cwft-02/208.127.199.157:18419 TLS: tls_process: killed expiring key | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-ulhn-08 | 208.127.197.214 | cy-ulhn-08/208.127.197.214:30993 TLS: soft reset sec=-1 bytes=1965372/67108864 pkts=4241/0 | Kubernetes logs |
| 04-06 21:55:49 | Tls negotiation | info | cy-shnd-01 | 62.172.67.18 | cy-shnd-01/62.172.67.18:53908 TLS: soft reset sec=0 bytes=2222729/67108864 pkts=4849/0 | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 VERIFY OK: depth=0, CN=cy-ulhn-01 | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-ulhn-01 | 208.127.197.209 | cy-ulhn-01/208.127.197.209:25255 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 VERIFY OK: depth=0, CN=cy-cwft-01 | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | warning | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 VERIFY OK: depth=0, CN=cy-eshh-03 | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-eshh-03 | 208.127.199.160 | cy-eshh-03/208.127.199.160:51554 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 VERIFY OK: depth=0, CN=cy-etsx-05 | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:48 | Tls negotiation | info | cy-cwft-01 | 208.127.193.202 | cy-cwft-01/208.127.193.202:57281 TLS: soft reset sec=0 bytes=2347331/67108864 pkts=5079/0 | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:47 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:56764: 10.240.0.78 | Kubernetes logs |
| 04-06 21:55:47 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:56764 | Kubernetes logs |
| 04-06 21:55:47 | Virtual ip assigned | info | MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) | Kubernetes logs | ||
| 04-06 21:55:47 | Duplicate common name | info | cy-mrcb-12 | MULTI: new connection by client 'cy-mrcb-12' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. | Kubernetes logs | |
| 04-06 21:55:47 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:56764 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:56764 | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | warning | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | warning | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | warning | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-etsx-05 | 208.127.197.122 | cy-etsx-05/208.127.197.122:18921 TLS: tls_process: killed expiring key | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:56764 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:56764 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:56764 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:56764 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 VERIFY OK: depth=0, CN=cy-west-01 | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:56764 VERIFY OK: depth=0, CN=cy-mrcb-12 | Kubernetes logs |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:56764 TLS: Initial packet from [AF_INET]194.75.245.33:56764, sid=a443db70 af9f9e7f | Kubernetes logs | |
| 04-06 21:55:47 | Tls negotiation | info | cy-west-01 | 62.172.67.16 | cy-west-01/62.172.67.16:40226 TLS: soft reset sec=0 bytes=2216963/67108864 pkts=4893/0 | Kubernetes logs |
| 04-06 21:55:46 | Tls negotiation | info | cy-ulhn-04 | 208.127.197.207 | cy-ulhn-04/208.127.197.207:27981 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:46 | Tls negotiation | info | cy-nhs-01 | 137.221.156.103 | cy-nhs-01/137.221.156.103:41160 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-06 21:55:46 | Tls negotiation | info | cy-ulhn-04 | 208.127.197.207 | cy-ulhn-04/208.127.197.207:27981 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-06 21:55:46 | Tls negotiation | warning | cy-ulhn-04 | 208.127.197.207 | cy-ulhn-04/208.127.197.207:27981 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |