Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue Jan 7 12:09:55 2014 OpenVPN 2.1.3 i486-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jun 6 2013
- Tue Jan 7 12:09:55 2014 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Tue Jan 7 12:09:55 2014 Diffie-Hellman initialized with 1024 bit key
- Tue Jan 7 12:09:55 2014 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted>
- Tue Jan 7 12:09:55 2014 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Tue Jan 7 12:09:55 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:09:55 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:09:55 2014 TLS-Auth MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
- Tue Jan 7 12:09:55 2014 Socket Buffers: R=[87380->131072] S=[16384->131072]
- Tue Jan 7 12:09:55 2014 ROUTE: default_gateway=UNDEF
- Tue Jan 7 12:09:55 2014 TUN/TAP device tun0 opened
- Tue Jan 7 12:09:55 2014 TUN/TAP TX queue length set to 100
- Tue Jan 7 12:09:55 2014 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
- Tue Jan 7 12:09:55 2014 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
- Tue Jan 7 12:09:55 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
- Tue Jan 7 12:09:55 2014 GID set to nogroup
- Tue Jan 7 12:09:55 2014 UID set to nobody
- Tue Jan 7 12:09:55 2014 Listening for incoming TCP connection on [AF_INET]10.0.1.95:1695
- Tue Jan 7 12:09:55 2014 TCPv4_SERVER link local (bound): [AF_INET]10.0.1.95:1695
- Tue Jan 7 12:09:55 2014 TCPv4_SERVER link remote: [undef]
- Tue Jan 7 12:09:55 2014 MULTI: multi_init called, r=256 v=256
- Tue Jan 7 12:09:55 2014 IFCONFIG POOL: base=10.8.0.4 size=62
- Tue Jan 7 12:09:55 2014 IFCONFIG POOL LIST
- Tue Jan 7 12:09:55 2014 client,10.8.0.4
- Tue Jan 7 12:09:55 2014 MULTI: TCP INIT maxclients=1024 maxevents=1028
- Tue Jan 7 12:09:55 2014 Initialization Sequence Completed
- Tue Jan 7 12:16:23 2014 MULTI: multi_create_instance called
- Tue Jan 7 12:16:23 2014 Re-using SSL/TLS context
- Tue Jan 7 12:16:23 2014 LZO compression initialized
- Tue Jan 7 12:16:23 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
- Tue Jan 7 12:16:23 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
- Tue Jan 7 12:16:23 2014 Local Options hash (VER=V4): 'bd577cd1'
- Tue Jan 7 12:16:23 2014 Expected Remote Options hash (VER=V4): 'ee93268d'
- Tue Jan 7 12:16:23 2014 TCP connection established with [AF_INET]95.128.47.39:6402
- Tue Jan 7 12:16:23 2014 TCPv4_SERVER link local: [undef]
- Tue Jan 7 12:16:23 2014 TCPv4_SERVER link remote: [AF_INET]95.128.47.39:6402
- Tue Jan 7 12:16:23 2014 95.128.47.39:6402 TLS: Initial packet from [AF_INET]95.128.47.39:6402, sid=85fa5342 6eca6951
- Tue Jan 7 12:16:26 2014 95.128.47.39:6402 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=server/emailAddress=me@myhost.mydomain
- Tue Jan 7 12:16:26 2014 95.128.47.39:6402 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=client/emailAddress=me@myhost.mydomain
- Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Tue Jan 7 12:16:27 2014 95.128.47.39:6402 [client] Peer Connection Initiated with [AF_INET]95.128.47.39:6402
- Tue Jan 7 12:16:27 2014 client/95.128.47.39:6402 MULTI: Learn: 10.8.0.6 -> client/95.128.47.39:6402
- Tue Jan 7 12:16:27 2014 client/95.128.47.39:6402 MULTI: primary virtual IP for client/95.128.47.39:6402: 10.8.0.6
- Tue Jan 7 12:16:30 2014 client/95.128.47.39:6402 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Jan 7 12:16:30 2014 client/95.128.47.39:6402 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Tue Jan 7 12:18:14 2014 client/95.128.47.39:6402 Connection reset, restarting [-1]
- Tue Jan 7 12:18:14 2014 client/95.128.47.39:6402 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Tue Jan 7 12:18:14 2014 TCP/UDP: Closing socket
- Tue Jan 7 12:21:39 2014 MULTI: multi_create_instance called
- Tue Jan 7 12:21:39 2014 Re-using SSL/TLS context
- Tue Jan 7 12:21:39 2014 LZO compression initialized
- Tue Jan 7 12:21:39 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
- Tue Jan 7 12:21:39 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
- Tue Jan 7 12:21:39 2014 Local Options hash (VER=V4): 'bd577cd1'
- Tue Jan 7 12:21:39 2014 Expected Remote Options hash (VER=V4): 'ee93268d'
- Tue Jan 7 12:21:39 2014 TCP connection established with [AF_INET]95.128.47.39:19524
- Tue Jan 7 12:21:39 2014 TCPv4_SERVER link local: [undef]
- Tue Jan 7 12:21:39 2014 TCPv4_SERVER link remote: [AF_INET]95.128.47.39:19524
- Tue Jan 7 12:21:39 2014 95.128.47.39:19524 TLS: Initial packet from [AF_INET]95.128.47.39:19524, sid=16384c26 b520f69a
- Tue Jan 7 12:21:42 2014 95.128.47.39:19524 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=server/emailAddress=me@myhost.mydomain
- Tue Jan 7 12:21:42 2014 95.128.47.39:19524 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=client/emailAddress=me@myhost.mydomain
- Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:21:44 2014 95.128.47.39:19524 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Tue Jan 7 12:21:44 2014 95.128.47.39:19524 [client] Peer Connection Initiated with [AF_INET]95.128.47.39:19524
- Tue Jan 7 12:21:44 2014 client/95.128.47.39:19524 MULTI: Learn: 10.8.0.6 -> client/95.128.47.39:19524
- Tue Jan 7 12:21:44 2014 client/95.128.47.39:19524 MULTI: primary virtual IP for client/95.128.47.39:19524: 10.8.0.6
- Tue Jan 7 12:21:46 2014 client/95.128.47.39:19524 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Jan 7 12:21:46 2014 client/95.128.47.39:19524 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Tue Jan 7 12:23:01 2014 client/95.128.47.39:19524 Connection reset, restarting [-1]
- Tue Jan 7 12:23:01 2014 client/95.128.47.39:19524 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Tue Jan 7 12:23:01 2014 TCP/UDP: Closing socket
- Tue Jan 7 12:25:17 2014 MULTI: multi_create_instance called
- Tue Jan 7 12:25:17 2014 Re-using SSL/TLS context
- Tue Jan 7 12:25:17 2014 LZO compression initialized
- Tue Jan 7 12:25:17 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
- Tue Jan 7 12:25:17 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
- Tue Jan 7 12:25:17 2014 Local Options hash (VER=V4): 'bd577cd1'
- Tue Jan 7 12:25:17 2014 Expected Remote Options hash (VER=V4): 'ee93268d'
- Tue Jan 7 12:25:17 2014 TCP connection established with [AF_INET]95.128.47.39:1156
- Tue Jan 7 12:25:17 2014 TCPv4_SERVER link local: [undef]
- Tue Jan 7 12:25:17 2014 TCPv4_SERVER link remote: [AF_INET]95.128.47.39:1156
- Tue Jan 7 12:25:17 2014 95.128.47.39:1156 TLS: Initial packet from [AF_INET]95.128.47.39:1156, sid=6dfea81e 5d80c464
- Tue Jan 7 12:25:20 2014 95.128.47.39:1156 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=server/emailAddress=me@myhost.mydomain
- Tue Jan 7 12:25:20 2014 95.128.47.39:1156 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=client/emailAddress=me@myhost.mydomain
- Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue Jan 7 12:25:22 2014 95.128.47.39:1156 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Tue Jan 7 12:25:22 2014 95.128.47.39:1156 [client] Peer Connection Initiated with [AF_INET]95.128.47.39:1156
- Tue Jan 7 12:25:22 2014 client/95.128.47.39:1156 MULTI: Learn: 10.8.0.6 -> client/95.128.47.39:1156
- Tue Jan 7 12:25:22 2014 client/95.128.47.39:1156 MULTI: primary virtual IP for client/95.128.47.39:1156: 10.8.0.6
- Tue Jan 7 12:25:24 2014 client/95.128.47.39:1156 PUSH: Received control message: 'PUSH_REQUEST'
- Tue Jan 7 12:25:24 2014 client/95.128.47.39:1156 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
- Tue Jan 7 12:26:57 2014 client/95.128.47.39:1156 Connection reset, restarting [-1]
- Tue Jan 7 12:26:57 2014 client/95.128.47.39:1156 SIGUSR1[soft,connection-reset] received, client-instance restarting
- Tue Jan 7 12:26:57 2014 TCP/UDP: Closing socket
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement