Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Wed Jun 05 19:59:34 2013 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Jun 3 2013
- Wed Jun 05 19:59:34 2013 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Wed Jun 05 19:59:34 2013 Need hold release from management interface, waiting...
- Wed Jun 05 19:59:35 2013 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Wed Jun 05 19:59:35 2013 MANAGEMENT: CMD 'state on'
- Wed Jun 05 19:59:35 2013 MANAGEMENT: CMD 'log all on'
- Wed Jun 05 19:59:35 2013 MANAGEMENT: CMD 'hold off'
- Wed Jun 05 19:59:35 2013 MANAGEMENT: CMD 'hold release'
- Wed Jun 05 19:59:40 2013 MANAGEMENT: CMD 'username "Auth" "Man573"'
- Wed Jun 05 19:59:40 2013 MANAGEMENT: CMD 'password [...]'
- Wed Jun 05 19:59:40 2013 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Wed Jun 05 19:59:40 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Jun 05 19:59:40 2013 UDPv4 link local: [undef]
- Wed Jun 05 19:59:40 2013 UDPv4 link remote: [AF_INET]204.152.219.106:1194
- Wed Jun 05 19:59:40 2013 MANAGEMENT: >STATE:1370487580,WAIT,,,
- Wed Jun 05 19:59:40 2013 MANAGEMENT: >STATE:1370487580,AUTH,,,
- Wed Jun 05 19:59:40 2013 TLS: Initial packet from [AF_INET]204.152.219.106:1194, sid=4c247414 43cbddf2
- Wed Jun 05 19:59:40 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Jun 05 19:59:40 2013 VERIFY OK: depth=1, C=NV, ST=NV, L=nVPN, O=nVpn, CN=nVpn CA, [email protected]
- Wed Jun 05 19:59:40 2013 VERIFY OK: depth=0, C=NV, ST=NV, L=nVPN, O=nVpn, CN=server, [email protected]
- Wed Jun 05 19:59:42 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Wed Jun 05 19:59:42 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Wed Jun 05 19:59:42 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Wed Jun 05 19:59:42 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Wed Jun 05 19:59:42 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Wed Jun 05 19:59:42 2013 [server] Peer Connection Initiated with [AF_INET]204.152.219.106:1194
- Wed Jun 05 19:59:43 2013 MANAGEMENT: >STATE:1370487583,GET_CONFIG,,,
- Wed Jun 05 19:59:44 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Wed Jun 05 19:59:44 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 204.152.204.10,dhcp-option DNS 204.152.204.100,route 10.219.106.1,topology net30,ping 10,ping-restart 120,ifconfig 10.219.106.102 10.219.106.101'
- Wed Jun 05 19:59:44 2013 OPTIONS IMPORT: timers and/or timeouts modified
- Wed Jun 05 19:59:44 2013 OPTIONS IMPORT: --ifconfig/up options modified
- Wed Jun 05 19:59:44 2013 OPTIONS IMPORT: route options modified
- Wed Jun 05 19:59:44 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Wed Jun 05 19:59:44 2013 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Wed Jun 05 19:59:44 2013 MANAGEMENT: >STATE:1370487584,ASSIGN_IP,,10.219.106.102,
- Wed Jun 05 19:59:44 2013 open_tun, tt->ipv6=0
- Wed Jun 05 19:59:44 2013 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{814D3640-5ADD-4BC4-B6E1-DCCCBFC72CC3}.tap
- Wed Jun 05 19:59:44 2013 TAP-Windows Driver Version 9.9
- Wed Jun 05 19:59:44 2013 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.219.106.102/255.255.255.252 on interface {814D3640-5ADD-4BC4-B6E1-DCCCBFC72CC3} [DHCP-serv: 10.219.106.101, lease-time: 31536000]
- Wed Jun 05 19:59:44 2013 Successful ARP Flush on interface [22] {814D3640-5ADD-4BC4-B6E1-DCCCBFC72CC3}
- Wed Jun 05 19:59:49 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Wed Jun 05 19:59:49 2013 C:\windows\system32\route.exe ADD 204.152.219.106 MASK 255.255.255.255 192.168.0.1
- Wed Jun 05 19:59:49 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Wed Jun 05 19:59:49 2013 Route addition via IPAPI succeeded [adaptive]
- Wed Jun 05 19:59:49 2013 C:\windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.219.106.101
- Wed Jun 05 19:59:49 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Wed Jun 05 19:59:49 2013 Route addition via IPAPI succeeded [adaptive]
- Wed Jun 05 19:59:49 2013 C:\windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.219.106.101
- Wed Jun 05 19:59:49 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Wed Jun 05 19:59:49 2013 Route addition via IPAPI succeeded [adaptive]
- Wed Jun 05 19:59:49 2013 MANAGEMENT: >STATE:1370487589,ADD_ROUTES,,,
- Wed Jun 05 19:59:49 2013 C:\windows\system32\route.exe ADD 10.219.106.1 MASK 255.255.255.255 10.219.106.101
- Wed Jun 05 19:59:49 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Wed Jun 05 19:59:49 2013 Route addition via IPAPI succeeded [adaptive]
- Wed Jun 05 19:59:49 2013 Initialization Sequence Completed
- Wed Jun 05 19:59:49 2013 MANAGEMENT: >STATE:1370487589,CONNECTED,SUCCESS,10.219.106.102,204.152.219.106
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement