Advertisement
Sergo

Untitled

Jan 15th, 2014
105
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 9.93 KB | None | 0 0
  1. Tue Jan 7 12:09:55 2014 OpenVPN 2.1.3 i486-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jun 6 2013
  2. Tue Jan 7 12:09:55 2014 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  3. Tue Jan 7 12:09:55 2014 Diffie-Hellman initialized with 1024 bit key
  4. Tue Jan 7 12:09:55 2014 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted>
  5. Tue Jan 7 12:09:55 2014 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
  6. Tue Jan 7 12:09:55 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  7. Tue Jan 7 12:09:55 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  8. Tue Jan 7 12:09:55 2014 TLS-Auth MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
  9. Tue Jan 7 12:09:55 2014 Socket Buffers: R=[87380->131072] S=[16384->131072]
  10. Tue Jan 7 12:09:55 2014 ROUTE: default_gateway=UNDEF
  11. Tue Jan 7 12:09:55 2014 TUN/TAP device tun0 opened
  12. Tue Jan 7 12:09:55 2014 TUN/TAP TX queue length set to 100
  13. Tue Jan 7 12:09:55 2014 /sbin/ifconfig tun0 10.8.0.1 pointopoint 10.8.0.2 mtu 1500
  14. Tue Jan 7 12:09:55 2014 /sbin/route add -net 10.8.0.0 netmask 255.255.255.0 gw 10.8.0.2
  15. Tue Jan 7 12:09:55 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
  16. Tue Jan 7 12:09:55 2014 GID set to nogroup
  17. Tue Jan 7 12:09:55 2014 UID set to nobody
  18. Tue Jan 7 12:09:55 2014 Listening for incoming TCP connection on [AF_INET]10.0.1.95:1695
  19. Tue Jan 7 12:09:55 2014 TCPv4_SERVER link local (bound): [AF_INET]10.0.1.95:1695
  20. Tue Jan 7 12:09:55 2014 TCPv4_SERVER link remote: [undef]
  21. Tue Jan 7 12:09:55 2014 MULTI: multi_init called, r=256 v=256
  22. Tue Jan 7 12:09:55 2014 IFCONFIG POOL: base=10.8.0.4 size=62
  23. Tue Jan 7 12:09:55 2014 IFCONFIG POOL LIST
  24. Tue Jan 7 12:09:55 2014 client,10.8.0.4
  25. Tue Jan 7 12:09:55 2014 MULTI: TCP INIT maxclients=1024 maxevents=1028
  26. Tue Jan 7 12:09:55 2014 Initialization Sequence Completed
  27. Tue Jan 7 12:16:23 2014 MULTI: multi_create_instance called
  28. Tue Jan 7 12:16:23 2014 Re-using SSL/TLS context
  29. Tue Jan 7 12:16:23 2014 LZO compression initialized
  30. Tue Jan 7 12:16:23 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
  31. Tue Jan 7 12:16:23 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
  32. Tue Jan 7 12:16:23 2014 Local Options hash (VER=V4): 'bd577cd1'
  33. Tue Jan 7 12:16:23 2014 Expected Remote Options hash (VER=V4): 'ee93268d'
  34. Tue Jan 7 12:16:23 2014 TCP connection established with [AF_INET]95.128.47.39:6402
  35. Tue Jan 7 12:16:23 2014 TCPv4_SERVER link local: [undef]
  36. Tue Jan 7 12:16:23 2014 TCPv4_SERVER link remote: [AF_INET]95.128.47.39:6402
  37. Tue Jan 7 12:16:23 2014 95.128.47.39:6402 TLS: Initial packet from [AF_INET]95.128.47.39:6402, sid=85fa5342 6eca6951
  38. Tue Jan 7 12:16:26 2014 95.128.47.39:6402 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=server/emailAddress=me@myhost.mydomain
  39. Tue Jan 7 12:16:26 2014 95.128.47.39:6402 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=client/emailAddress=me@myhost.mydomain
  40. Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  41. Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  42. Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  43. Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  44. Tue Jan 7 12:16:27 2014 95.128.47.39:6402 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  45. Tue Jan 7 12:16:27 2014 95.128.47.39:6402 [client] Peer Connection Initiated with [AF_INET]95.128.47.39:6402
  46. Tue Jan 7 12:16:27 2014 client/95.128.47.39:6402 MULTI: Learn: 10.8.0.6 -> client/95.128.47.39:6402
  47. Tue Jan 7 12:16:27 2014 client/95.128.47.39:6402 MULTI: primary virtual IP for client/95.128.47.39:6402: 10.8.0.6
  48. Tue Jan 7 12:16:30 2014 client/95.128.47.39:6402 PUSH: Received control message: 'PUSH_REQUEST'
  49. Tue Jan 7 12:16:30 2014 client/95.128.47.39:6402 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  50. Tue Jan 7 12:18:14 2014 client/95.128.47.39:6402 Connection reset, restarting [-1]
  51. Tue Jan 7 12:18:14 2014 client/95.128.47.39:6402 SIGUSR1[soft,connection-reset] received, client-instance restarting
  52. Tue Jan 7 12:18:14 2014 TCP/UDP: Closing socket
  53. Tue Jan 7 12:21:39 2014 MULTI: multi_create_instance called
  54. Tue Jan 7 12:21:39 2014 Re-using SSL/TLS context
  55. Tue Jan 7 12:21:39 2014 LZO compression initialized
  56. Tue Jan 7 12:21:39 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
  57. Tue Jan 7 12:21:39 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
  58. Tue Jan 7 12:21:39 2014 Local Options hash (VER=V4): 'bd577cd1'
  59. Tue Jan 7 12:21:39 2014 Expected Remote Options hash (VER=V4): 'ee93268d'
  60. Tue Jan 7 12:21:39 2014 TCP connection established with [AF_INET]95.128.47.39:19524
  61. Tue Jan 7 12:21:39 2014 TCPv4_SERVER link local: [undef]
  62. Tue Jan 7 12:21:39 2014 TCPv4_SERVER link remote: [AF_INET]95.128.47.39:19524
  63. Tue Jan 7 12:21:39 2014 95.128.47.39:19524 TLS: Initial packet from [AF_INET]95.128.47.39:19524, sid=16384c26 b520f69a
  64. Tue Jan 7 12:21:42 2014 95.128.47.39:19524 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=server/emailAddress=me@myhost.mydomain
  65. Tue Jan 7 12:21:42 2014 95.128.47.39:19524 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=client/emailAddress=me@myhost.mydomain
  66. Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  67. Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  68. Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  69. Tue Jan 7 12:21:43 2014 95.128.47.39:19524 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  70. Tue Jan 7 12:21:44 2014 95.128.47.39:19524 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  71. Tue Jan 7 12:21:44 2014 95.128.47.39:19524 [client] Peer Connection Initiated with [AF_INET]95.128.47.39:19524
  72. Tue Jan 7 12:21:44 2014 client/95.128.47.39:19524 MULTI: Learn: 10.8.0.6 -> client/95.128.47.39:19524
  73. Tue Jan 7 12:21:44 2014 client/95.128.47.39:19524 MULTI: primary virtual IP for client/95.128.47.39:19524: 10.8.0.6
  74. Tue Jan 7 12:21:46 2014 client/95.128.47.39:19524 PUSH: Received control message: 'PUSH_REQUEST'
  75. Tue Jan 7 12:21:46 2014 client/95.128.47.39:19524 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  76. Tue Jan 7 12:23:01 2014 client/95.128.47.39:19524 Connection reset, restarting [-1]
  77. Tue Jan 7 12:23:01 2014 client/95.128.47.39:19524 SIGUSR1[soft,connection-reset] received, client-instance restarting
  78. Tue Jan 7 12:23:01 2014 TCP/UDP: Closing socket
  79. Tue Jan 7 12:25:17 2014 MULTI: multi_create_instance called
  80. Tue Jan 7 12:25:17 2014 Re-using SSL/TLS context
  81. Tue Jan 7 12:25:17 2014 LZO compression initialized
  82. Tue Jan 7 12:25:17 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
  83. Tue Jan 7 12:25:17 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
  84. Tue Jan 7 12:25:17 2014 Local Options hash (VER=V4): 'bd577cd1'
  85. Tue Jan 7 12:25:17 2014 Expected Remote Options hash (VER=V4): 'ee93268d'
  86. Tue Jan 7 12:25:17 2014 TCP connection established with [AF_INET]95.128.47.39:1156
  87. Tue Jan 7 12:25:17 2014 TCPv4_SERVER link local: [undef]
  88. Tue Jan 7 12:25:17 2014 TCPv4_SERVER link remote: [AF_INET]95.128.47.39:1156
  89. Tue Jan 7 12:25:17 2014 95.128.47.39:1156 TLS: Initial packet from [AF_INET]95.128.47.39:1156, sid=6dfea81e 5d80c464
  90. Tue Jan 7 12:25:20 2014 95.128.47.39:1156 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=server/emailAddress=me@myhost.mydomain
  91. Tue Jan 7 12:25:20 2014 95.128.47.39:1156 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=server/CN=client/emailAddress=me@myhost.mydomain
  92. Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  93. Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  94. Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  95. Tue Jan 7 12:25:21 2014 95.128.47.39:1156 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  96. Tue Jan 7 12:25:22 2014 95.128.47.39:1156 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  97. Tue Jan 7 12:25:22 2014 95.128.47.39:1156 [client] Peer Connection Initiated with [AF_INET]95.128.47.39:1156
  98. Tue Jan 7 12:25:22 2014 client/95.128.47.39:1156 MULTI: Learn: 10.8.0.6 -> client/95.128.47.39:1156
  99. Tue Jan 7 12:25:22 2014 client/95.128.47.39:1156 MULTI: primary virtual IP for client/95.128.47.39:1156: 10.8.0.6
  100. Tue Jan 7 12:25:24 2014 client/95.128.47.39:1156 PUSH: Received control message: 'PUSH_REQUEST'
  101. Tue Jan 7 12:25:24 2014 client/95.128.47.39:1156 SENT CONTROL [client]: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
  102. Tue Jan 7 12:26:57 2014 client/95.128.47.39:1156 Connection reset, restarting [-1]
  103. Tue Jan 7 12:26:57 2014 client/95.128.47.39:1156 SIGUSR1[soft,connection-reset] received, client-instance restarting
  104. Tue Jan 7 12:26:57 2014 TCP/UDP: Closing socket
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement