VPN Logs
200 log entries
| Timestamp | Event Class | Severity | Common Name | Real IP | Message | Source |
|---|---|---|---|---|---|---|
| 04-07 01:53:38 | Client disconnected | error | 62.172.67.22 | 62.172.67.22:34322 SIGUSR1[soft,tls-error] received, client-instance restarting | Kubernetes logs | |
| 04-07 01:53:38 | Tls error | error | 62.172.67.22 | 62.172.67.22:34322 Fatal TLS error (check_tls_errors_co), restarting | Kubernetes logs | |
| 04-07 01:53:38 | Tls error | error | 62.172.67.22 | 62.172.67.22:34322 TLS Error: TLS handshake failed | Kubernetes logs | |
| 04-07 01:53:38 | Tls error | error | 62.172.67.22 | 62.172.67.22:34322 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | Kubernetes logs | |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | warning | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | warning | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | warning | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 VERIFY OK: depth=0, CN=cy-sluhn-16 | Kubernetes logs |
| 04-07 01:53:25 | Tls negotiation | info | cy-sluhn-16 | 199.96.255.30 | cy-sluhn-16/199.96.255.30:24554 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:53:19 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36260 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) | Kubernetes logs |
| 04-07 01:53:19 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36260 send_push_reply(): safe_cap=940 | Kubernetes logs |
| 04-07 01:53:19 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36260 PUSH: Received control message: 'PUSH_REQUEST' | Kubernetes logs |
| 04-07 01:53:17 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:36260: 10.240.0.78 | Kubernetes logs |
| 04-07 01:53:17 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:36260 | Kubernetes logs |
| 04-07 01:53:17 | Virtual ip assigned | info | MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) | Kubernetes logs | ||
| 04-07 01:53:17 | Duplicate common name | info | cy-mrcb-12 | MULTI: new connection by client 'cy-mrcb-12' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. | Kubernetes logs | |
| 04-07 01:53:17 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:36260 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:36260 | Kubernetes logs |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36260 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36260 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36260 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36260 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:36260 VERIFY OK: depth=0, CN=cy-mrcb-12 | Kubernetes logs |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs | |
| 04-07 01:53:17 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36260 TLS: Initial packet from [AF_INET]194.75.245.33:36260, sid=1f773fce 77ace0e7 | Kubernetes logs | |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | warning | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | warning | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | warning | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 VERIFY OK: depth=0, CN=cy-rwj-14 | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | cy-rwj-14 | 208.68.21.187 | cy-rwj-14/208.68.21.187:57420 TLS: soft reset sec=2630 bytes=67533728/67108864 pkts=65053/0 | Kubernetes logs |
| 04-07 01:53:16 | Tls negotiation | info | 194.75.245.33 | TCP connection established with [AF_INET]194.75.245.33:36260 | Kubernetes logs | |
| 04-07 01:52:48 | Client disconnected | error | 62.172.67.92 | 62.172.67.92:38420 SIGUSR1[soft,tls-error] received, client-instance restarting | Kubernetes logs | |
| 04-07 01:52:48 | Tls error | error | 62.172.67.92 | 62.172.67.92:38420 Fatal TLS error (check_tls_errors_co), restarting | Kubernetes logs | |
| 04-07 01:52:48 | Tls error | error | 62.172.67.92 | 62.172.67.92:38420 TLS Error: TLS handshake failed | Kubernetes logs | |
| 04-07 01:52:48 | Tls error | error | 62.172.67.92 | 62.172.67.92:38420 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | Kubernetes logs | |
| 04-07 01:52:38 | Tls negotiation | info | 62.172.67.22 | 62.172.67.22:34322 TLS: Initial packet from [AF_INET]62.172.67.22:34322, sid=b5f03f97 367a8dd7 | Kubernetes logs | |
| 04-07 01:52:38 | Tls negotiation | info | 62.172.67.22 | TCP connection established with [AF_INET]62.172.67.22:34322 | Kubernetes logs | |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | warning | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | warning | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | warning | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 VERIFY OK: depth=0, CN=cy-numb-04 | Kubernetes logs |
| 04-07 01:52:19 | Tls negotiation | info | cy-numb-04 | 194.75.245.44 | cy-numb-04/194.75.245.44:42930 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | warning | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | warning | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | warning | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 VERIFY OK: depth=0, CN=cy-ayar-01 | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:52:13 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 TLS: soft reset sec=0 bytes=2172341/67108864 pkts=4568/0 | Kubernetes logs |
| 04-07 01:52:12 | Tls negotiation | info | cy-ayar-01 | 185.248.255.172 | cy-ayar-01/185.248.255.172:60986 TLS: tls_process: killed expiring key | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36232 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36232 send_push_reply(): safe_cap=940 | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36232 PUSH: Received control message: 'PUSH_REQUEST' | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | warning | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | warning | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | warning | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 VERIFY OK: depth=0, CN=cy-rwj-09 | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:52:10 | Tls negotiation | info | cy-rwj-09 | 208.68.21.187 | cy-rwj-09/208.68.21.187:60866 TLS: soft reset sec=2406 bytes=67286433/67108864 pkts=66433/0 | Kubernetes logs |
| 04-07 01:52:08 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:36232: 10.240.0.78 | Kubernetes logs |
| 04-07 01:52:08 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:36232 | Kubernetes logs |
| 04-07 01:52:08 | Virtual ip assigned | info | MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) | Kubernetes logs | ||
| 04-07 01:52:08 | Duplicate common name | info | cy-mrcb-12 | MULTI: new connection by client 'cy-mrcb-12' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect. | Kubernetes logs | |
| 04-07 01:52:08 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:36232 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:36232 | Kubernetes logs |
| 04-07 01:52:08 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36232 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36232 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36232 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-07 01:52:08 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36232 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs | |
| 04-07 01:52:07 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:36232 VERIFY OK: depth=0, CN=cy-mrcb-12 | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs | |
| 04-07 01:52:07 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36232 TLS: Initial packet from [AF_INET]194.75.245.33:36232, sid=bd514313 0b7a32cd | Kubernetes logs | |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | warning | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | warning | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | warning | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 VERIFY OK: depth=0, CN=cy-rwj-18 | Kubernetes logs |
| 04-07 01:52:07 | Tls negotiation | info | cy-rwj-18 | 208.68.21.187 | cy-rwj-18/208.68.21.187:47642 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:52:06 | Tls negotiation | info | 194.75.245.33 | TCP connection established with [AF_INET]194.75.245.33:36232 | Kubernetes logs | |
| 04-07 01:52:04 | Client disconnected | error | 85.154.88.154 | 85.154.88.154:13875 SIGUSR1[soft,tls-error] received, client-instance restarting | Kubernetes logs | |
| 04-07 01:52:04 | Tls error | error | 85.154.88.154 | 85.154.88.154:13875 Fatal TLS error (check_tls_errors_co), restarting | Kubernetes logs | |
| 04-07 01:52:04 | Tls error | error | 85.154.88.154 | 85.154.88.154:13875 TLS Error: TLS handshake failed | Kubernetes logs | |
| 04-07 01:52:04 | Tls error | error | 85.154.88.154 | 85.154.88.154:13875 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | Kubernetes logs | |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | warning | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | warning | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | warning | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 VERIFY OK: depth=0, CN=cy-live-01 | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:51:59 | Tls negotiation | info | cy-live-01 | 209.104.34.8 | cy-live-01/209.104.34.8:49942 TLS: soft reset sec=3450 bytes=78063439/67108864 pkts=249657/0 | Kubernetes logs |
| 04-07 01:51:49 | Tls negotiation | info | 62.172.67.92 | 62.172.67.92:38420 TLS: Initial packet from [AF_INET]62.172.67.92:38420, sid=8a9c85b2 3b743271 | Kubernetes logs | |
| 04-07 01:51:48 | Tls negotiation | info | 62.172.67.92 | TCP connection established with [AF_INET]62.172.67.92:38420 | Kubernetes logs | |
| 04-07 01:51:17 | Client disconnected | info | 82.178.166.18 | 82.178.166.18:47444 SIGUSR1[soft,connection-reset] received, client-instance restarting | Kubernetes logs | |
| 04-07 01:51:17 | Client disconnected | info | 82.178.166.18 | 82.178.166.18:47444 Connection reset, restarting [-1] | Kubernetes logs | |
| 04-07 01:51:16 | Tls negotiation | info | 82.178.166.18 | TCP connection established with [AF_INET]82.178.166.18:47444 | Kubernetes logs | |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | warning | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | warning | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | warning | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 VERIFY OK: depth=0, CN=cy-rwj-05 | Kubernetes logs |
| 04-07 01:51:11 | Tls negotiation | info | cy-rwj-05 | 208.68.21.187 | cy-rwj-05/208.68.21.187:37526 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:51:05 | Tls negotiation | info | 85.154.88.154 | 85.154.88.154:13875 TLS: Initial packet from [AF_INET]85.154.88.154:13875, sid=6e1782e7 ab46faec | Kubernetes logs | |
| 04-07 01:51:04 | Tls negotiation | info | 85.154.88.154 | TCP connection established with [AF_INET]85.154.88.154:13875 | Kubernetes logs | |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | warning | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | warning | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | warning | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 VERIFY OK: depth=0, CN=jaye | Kubernetes logs |
| 04-07 01:51:03 | Tls negotiation | info | jaye | 73.108.14.132 | jaye/73.108.14.132:41616 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:51:01 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36198 SENT CONTROL [cy-mrcb-12]: 'PUSH_REPLY,route 10.20.1.0 255.255.240.0,route 10.23.240.10 255.255.255.255,route 10.240.0.0 255.255.0.0,dhcp-option DOMAIN vpn.svc.cluster.local svc.cluster.local cluster.local c.cylera-infra.internal google.internal,dhcp-option DNS 10.23.240.10,route 10.240.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.240.0.78 10.240.0.77' (status=1) | Kubernetes logs |
| 04-07 01:51:01 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36198 send_push_reply(): safe_cap=940 | Kubernetes logs |
| 04-07 01:51:01 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36198 PUSH: Received control message: 'PUSH_REQUEST' | Kubernetes logs |
| 04-07 01:50:59 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36198 MULTI: primary virtual IP for cy-mrcb-12/194.75.245.33:36198: 10.240.0.78 | Kubernetes logs |
| 04-07 01:50:59 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36198 MULTI: Learn: 10.240.0.78 -> cy-mrcb-12/194.75.245.33:36198 | Kubernetes logs |
| 04-07 01:50:59 | Virtual ip assigned | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36198 MULTI_sva: pool returned IPv4=10.240.0.78, IPv6=(Not enabled) | Kubernetes logs |
| 04-07 01:50:59 | Client connected | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:36198 [cy-mrcb-12] Peer Connection Initiated with [AF_INET]194.75.245.33:36198 | Kubernetes logs |
| 04-07 01:50:59 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36198 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks. | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36198 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36198 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs | |
| 04-07 01:50:59 | Tls negotiation | warning | 194.75.245.33 | 194.75.245.33:36198 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs | |
| 04-07 01:50:58 | Tls negotiation | info | cy-mrcb-12 | 194.75.245.33 | 194.75.245.33:36198 VERIFY OK: depth=0, CN=cy-mrcb-12 | Kubernetes logs |
| 04-07 01:50:58 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs | |
| 04-07 01:50:58 | Tls negotiation | info | 194.75.245.33 | 194.75.245.33:36198 TLS: Initial packet from [AF_INET]194.75.245.33:36198, sid=136f05a6 35303785 | Kubernetes logs | |
| 04-07 01:50:57 | Tls negotiation | info | 194.75.245.33 | TCP connection established with [AF_INET]194.75.245.33:36198 | Kubernetes logs | |
| 04-07 01:50:52 | Client disconnected | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36166 SIGUSR1[soft,connection-reset] received, client-instance restarting | Kubernetes logs |
| 04-07 01:50:52 | Client disconnected | info | cy-mrcb-12 | 194.75.245.33 | cy-mrcb-12/194.75.245.33:36166 Connection reset, restarting [0] | Kubernetes logs |
| 04-07 01:50:35 | Client disconnected | error | 96.9.130.82 | 96.9.130.82:7600 SIGUSR1[soft,tls-error] received, client-instance restarting | Kubernetes logs | |
| 04-07 01:50:35 | Tls error | error | 96.9.130.82 | 96.9.130.82:7600 Fatal TLS error (check_tls_errors_co), restarting | Kubernetes logs | |
| 04-07 01:50:35 | Tls error | error | 96.9.130.82 | 96.9.130.82:7600 TLS Error: TLS handshake failed | Kubernetes logs | |
| 04-07 01:50:35 | Tls error | error | 96.9.130.82 | 96.9.130.82:7600 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | Kubernetes logs | |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | warning | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | warning | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | warning | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 WARNING: 'keydir' is present in local config but missing in remote config, local='keydir 1' | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 VERIFY OK: depth=0, CN=cy-bvhs-02 | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 VERIFY OK: depth=1, CN=ca\\n | Kubernetes logs |
| 04-07 01:50:31 | Tls negotiation | info | cy-bvhs-02 | 24.52.86.170 | cy-bvhs-02/24.52.86.170:27049 TLS: soft reset sec=2764 bytes=67818073/67108864 pkts=64824/0 | Kubernetes logs |
| 04-07 01:50:10 | Tls negotiation | info | cy-keck-09 | 63.247.1.238 | cy-keck-09/63.247.1.238:34071 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA | Kubernetes logs |
| 04-07 01:50:09 | Tls negotiation | info | cy-keck-09 | 63.247.1.238 | cy-keck-09/63.247.1.238:34071 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |
| 04-07 01:50:09 | Tls negotiation | warning | cy-keck-09 | 63.247.1.238 | cy-keck-09/63.247.1.238:34071 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). | Kubernetes logs |
| 04-07 01:50:09 | Tls negotiation | info | cy-keck-09 | 63.247.1.238 | cy-keck-09/63.247.1.238:34071 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | Kubernetes logs |
| 04-07 01:50:09 | Tls negotiation | info | cy-keck-09 | 63.247.1.238 | cy-keck-09/63.247.1.238:34071 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | Kubernetes logs |