Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Fri Mar 2 10:27:59 2012 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
- Fri Mar 2 10:27:59 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Fri Mar 2 10:27:59 2012 Control Channel MTU parms [ L:1591 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Fri Mar 2 10:27:59 2012 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Fri Mar 2 10:27:59 2012 Data Channel MTU parms [ L:1591 D:1450 EF:59 EB:4 ET:32 EL:0 ]
- Fri Mar 2 10:27:59 2012 Local Options hash (VER=V4): 'b60e7885'
- Fri Mar 2 10:27:59 2012 Expected Remote Options hash (VER=V4): 'fbeb66e6'
- Fri Mar 2 10:27:59 2012 Attempting to establish TCP connection with [AF_INET]70.89.137.49:443 [nonblock]
- Fri Mar 2 10:28:00 2012 TCP connection established with [AF_INET]70.89.137.49:443
- Fri Mar 2 10:28:00 2012 TCPv4_CLIENT link local: [undef]
- Fri Mar 2 10:28:00 2012 TCPv4_CLIENT link remote: [AF_INET]70.89.137.49:443
- Fri Mar 2 10:28:00 2012 TLS: Initial packet from [AF_INET]70.89.137.49:443, sid=2c69ab5b b4b27282
- Fri Mar 2 10:28:00 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Fri Mar 2 10:28:00 2012 VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_80B303B7A466E_2010-11-08_03:43:35_GMT__CA
- Fri Mar 2 10:28:00 2012 Validating certificate extended key usage
- Fri Mar 2 10:28:00 2012 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Mar 2 10:28:00 2012 VERIFY EKU OK
- Fri Mar 2 10:28:00 2012 VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
- Fri Mar 2 10:28:00 2012 VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
- Fri Mar 2 10:28:02 2012 WARNING: 'dev-type' is used inconsistently, local='dev-type tap', remote='dev-type tun'
- Fri Mar 2 10:28:02 2012 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1591', remote='link-mtu 1559'
- Fri Mar 2 10:28:02 2012 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
- Fri Mar 2 10:28:02 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Mar 2 10:28:02 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Mar 2 10:28:02 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Mar 2 10:28:02 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Mar 2 10:28:02 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Mar 2 10:28:02 2012 [Fireware_SSLVPN_Server] Peer Connection Initiated with [AF_INET]70.89.137.49:443
- Fri Mar 2 10:28:04 2012 SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
- Fri Mar 2 10:28:04 2012 PUSH: Received control message: 'PUSH_REPLY,topology subnet,route 192.168.121.0 255.255.255.0,route 10.0.2.0 255.255.255.0,route 10.0.3.0 255.255.255.0,route 10.0.4.0 255.255.255.0,route 10.0.5.0 255.255.255.0,route 10.0.6.0 255.255.255.0,dhcp-option DOMAIN corp.pi.com,dhcp-option DNS 192.168.121.75,route-gateway 192.168.122.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.122.4 255.255.255.0'
- Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: timers and/or timeouts modified
- Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: --ifconfig/up options modified
- Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: route options modified
- Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: route-related options modified
- Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Fri Mar 2 10:28:04 2012 ROUTE default_gateway=10.1.10.1
- Fri Mar 2 10:28:04 2012 TUN/TAP device tap0 opened
- Fri Mar 2 10:28:04 2012 TUN/TAP TX queue length set to 100
- Fri Mar 2 10:28:04 2012 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Fri Mar 2 10:28:04 2012 /sbin/ifconfig tap0 192.168.122.4 netmask 255.255.255.0 mtu 1500 broadcast 192.168.122.255
- Fri Mar 2 10:28:04 2012 /sbin/route add -net 192.168.121.0 netmask 255.255.255.0 gw 192.168.122.1
- Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.2.0 netmask 255.255.255.0 gw 192.168.122.1
- Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.3.0 netmask 255.255.255.0 gw 192.168.122.1
- Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.4.0 netmask 255.255.255.0 gw 192.168.122.1
- Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.5.0 netmask 255.255.255.0 gw 192.168.122.1
- Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.6.0 netmask 255.255.255.0 gw 192.168.122.1
- Fri Mar 2 10:28:04 2012 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement