Advertisement
Guest User

openvpn error output

a guest
Feb 4th, 2014
414
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.54 KB | None | 0 0
  1. andrew-server.40 is the name of my server (public ip address 203.xxx.yyy.40)
  2. andrew-pc is my desktop which i used to act as the ca
  3. andrew-ubuntu is the robot
  4.  
  5.  
  6. andrew@andrew-ubuntu:/etc/openvpn$ openvpn client.conf
  7. Wed Feb 5 09:33:21 2014 OpenVPN 2.2.1 i686-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Feb 27 2013
  8. Wed Feb 5 09:33:21 2014 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  9. Enter Private Key Password:
  10. Wed Feb 5 09:33:24 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  11. Wed Feb 5 09:33:24 2014 LZO compression initialized
  12. Wed Feb 5 09:33:24 2014 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
  13. Wed Feb 5 09:33:24 2014 Socket Buffers: R=[180224->131072] S=[180224->131072]
  14. Wed Feb 5 09:33:24 2014 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
  15. Wed Feb 5 09:33:24 2014 Local Options hash (VER=V4): '41690919'
  16. Wed Feb 5 09:33:24 2014 Expected Remote Options hash (VER=V4): '530fdded'
  17. Wed Feb 5 09:33:24 2014 UDPv4 link local: [undef]
  18. Wed Feb 5 09:33:24 2014 UDPv4 link remote: [AF_INET]203.xxx.yyy.40:1194
  19. Wed Feb 5 09:33:24 2014 TLS: Initial packet from [AF_INET]203.xxx.yyy.40:1194, sid=9671139e 605dcd0d
  20. Wed Feb 5 09:33:24 2014 VERIFY OK: depth=1, /CN=andrew-pc
  21. Wed Feb 5 09:33:24 2014 Validating certificate key usage
  22. Wed Feb 5 09:33:24 2014 ++ Certificate has key usage 00a0, expects 00a0
  23. Wed Feb 5 09:33:24 2014 VERIFY KU OK
  24. Wed Feb 5 09:33:24 2014 Validating certificate extended key usage
  25. Wed Feb 5 09:33:24 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  26. Wed Feb 5 09:33:24 2014 VERIFY EKU OK
  27. Wed Feb 5 09:33:24 2014 VERIFY OK: depth=0, /CN=andrew-server.40
  28. Wed Feb 5 09:33:24 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  29. Wed Feb 5 09:33:24 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  30. Wed Feb 5 09:33:24 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  31. Wed Feb 5 09:33:24 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  32. Wed Feb 5 09:33:24 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  33. Wed Feb 5 09:33:24 2014 [andrew-server.40] Peer Connection Initiated with [AF_INET]203.xxx.yyy.40:1194
  34. Wed Feb 5 09:33:26 2014 SENT CONTROL [andrew-server.40]: 'PUSH_REQUEST' (status=1)
  35. Wed Feb 5 09:33:26 2014 PUSH: Received control message: 'PUSH_REPLY,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
  36. Wed Feb 5 09:33:26 2014 OPTIONS IMPORT: timers and/or timeouts modified
  37. Wed Feb 5 09:33:26 2014 OPTIONS IMPORT: --ifconfig/up options modified
  38. Wed Feb 5 09:33:26 2014 OPTIONS IMPORT: route options modified
  39. Wed Feb 5 09:33:26 2014 ROUTE default_gateway=203.xxx.yyy.40
  40. Wed Feb 5 09:33:26 2014 Note: Cannot ioctl TUNSETIFF tun: Operation not permitted (errno=1)
  41. Wed Feb 5 09:33:26 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  42. Wed Feb 5 09:33:26 2014 /sbin/ifconfig 10.8.0.6 pointopoint 10.8.0.5 mtu 1500
  43. SIOCSIFADDR: Operation not permitted
  44. : ERROR while getting interface flags: No such device
  45. SIOCSIFDSTADDR: Operation not permitted
  46. : ERROR while getting interface flags: No such device
  47. SIOCSIFMTU: Operation not permitted
  48. Wed Feb 5 09:33:26 2014 Linux ifconfig failed: external program exited with error status: 1
  49. Wed Feb 5 09:33:26 2014 Exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement