Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 TLS: new session incoming connection from [AF_INET]XXX.XXX.XXX.XXX:1024
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 CRL CHECK OK: CN=grot3.com
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 VERIFY OK: depth=1, CN=grot3.com
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 CRL CHECK OK: CN=client1
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 VERIFY OK: depth=0, CN=client1
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 TLS: move_session: dest=TM_ACTIVE src=TM_UNTRUSTED reinit_src=1
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 TLS: tls_multi_process: untrusted session promoted to semi-trusted
Sat Feb 27 18:00:58 2016 client1/XXX.XXX.XXX.XXX:1024 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat Feb 27 18:00:59 2016 client1/XXX.XXX.XXX.XXX:1024 PUSH: Received control message: 'PUSH_REQUEST'
Sat Feb 27 18:01:04 2016 client1/XXX.XXX.XXX.XXX:1024 PUSH: Received control message: 'PUSH_REQUEST'
Sat Feb 27 18:01:04 2016 client1/XXX.XXX.XXX.XXX:1024 send_push_reply(): safe_cap=940
Sat Feb 27 18:01:04 2016 client1/XXX.XXX.XXX.XXX:1024 SENT CONTROL [client1]: 'PUSH_REPLY,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)