Advertisement
Guest User

Untitled

a guest
Feb 8th, 2016
578
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.31 KB | None | 0 0
  1. 2016-02-09T12:29:19.778 Launching WatchGuard Mobile VPN with SSL client. Version 11.10.0 (Build 468314) Built:Jan 29 2015 22:06:51
  2. 2016-02-09T12:29:25.721 Requesting client configuration from Kamco:443
  3. 2016-02-09T12:29:28.299 FAILED:2016-02-09T12:29:39.576 FAILED:Cannot perform http request 12007
  4. 2016-02-09T12:29:39.577 failed to get domain name
  5. 2016-02-09T12:29:45.171 Error: connect() failed. ret = -1 errno=10061
  6. 2016-02-09T12:29:46.303 OVPN:>HOLD:Waiting for hold release
  7.  
  8. 2016-02-09T12:29:46.363 OVPN:>LOG:1454981386,D,MANAGEMENT: CMD ''
  9.  
  10. 2016-02-09T12:29:46.364 OVPN:>LOG:1454981386,D,MANAGEMENT: CMD 'hold release'
  11.  
  12. 2016-02-09T12:29:46.364 OVPN:SUCCESS: hold release succeeded
  13.  
  14. 2016-02-09T12:29:46.364 OVPN:>PASSWORD:Need 'Auth' username/password
  15.  
  16. 2016-02-09T12:29:46.424 OVPN:>LOG:1454981386,D,MANAGEMENT: CMD 'username "Auth" "Damian.Chiem"'
  17.  
  18. 2016-02-09T12:29:46.425 OVPN:SUCCESS: 'Auth' username entered, but not yet verified
  19.  
  20. 2016-02-09T12:29:46.425 OVPN:>LOG:1454981386,D,MANAGEMENT: CMD 'password [...]'
  21.  
  22. 2016-02-09T12:29:46.425 OVPN:SUCCESS: 'Auth' password entered, but not yet verified
  23.  
  24. 2016-02-09T12:29:46.605 OVPN:>LOG:1454981386,,Socket Buffers: R=[8192->8192] S=[8192->8192]
  25.  
  26. 2016-02-09T12:29:46.606 OVPN:>LOG:1454981386,I,Attempting to establish TCP connection with [AF_INET]119.225.38.86:444 [nonblock]
  27.  
  28. 2016-02-09T12:29:46.606 OVPN:>LOG:1454981386,,MANAGEMENT: >STATE:1454981386,TCP_CONNECT,,,
  29.  
  30. 2016-02-09T12:29:46.607 OVPN:>STATE:1454981386,TCP_CONNECT,,,
  31.  
  32. 2016-02-09T12:29:47.627 OVPN:>LOG:1454981387,I,TCP connection established with [AF_INET]119.225.38.86:444
  33.  
  34. 2016-02-09T12:29:47.627 OVPN:>LOG:1454981387,I,TCPv4_CLIENT link local: [undef]
  35.  
  36. 2016-02-09T12:29:47.628 OVPN:>LOG:1454981387,I,TCPv4_CLIENT link remote: [AF_INET]119.225.38.86:444
  37.  
  38. 2016-02-09T12:29:47.628 OVPN:>LOG:1454981387,,MANAGEMENT: >STATE:1454981387,WAIT,,,
  39.  
  40. 2016-02-09T12:29:47.629 OVPN:>STATE:1454981387,WAIT,,,
  41.  
  42. 2016-02-09T12:29:47.629 OVPN:>LOG:1454981387,,MANAGEMENT: >STATE:1454981387,AUTH,,,
  43.  
  44. 2016-02-09T12:29:47.629 OVPN:>STATE:1454981387,AUTH,,,
  45.  
  46. 2016-02-09T12:29:47.630 OVPN:>LOG:1454981387,,TLS: Initial packet from [AF_INET]119.225.38.86:444, sid=c4f4a518 ec138f3e
  47.  
  48. 2016-02-09T12:29:47.630 OVPN:>LOG:1454981387,W,WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  49.  
  50. 2016-02-09T12:29:47.932 OVPN:>LOG:1454981387,,VERIFY OK: depth=1, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN__SN_80BE0973435B4_2015-03-02_22:43:23_GMT__CA
  51.  
  52. 2016-02-09T12:29:47.933 OVPN:>LOG:1454981387,,Validating certificate extended key usage
  53.  
  54. 2016-02-09T12:29:47.933 OVPN:>LOG:1454981387,,++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  55.  
  56. 2016-02-09T12:29:47.934 OVPN:>LOG:1454981387,,VERIFY EKU OK
  57.  
  58. 2016-02-09T12:29:47.934 OVPN:>LOG:1454981387,,VERIFY X509NAME OK: /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
  59.  
  60. 2016-02-09T12:29:47.934 OVPN:>LOG:1454981387,,VERIFY OK: depth=0, /O=WatchGuard_Technologies/OU=Fireware/CN=Fireware_SSLVPN_Server
  61.  
  62. 2016-02-09T12:29:48.655 OVPN:>LOG:1454981388,,Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  63.  
  64. 2016-02-09T12:29:48.657 OVPN:>LOG:1454981388,,Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  65.  
  66. 2016-02-09T12:29:48.657 OVPN:>LOG:1454981388,,Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  67.  
  68. 2016-02-09T12:29:48.658 OVPN:>LOG:1454981388,,Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  69.  
  70. 2016-02-09T12:29:48.658 OVPN:>LOG:1454981388,,Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  71.  
  72. 2016-02-09T12:29:48.659 OVPN:>LOG:1454981388,I,[Fireware_SSLVPN_Server] Peer Connection Initiated with [AF_INET]119.225.38.86:444
  73.  
  74. 2016-02-09T12:29:49.799 OVPN:>LOG:1454981389,,MANAGEMENT: >STATE:1454981389,GET_CONFIG,,,
  75.  
  76. 2016-02-09T12:29:49.799 OVPN:>STATE:1454981389,GET_CONFIG,,,
  77.  
  78. 2016-02-09T12:29:50.999 OVPN:>LOG:1454981390,,SENT CONTROL [Fireware_SSLVPN_Server]: 'PUSH_REQUEST' (status=1)
  79.  
  80. 2016-02-09T12:29:51.171 Connection Closed.
  81. 2016-02-09T12:30:13.666 Requesting client configuration from Kamco:443
  82. 2016-02-09T12:30:15.919 FAILED:2016-02-09T12:30:27.173 FAILED:Cannot perform http request 12007
  83. 2016-02-09T12:30:27.174 failed to get domain name
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement