Hi Flygarn12,
Yes have public IP (router hosts exim smtp + dovecot pop3s also).
I ran dmesg on client and looked in ~/.openVPN and can't see a log file for client.
Perhaps because its Ubuntu using Network Manager, its in another location (which I will google shortly).
But I decided to run openvpn from the cli to get stdout and have some more interesting results. Including a successful connection!
Client output below
Failed - Connecting to WAN IP (while on the WiFi connection which is provided by the router OpenVPN runs on).
2023-05-02 10:57:30 us=919620 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-05-02 10:57:30 us=919634 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
🔐 Enter Private Key Password: ***********
2023-05-02 10:57:39 us=106108 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 10:57:39 us=106153 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 10:57:39 us=106175 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 10:57:39 us=106196 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 10:57:39 us=106341 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2023-05-02 10:57:39 us=541601 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 AF:14/121 ]
2023-05-02 10:57:39 us=541683 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-client'
2023-05-02 10:57:39 us=541704 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-server'
2023-05-02 10:57:39 us=541944 TCP/UDP: Preserving recently used remote address: [AF_INET]9.9.9.9(actual ip redacted):1914
2023-05-02 10:57:39 us=541986 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-05-02 10:57:39 us=542005 UDP link local: (not bound)
2023-05-02 10:57:39 us=542030 UDP link remote: [AF_INET]9.9.9.9(actual ip redacted):1914
2023-05-02 10:57:39 us=542049 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
2023-05-02 10:57:39 us=542134 UDP WRITE [54] to [AF_INET]9.9.9.9(actual ip redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=356 DATA len=40
2023-05-02 10:57:39 us=545157 UDP READ [66] from [AF_INET]192.168.1.1:1914: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ ] pid=356 DATA len=52
2023-05-02 10:57:39 us=545196 TCP/UDP: Incoming packet rejected from [AF_INET]192.168.1.1:1914[2], expected peer address: [AF_INET]9.9.9.9(actual ip redacted):1914 (allow this incoming source address/port by removing --remote or adding --float)
2023-05-02 10:57:41 us=551374 UDP WRITE [54] to [AF_INET]9.9.9.9(actual ip redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=612 DATA len=40
2023-05-02 10:57:41 us=553868 UDP READ [66] from [AF_INET]192.168.1.1:1914: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ ] pid=612 DATA len=52
2023-05-02 10:57:41 us=553906 TCP/UDP: Incoming packet rejected from [AF_INET]192.168.1.1:1914[2], expected peer address: [AF_INET]9.9.9.9(actual ip redacted):1914 (allow this incoming source address/port by removing --remote or adding --float)
2023-05-02 10:57:45 us=566142 UDP WRITE [54] to [AF_INET]9.9.9.9(actual ip redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=868 DATA len=40
2023-05-02 10:57:45 us=568718 UDP READ [66] from [AF_INET]192.168.1.1:1914: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ ] pid=868 DATA len=52
2023-05-02 10:57:45 us=568755 TCP/UDP: Incoming packet rejected from [AF_INET]192.168.1.1:1914[2], expected peer address: [AF_INET]9.9.9.9(actual ip redacted):1914 (allow this incoming source address/port by removing --remote or adding --float)
Worked - Connecting to WAN IP (while using 4g mobile tethered to same ubuntu client that failed above).
2023-05-02 11:03:20 us=6581 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-05-02 11:03:20 us=6595 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
🔐 Enter Private Key Password: ***********
2023-05-02 11:03:25 us=441988 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 11:03:25 us=442044 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 11:03:25 us=442074 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 11:03:25 us=442103 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 11:03:25 us=442252 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2023-05-02 11:03:25 us=481589 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 AF:14/121 ]
2023-05-02 11:03:25 us=481636 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-client'
2023-05-02 11:03:25 us=481649 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-server'
2023-05-02 11:03:25 us=481795 TCP/UDP: Preserving recently used remote address: [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914
2023-05-02 11:03:25 us=481825 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-05-02 11:03:25 us=481835 UDP link local: (not bound)
2023-05-02 11:03:25 us=481845 UDP link remote: [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914
2023-05-02 11:03:25 us=481856 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
2023-05-02 11:03:25 us=481917 UDP WRITE [54] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=356 DATA len=40
2023-05-02 11:03:25 us=504368 UDP READ [66] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ ] pid=356 DATA len=52
2023-05-02 11:03:25 us=504395 TLS: Initial packet from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914, sid=c6753d6b e8c13cc9
2023-05-02 11:03:25 us=504438 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=504504 UDP WRITE [275] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=868 DATA len=261
2023-05-02 11:03:25 us=541445 UDP READ [1128] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=612 DATA len=1114
2023-05-02 11:03:25 us=541750 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=541799 UDP READ [1116] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=868 DATA len=1102
2023-05-02 11:03:25 us=541825 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=541853 UDP READ [1116] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=1124 DATA len=1102
2023-05-02 11:03:25 us=541875 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=541902 UDP READ [1116] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=1380 DATA len=1102
2023-05-02 11:03:25 us=543042 VERIFY OK: depth=1, C=UK, ST=zzzz, L=zzzz, O=MyDomain, OU=My Organizational Unit, CN=365VPN, emailAddress=postmaster@MyDomain.uk
2023-05-02 11:03:25 us=543295 VERIFY KU OK
2023-05-02 11:03:25 us=543305 Validating certificate extended key usage
2023-05-02 11:03:25 us=543310 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
2023-05-02 11:03:25 us=543316 VERIFY EKU OK
2023-05-02 11:03:25 us=543321 VERIFY OK: depth=0, C=UK, ST=zzzz, L=zzzz, O=MyDomain, OU=My Organizational Unit, CN=365VPN, emailAddress=postmaster@MyDomain.uk
2023-05-02 11:03:25 us=543348 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=564302 UDP READ [507] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=1636 DATA len=493
2023-05-02 11:03:25 us=573944 UDP WRITE [1128] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=2148 DATA len=1114
2023-05-02 11:03:25 us=574007 UDP WRITE [1116] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=2404 DATA len=1102
2023-05-02 11:03:25 us=574040 UDP WRITE [1116] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=2660 DATA len=1102
2023-05-02 11:03:25 us=574070 UDP WRITE [1116] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=2916 DATA len=1102
2023-05-02 11:03:25 us=606298 UDP READ [62] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=606360 UDP WRITE [493] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=3172 DATA len=479
2023-05-02 11:03:25 us=606408 UDP READ [62] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=613310 UDP READ [62] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=615290 UDP READ [62] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=636290 UDP READ [224] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=2916 DATA len=210
2023-05-02 11:03:25 us=636442 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=636490 UDP READ [256] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=3172 DATA len=242
2023-05-02 11:03:25 us=636527 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:03:25 us=636555 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
2023-05-02 11:03:25 us=636571 [365VPN] Peer Connection Initiated with [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914
2023-05-02 11:03:25 us=663316 UDP READ [266] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_CONTROL_V1 kid=0 [ ] pid=3428 DATA len=252
2023-05-02 11:03:25 us=663380 PUSH: Received control message: 'PUSH_REPLY,route 192.168.33.0 255.255.255.0,inactive 7200 500000,route-gateway 10.3.3.1,topology subnet,ping 38,ping-restart 160,ifconfig 10.3.3.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
2023-05-02 11:03:25 us=663429 OPTIONS IMPORT: timers and/or timeouts modified
2023-05-02 11:03:25 us=663438 OPTIONS IMPORT: --ifconfig/up options modified
2023-05-02 11:03:25 us=663443 OPTIONS IMPORT: route options modified
2023-05-02 11:03:25 us=663448 OPTIONS IMPORT: route-related options modified
2023-05-02 11:03:25 us=663453 OPTIONS IMPORT: peer-id set
2023-05-02 11:03:25 us=663457 OPTIONS IMPORT: adjusting link_mtu to 1624
2023-05-02 11:03:25 us=663462 OPTIONS IMPORT: data channel crypto options modified
2023-05-02 11:03:25 us=663468 Data Channel: using negotiated cipher 'AES-256-GCM'
2023-05-02 11:03:25 us=663485 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 AF:14/121 ]
2023-05-02 11:03:25 us=663552 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2023-05-02 11:03:25 us=663561 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
2023-05-02 11:03:25 us=663578 net_route_v4_best_gw query: dst 0.0.0.0
2023-05-02 11:03:25 us=663631 sitnl_send: checking for received messages
2023-05-02 11:03:25 us=663644 sitnl_send: rtnl: received 848 bytes
2023-05-02 11:03:25 us=663667 net_route_v4_best_gw result: via 192.168.188.231 dev usb0
2023-05-02 11:03:25 us=663695 ROUTE_GATEWAY 192.168.188.231/255.255.255.0 IFACE=usb0 HWADDR=redacted
2023-05-02 11:03:25 us=663952 TUN/TAP device tun0 opened
2023-05-02 11:03:25 us=663970 do_ifconfig, ipv4=1, ipv6=0
2023-05-02 11:03:25 us=663992 net_iface_mtu_set: mtu 1500 for tun0
2023-05-02 11:03:25 us=664016 sitnl_send: checking for received messages
2023-05-02 11:03:25 us=664028 sitnl_send: rtnl: received 36 bytes
2023-05-02 11:03:25 us=664048 net_iface_up: set tun0 up
2023-05-02 11:03:25 us=664131 sitnl_send: checking for received messages
2023-05-02 11:03:25 us=664146 sitnl_send: rtnl: received 36 bytes
2023-05-02 11:03:25 us=664160 net_addr_v4_add: 10.3.3.2/24 dev tun0
2023-05-02 11:03:25 us=664262 sitnl_send: checking for received messages
2023-05-02 11:03:25 us=664276 sitnl_send: rtnl: received 36 bytes
2023-05-02 11:03:25 us=664300 net_route_v4_add: 192.168.33.0/24 via 10.3.3.1 dev [NULL] table 0 metric -1
2023-05-02 11:03:25 us=664335 sitnl_send: checking for received messages
2023-05-02 11:03:25 us=664346 sitnl_send: rtnl: received 36 bytes
2023-05-02 11:03:25 us=664365 GID set to nm-openvpn
2023-05-02 11:03:25 us=664380 UID set to nm-openvpn
2023-05-02 11:03:25 us=664398 Initialization Sequence Completed
2023-05-02 11:03:25 us=664416 UDP WRITE [62] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_ACK_V1 kid=0 [ ]
2023-05-02 11:04:03 us=633053 UDP READ [40] from [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_DATA_V2 kid=0 DATA len=39
2023-05-02 11:04:03 us=633135 UDP WRITE [40] to [AF_INET6]aa:aa::aa:aa(ip6 redacted):1914: P_DATA_V2 kid=0 DATA len=39
Failed - Having changed both the OpenVPN server.conf and client.conf files to use proto UDP4 instead of proto UDP (to try and stipulate IPv4 only):
2023-05-02 11:19:03 us=71286 OpenVPN 2.5.5 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 14 2022
2023-05-02 11:19:03 us=71296 library versions: OpenSSL 3.0.2 15 Mar 2022, LZO 2.10
🔐 Enter Private Key Password: ***********
2023-05-02 11:19:10 us=426829 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 11:19:10 us=426872 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 11:19:10 us=426891 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 11:19:10 us=426926 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 11:19:10 us=427106 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2023-05-02 11:19:10 us=433420 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 AF:14/121 ]
2023-05-02 11:19:10 us=433472 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-client'
2023-05-02 11:19:10 us=433493 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-server'
2023-05-02 11:19:10 us=433606 TCP/UDP: Preserving recently used remote address: [AF_INET]9.9.9.9(ipv4 redacted):1914
2023-05-02 11:19:10 us=433621 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-05-02 11:19:10 us=433628 UDPv4 link local: (not bound)
2023-05-02 11:19:10 us=433633 UDPv4 link remote: [AF_INET]9.9.9.9(ipv4 redacted):1914
2023-05-02 11:19:10 us=433638 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
2023-05-02 11:19:10 us=433675 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=356 DATA len=40
2023-05-02 11:19:12 us=518105 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=612 DATA len=40
2023-05-02 11:19:16 us=686624 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=868 DATA len=40
2023-05-02 11:19:24 us=533332 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=1124 DATA len=40
2023-05-02 11:19:40 us=196450 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=1380 DATA len=40
2023-05-02 11:20:10 us=920190 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
2023-05-02 11:20:10 us=920234 TLS Error: TLS handshake failed
2023-05-02 11:20:10 us=920362 TCP/UDP: Closing socket
2023-05-02 11:20:10 us=920398 SIGUSR1[soft,tls-error] received, process restarting
2023-05-02 11:20:10 us=920424 Restart pause, 5 second(s)
2023-05-02 11:20:15 us=920537 Re-using SSL/TLS context
2023-05-02 11:20:15 us=920682 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 11:20:15 us=920715 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 11:20:15 us=920732 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
2023-05-02 11:20:15 us=920752 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
2023-05-02 11:20:15 us=920834 Control Channel MTU parms [ L:1621 D:1156 EF:94 EB:0 ET:0 EL:3 ]
2023-05-02 11:20:15 us=928621 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 AF:14/121 ]
2023-05-02 11:20:15 us=928676 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-client'
2023-05-02 11:20:15 us=928691 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1553,tun-mtu 1500,proto UDPv4,auth SHA256,keysize 128,key-method 2,tls-server'
2023-05-02 11:20:15 us=928700 TCP/UDP: Preserving recently used remote address: [AF_INET]9.9.9.9(ipv4 redacted):1914
2023-05-02 11:20:15 us=928714 Socket Buffers: R=[212992->212992] S=[212992->212992]
2023-05-02 11:20:15 us=928720 UDPv4 link local: (not bound)
2023-05-02 11:20:15 us=928725 UDPv4 link remote: [AF_INET]9.9.9.9(ipv4 redacted):1914
2023-05-02 11:20:15 us=928751 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=356 DATA len=40
2023-05-02 11:20:17 us=165269 UDPv4 WRITE [54] to [AF_INET]9.9.9.9(ipv4 redacted):1914: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=612 DATA len=40
^C2023-05-02 11:20:21 us=302613 event_wait : Interrupted system call (code=4)
2023-05-02 11:20:21 us=302831 TCP/UDP: Closing socket
2023-05-02 11:20:21 us=302879 SIGINT[hard,] received, process exiting