Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- andrew-server.40 is the name of my server (public ip address 203.xxx.yyy.40)
- andrew-pc is my desktop which i used to act as the ca
- andrew-ubuntu is the robot
- andrew@andrew-ubuntu:/etc/openvpn$ openvpn client.conf
- Wed Feb 5 09:33:21 2014 OpenVPN 2.2.1 i686-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [eurephia] [MH] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Feb 27 2013
- Wed Feb 5 09:33:21 2014 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Enter Private Key Password:
- Wed Feb 5 09:33:24 2014 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Feb 5 09:33:24 2014 LZO compression initialized
- Wed Feb 5 09:33:24 2014 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
- Wed Feb 5 09:33:24 2014 Socket Buffers: R=[180224->131072] S=[180224->131072]
- Wed Feb 5 09:33:24 2014 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Wed Feb 5 09:33:24 2014 Local Options hash (VER=V4): '41690919'
- Wed Feb 5 09:33:24 2014 Expected Remote Options hash (VER=V4): '530fdded'
- Wed Feb 5 09:33:24 2014 UDPv4 link local: [undef]
- Wed Feb 5 09:33:24 2014 UDPv4 link remote: [AF_INET]203.xxx.yyy.40:1194
- Wed Feb 5 09:33:24 2014 TLS: Initial packet from [AF_INET]203.xxx.yyy.40:1194, sid=9671139e 605dcd0d
- Wed Feb 5 09:33:24 2014 VERIFY OK: depth=1, /CN=andrew-pc
- Wed Feb 5 09:33:24 2014 Validating certificate key usage
- Wed Feb 5 09:33:24 2014 ++ Certificate has key usage 00a0, expects 00a0
- Wed Feb 5 09:33:24 2014 VERIFY KU OK
- Wed Feb 5 09:33:24 2014 Validating certificate extended key usage
- Wed Feb 5 09:33:24 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Wed Feb 5 09:33:24 2014 VERIFY EKU OK
- Wed Feb 5 09:33:24 2014 VERIFY OK: depth=0, /CN=andrew-server.40
- Wed Feb 5 09:33:24 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Wed Feb 5 09:33:24 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Wed Feb 5 09:33:24 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Wed Feb 5 09:33:24 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Wed Feb 5 09:33:24 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Wed Feb 5 09:33:24 2014 [andrew-server.40] Peer Connection Initiated with [AF_INET]203.xxx.yyy.40:1194
- Wed Feb 5 09:33:26 2014 SENT CONTROL [andrew-server.40]: 'PUSH_REQUEST' (status=1)
- Wed Feb 5 09:33:26 2014 PUSH: Received control message: 'PUSH_REPLY,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Wed Feb 5 09:33:26 2014 OPTIONS IMPORT: timers and/or timeouts modified
- Wed Feb 5 09:33:26 2014 OPTIONS IMPORT: --ifconfig/up options modified
- Wed Feb 5 09:33:26 2014 OPTIONS IMPORT: route options modified
- Wed Feb 5 09:33:26 2014 ROUTE default_gateway=203.xxx.yyy.40
- Wed Feb 5 09:33:26 2014 Note: Cannot ioctl TUNSETIFF tun: Operation not permitted (errno=1)
- Wed Feb 5 09:33:26 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Wed Feb 5 09:33:26 2014 /sbin/ifconfig 10.8.0.6 pointopoint 10.8.0.5 mtu 1500
- SIOCSIFADDR: Operation not permitted
- : ERROR while getting interface flags: No such device
- SIOCSIFDSTADDR: Operation not permitted
- : ERROR while getting interface flags: No such device
- SIOCSIFMTU: Operation not permitted
- Wed Feb 5 09:33:26 2014 Linux ifconfig failed: external program exited with error status: 1
- Wed Feb 5 09:33:26 2014 Exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement