Advertisement
Guest User

Untitled

a guest
Mar 2nd, 2012
179
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.57 KB | None | 0 0
  1. Fri Mar 2 10:27:59 2012 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
  2. Fri Mar 2 10:27:59 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3. Fri Mar 2 10:27:59 2012 Control Channel MTU parms [ L:1591 D:140 EF:40 EB:0 ET:0 EL:0 ]
  4. Fri Mar 2 10:27:59 2012 Socket Buffers: R=[87380->131072] S=[16384->131072]
  5. Fri Mar 2 10:27:59 2012 Data Channel MTU parms [ L:1591 D:1450 EF:59 EB:4 ET:32 EL:0 ]
  6. Fri Mar 2 10:27:59 2012 Local Options hash (VER=V4): 'b60e7885'
  7. Fri Mar 2 10:27:59 2012 Expected Remote Options hash (VER=V4): 'fbeb66e6'
  8. Fri Mar 2 10:27:59 2012 Attempting to establish TCP connection with [AF_INET]70.89.137.49:443 [nonblock]
  9. Fri Mar 2 10:28:00 2012 TCP connection established with [AF_INET]70.89.137.49:443
  10. Fri Mar 2 10:28:00 2012 TCPv4_CLIENT link local: [undef]
  11. Fri Mar 2 10:28:00 2012 TCPv4_CLIENT link remote: [AF_INET]70.89.137.49:443
  12. Fri Mar 2 10:28:00 2012 TLS: Initial packet from [AF_INET]70.89.137.49:443, sid=2c69ab5b b4b27282
  13. Fri Mar 2 10:28:00 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  14. Fri Mar 2 10:28:00 2012 VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_80B303B7A466E_2010-11-08_03:43:35_GMT__CA
  15. Fri Mar 2 10:28:00 2012 Validating certificate extended key usage
  16. Fri Mar 2 10:28:00 2012 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  17. Fri Mar 2 10:28:00 2012 VERIFY EKU OK
  18. Fri Mar 2 10:28:00 2012 VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
  19. Fri Mar 2 10:28:00 2012 VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
  20. Fri Mar 2 10:28:02 2012 WARNING: 'dev-type' is used inconsistently, local='dev-type tap', remote='dev-type tun'
  21. Fri Mar 2 10:28:02 2012 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1591', remote='link-mtu 1559'
  22. Fri Mar 2 10:28:02 2012 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500'
  23. Fri Mar 2 10:28:02 2012 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  24. Fri Mar 2 10:28:02 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  25. Fri Mar 2 10:28:02 2012 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  26. Fri Mar 2 10:28:02 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  27. Fri Mar 2 10:28:02 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  28. Fri Mar 2 10:28:02 2012 [Fireware_SSLVPN_Server] Peer Connection Initiated with [AF_INET]70.89.137.49:443
  29. Fri Mar 2 10:28:04 2012 SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
  30. Fri Mar 2 10:28:04 2012 PUSH: Received control message: 'PUSH_REPLY,topology subnet,route 192.168.121.0 255.255.255.0,route 10.0.2.0 255.255.255.0,route 10.0.3.0 255.255.255.0,route 10.0.4.0 255.255.255.0,route 10.0.5.0 255.255.255.0,route 10.0.6.0 255.255.255.0,dhcp-option DOMAIN corp.pi.com,dhcp-option DNS 192.168.121.75,route-gateway 192.168.122.1,topology subnet,ping 10,ping-restart 60,ifconfig 192.168.122.4 255.255.255.0'
  31. Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: timers and/or timeouts modified
  32. Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: --ifconfig/up options modified
  33. Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: route options modified
  34. Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: route-related options modified
  35. Fri Mar 2 10:28:04 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  36. Fri Mar 2 10:28:04 2012 ROUTE default_gateway=10.1.10.1
  37. Fri Mar 2 10:28:04 2012 TUN/TAP device tap0 opened
  38. Fri Mar 2 10:28:04 2012 TUN/TAP TX queue length set to 100
  39. Fri Mar 2 10:28:04 2012 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  40. Fri Mar 2 10:28:04 2012 /sbin/ifconfig tap0 192.168.122.4 netmask 255.255.255.0 mtu 1500 broadcast 192.168.122.255
  41. Fri Mar 2 10:28:04 2012 /sbin/route add -net 192.168.121.0 netmask 255.255.255.0 gw 192.168.122.1
  42. Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.2.0 netmask 255.255.255.0 gw 192.168.122.1
  43. Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.3.0 netmask 255.255.255.0 gw 192.168.122.1
  44. Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.4.0 netmask 255.255.255.0 gw 192.168.122.1
  45. Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.5.0 netmask 255.255.255.0 gw 192.168.122.1
  46. Fri Mar 2 10:28:04 2012 /sbin/route add -net 10.0.6.0 netmask 255.255.255.0 gw 192.168.122.1
  47. Fri Mar 2 10:28:04 2012 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement