Timestamp Event Class Severity Common Name Real IP Message Source
04-07 01:53:38 Client disconnected error 62.172.67.22 62.172.67.22:34322 SIGUSR1[soft,tls-error] received, client-instance restarting Kubernetes logs
04-07 01:53:38 Tls error error 62.172.67.22 62.172.67.22:34322 Fatal TLS error (check_tls_errors_co), restarting Kubernetes logs
04-07 01:53:38 Tls error error 62.172.67.22 62.172.67.22:34322 TLS Error: TLS handshake failed Kubernetes logs
04-07 01:53:38 Tls error error 62.172.67.22 62.172.67.22:34322 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:53:25 Tls negotiation warning cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:53:25 Tls negotiation warning cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:53:25 Tls negotiation warning cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 VERIFY OK: depth=0, CN=cy-sluhn-16 Kubernetes logs
04-07 01:53:25 Tls negotiation info cy-sluhn-16 199.96.255.30 cy-sluhn-16/199.96.255.30:24554 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:53:19 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36260 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) Kubernetes logs
04-07 01:53:19 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36260 send_push_reply(): safe_cap=940 Kubernetes logs
04-07 01:53:19 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36260 PUSH: Received control message: 'PUSH_REQUEST' Kubernetes logs
04-07 01:53:17 Client connected info cy-mrcb-12 194.75.245.33 MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:36260: 10.240.0.78 Kubernetes logs
04-07 01:53:17 Client connected info cy-mrcb-12 194.75.245.33 MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:36260 Kubernetes logs
04-07 01:53:17 Virtual ip assigned info MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) Kubernetes logs
04-07 01:53:17 Duplicate common name info cy-mrcb-12 MULTI: new connection by client 'cy-mrcb-12' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Kubernetes logs
04-07 01:53:17 Client connected info cy-mrcb-12 194.75.245.33 194.75.245.33:36260 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:36260 Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:53:17 Tls negotiation warning 194.75.245.33 194.75.245.33:36260 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:53:17 Tls negotiation warning 194.75.245.33 194.75.245.33:36260 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:53:17 Tls negotiation warning 194.75.245.33 194.75.245.33:36260 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:53:17 Tls negotiation warning 194.75.245.33 194.75.245.33:36260 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:53:17 Tls negotiation info cy-mrcb-12 194.75.245.33 194.75.245.33:36260 VERIFY OK: depth=0, CN=cy-mrcb-12 Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:53:17 Tls negotiation info 194.75.245.33 194.75.245.33:36260 TLS: Initial packet from [AF_INET]194.75.245.33:36260, sid=1f773fce 77ace0e7 Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:53:16 Tls negotiation warning cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:53:16 Tls negotiation warning cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:53:16 Tls negotiation warning cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 VERIFY OK: depth=0, CN=cy-rwj-14 Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:53:16 Tls negotiation info cy-rwj-14 208.68.21.187 cy-rwj-14/208.68.21.187:57420 TLS: soft reset sec=2630 bytes=67533728/67108864 pkts=65053/0 Kubernetes logs
04-07 01:53:16 Tls negotiation info 194.75.245.33 TCP connection established with [AF_INET]194.75.245.33:36260 Kubernetes logs
04-07 01:52:48 Client disconnected error 62.172.67.92 62.172.67.92:38420 SIGUSR1[soft,tls-error] received, client-instance restarting Kubernetes logs
04-07 01:52:48 Tls error error 62.172.67.92 62.172.67.92:38420 Fatal TLS error (check_tls_errors_co), restarting Kubernetes logs
04-07 01:52:48 Tls error error 62.172.67.92 62.172.67.92:38420 TLS Error: TLS handshake failed Kubernetes logs
04-07 01:52:48 Tls error error 62.172.67.92 62.172.67.92:38420 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Kubernetes logs
04-07 01:52:38 Tls negotiation info 62.172.67.22 62.172.67.22:34322 TLS: Initial packet from [AF_INET]62.172.67.22:34322, sid=b5f03f97 367a8dd7 Kubernetes logs
04-07 01:52:38 Tls negotiation info 62.172.67.22 TCP connection established with [AF_INET]62.172.67.22:34322 Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:19 Tls negotiation warning cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:19 Tls negotiation warning cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:19 Tls negotiation warning cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 VERIFY OK: depth=0, CN=cy-numb-04 Kubernetes logs
04-07 01:52:19 Tls negotiation info cy-numb-04 194.75.245.44 cy-numb-04/194.75.245.44:42930 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:13 Tls negotiation warning cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:13 Tls negotiation warning cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:13 Tls negotiation warning cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 VERIFY OK: depth=0, CN=cy-ayar-01 Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:52:13 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 TLS: soft reset sec=0 bytes=2172341/67108864 pkts=4568/0 Kubernetes logs
04-07 01:52:12 Tls negotiation info cy-ayar-01 185.248.255.172 cy-ayar-01/185.248.255.172:60986 TLS: tls_process: killed expiring key Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36232 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36232 send_push_reply(): safe_cap=940 Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36232 PUSH: Received control message: 'PUSH_REQUEST' Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:10 Tls negotiation warning cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:10 Tls negotiation warning cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:10 Tls negotiation warning cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 VERIFY OK: depth=0, CN=cy-rwj-09 Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:52:10 Tls negotiation info cy-rwj-09 208.68.21.187 cy-rwj-09/208.68.21.187:60866 TLS: soft reset sec=2406 bytes=67286433/67108864 pkts=66433/0 Kubernetes logs
04-07 01:52:08 Client connected info cy-mrcb-12 194.75.245.33 MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:36232: 10.240.0.78 Kubernetes logs
04-07 01:52:08 Client connected info cy-mrcb-12 194.75.245.33 MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:36232 Kubernetes logs
04-07 01:52:08 Virtual ip assigned info MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) Kubernetes logs
04-07 01:52:08 Duplicate common name info cy-mrcb-12 MULTI: new connection by client 'cy-mrcb-12' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. Kubernetes logs
04-07 01:52:08 Client connected info cy-mrcb-12 194.75.245.33 194.75.245.33:36232 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:36232 Kubernetes logs
04-07 01:52:08 Tls negotiation info 194.75.245.33 194.75.245.33:36232 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:52:08 Tls negotiation warning 194.75.245.33 194.75.245.33:36232 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. Kubernetes logs
04-07 01:52:08 Tls negotiation info 194.75.245.33 194.75.245.33:36232 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:08 Tls negotiation warning 194.75.245.33 194.75.245.33:36232 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:08 Tls negotiation info 194.75.245.33 194.75.245.33:36232 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:08 Tls negotiation info 194.75.245.33 194.75.245.33:36232 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:08 Tls negotiation warning 194.75.245.33 194.75.245.33:36232 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:08 Tls negotiation info 194.75.245.33 194.75.245.33:36232 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:08 Tls negotiation warning 194.75.245.33 194.75.245.33:36232 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-mrcb-12 194.75.245.33 194.75.245.33:36232 VERIFY OK: depth=0, CN=cy-mrcb-12 Kubernetes logs
04-07 01:52:07 Tls negotiation info 194.75.245.33 194.75.245.33:36232 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:52:07 Tls negotiation info 194.75.245.33 194.75.245.33:36232 TLS: Initial packet from [AF_INET]194.75.245.33:36232, sid=bd514313 0b7a32cd Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:07 Tls negotiation warning cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:52:07 Tls negotiation warning cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:52:07 Tls negotiation warning cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 VERIFY OK: depth=0, CN=cy-rwj-18 Kubernetes logs
04-07 01:52:07 Tls negotiation info cy-rwj-18 208.68.21.187 cy-rwj-18/208.68.21.187:47642 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:52:06 Tls negotiation info 194.75.245.33 TCP connection established with [AF_INET]194.75.245.33:36232 Kubernetes logs
04-07 01:52:04 Client disconnected error 85.154.88.154 85.154.88.154:13875 SIGUSR1[soft,tls-error] received, client-instance restarting Kubernetes logs
04-07 01:52:04 Tls error error 85.154.88.154 85.154.88.154:13875 Fatal TLS error (check_tls_errors_co), restarting Kubernetes logs
04-07 01:52:04 Tls error error 85.154.88.154 85.154.88.154:13875 TLS Error: TLS handshake failed Kubernetes logs
04-07 01:52:04 Tls error error 85.154.88.154 85.154.88.154:13875 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:51:59 Tls negotiation warning cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:51:59 Tls negotiation warning cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:51:59 Tls negotiation warning cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 VERIFY OK: depth=0, CN=cy-live-01 Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:51:59 Tls negotiation info cy-live-01 209.104.34.8 cy-live-01/209.104.34.8:49942 TLS: soft reset sec=3450 bytes=78063439/67108864 pkts=249657/0 Kubernetes logs
04-07 01:51:49 Tls negotiation info 62.172.67.92 62.172.67.92:38420 TLS: Initial packet from [AF_INET]62.172.67.92:38420, sid=8a9c85b2 3b743271 Kubernetes logs
04-07 01:51:48 Tls negotiation info 62.172.67.92 TCP connection established with [AF_INET]62.172.67.92:38420 Kubernetes logs
04-07 01:51:17 Client disconnected info 82.178.166.18 82.178.166.18:47444 SIGUSR1[soft,connection-reset] received, client-instance restarting Kubernetes logs
04-07 01:51:17 Client disconnected info 82.178.166.18 82.178.166.18:47444 Connection reset, restarting [-1] Kubernetes logs
04-07 01:51:16 Tls negotiation info 82.178.166.18 TCP connection established with [AF_INET]82.178.166.18:47444 Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:51:11 Tls negotiation warning cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:51:11 Tls negotiation warning cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:51:11 Tls negotiation warning cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 VERIFY OK: depth=0, CN=cy-rwj-05 Kubernetes logs
04-07 01:51:11 Tls negotiation info cy-rwj-05 208.68.21.187 cy-rwj-05/208.68.21.187:37526 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:51:05 Tls negotiation info 85.154.88.154 85.154.88.154:13875 TLS: Initial packet from [AF_INET]85.154.88.154:13875, sid=6e1782e7 ab46faec Kubernetes logs
04-07 01:51:04 Tls negotiation info 85.154.88.154 TCP connection established with [AF_INET]85.154.88.154:13875 Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:51:03 Tls negotiation warning jaye 73.108.14.132 jaye/73.108.14.132:41616 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:51:03 Tls negotiation warning jaye 73.108.14.132 jaye/73.108.14.132:41616 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:51:03 Tls negotiation warning jaye 73.108.14.132 jaye/73.108.14.132:41616 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 VERIFY OK: depth=0, CN=jaye Kubernetes logs
04-07 01:51:03 Tls negotiation info jaye 73.108.14.132 jaye/73.108.14.132:41616 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:51:01 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36198 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) Kubernetes logs
04-07 01:51:01 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36198 send_push_reply(): safe_cap=940 Kubernetes logs
04-07 01:51:01 Tls negotiation info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36198 PUSH: Received control message: 'PUSH_REQUEST' Kubernetes logs
04-07 01:50:59 Client connected info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36198 MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:36198: 10.240.0.78 Kubernetes logs
04-07 01:50:59 Client connected info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36198 MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:36198 Kubernetes logs
04-07 01:50:59 Virtual ip assigned info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36198 MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) Kubernetes logs
04-07 01:50:59 Client connected info cy-mrcb-12 194.75.245.33 194.75.245.33:36198 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:36198 Kubernetes logs
04-07 01:50:59 Tls negotiation info 194.75.245.33 194.75.245.33:36198 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:50:59 Tls negotiation warning 194.75.245.33 194.75.245.33:36198 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. Kubernetes logs
04-07 01:50:59 Tls negotiation info 194.75.245.33 194.75.245.33:36198 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:50:59 Tls negotiation warning 194.75.245.33 194.75.245.33:36198 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:50:59 Tls negotiation info 194.75.245.33 194.75.245.33:36198 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:50:59 Tls negotiation info 194.75.245.33 194.75.245.33:36198 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:50:59 Tls negotiation warning 194.75.245.33 194.75.245.33:36198 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:50:59 Tls negotiation info 194.75.245.33 194.75.245.33:36198 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:50:59 Tls negotiation warning 194.75.245.33 194.75.245.33:36198 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:50:58 Tls negotiation info cy-mrcb-12 194.75.245.33 194.75.245.33:36198 VERIFY OK: depth=0, CN=cy-mrcb-12 Kubernetes logs
04-07 01:50:58 Tls negotiation info 194.75.245.33 194.75.245.33:36198 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:50:58 Tls negotiation info 194.75.245.33 194.75.245.33:36198 TLS: Initial packet from [AF_INET]194.75.245.33:36198, sid=136f05a6 35303785 Kubernetes logs
04-07 01:50:57 Tls negotiation info 194.75.245.33 TCP connection established with [AF_INET]194.75.245.33:36198 Kubernetes logs
04-07 01:50:52 Client disconnected info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36166 SIGUSR1[soft,connection-reset] received, client-instance restarting Kubernetes logs
04-07 01:50:52 Client disconnected info cy-mrcb-12 194.75.245.33 cy-mrcb-12/194.75.245.33:36166 Connection reset, restarting [0] Kubernetes logs
04-07 01:50:35 Client disconnected error 96.9.130.82 96.9.130.82:7600 SIGUSR1[soft,tls-error] received, client-instance restarting Kubernetes logs
04-07 01:50:35 Tls error error 96.9.130.82 96.9.130.82:7600 Fatal TLS error (check_tls_errors_co), restarting Kubernetes logs
04-07 01:50:35 Tls error error 96.9.130.82 96.9.130.82:7600 TLS Error: TLS handshake failed Kubernetes logs
04-07 01:50:35 Tls error error 96.9.130.82 96.9.130.82:7600 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:50:31 Tls negotiation warning cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:50:31 Tls negotiation warning cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:50:31 Tls negotiation warning cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 VERIFY OK: depth=0, CN=cy-bvhs-02 Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 VERIFY OK: depth=1, CN=ca\\n Kubernetes logs
04-07 01:50:31 Tls negotiation info cy-bvhs-02 24.52.86.170 cy-bvhs-02/24.52.86.170:27049 TLS: soft reset sec=2764 bytes=67818073/67108864 pkts=64824/0 Kubernetes logs
04-07 01:50:10 Tls negotiation info cy-keck-09 63.247.1.238 cy-keck-09/63.247.1.238:34071 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Kubernetes logs
04-07 01:50:09 Tls negotiation info cy-keck-09 63.247.1.238 cy-keck-09/63.247.1.238:34071 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs
04-07 01:50:09 Tls negotiation warning cy-keck-09 63.247.1.238 cy-keck-09/63.247.1.238:34071 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Kubernetes logs
04-07 01:50:09 Tls negotiation info cy-keck-09 63.247.1.238 cy-keck-09/63.247.1.238:34071 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Kubernetes logs
04-07 01:50:09 Tls negotiation info cy-keck-09 63.247.1.238 cy-keck-09/63.247.1.238:34071 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Kubernetes logs