Advertisement
Guest User

Untitled

a guest
Apr 9th, 2012
183
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.54 KB | None | 0 0
  1. rastiazul@rastiazul ~ $ sudo openvpn --client --config $HOME/openvpn/anonine.ovpn --ca $HOME/openvpn/anonine.ca.crt
  2. Mon Apr 9 20:46:03 2012 OpenVPN 2.1.0 i486-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 20 2010
  3. Enter Auth Username:
  4. Enter Auth Password:
  5. Mon Apr 9 20:46:10 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  6. Mon Apr 9 20:46:10 2012 LZO compression initialized
  7. Mon Apr 9 20:46:10 2012 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  8. Mon Apr 9 20:46:10 2012 RESOLVE: NOTE: openvpn-3.anonine.net resolves to 24 addresses, choosing one by random
  9. Mon Apr 9 20:46:10 2012 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  10. Mon Apr 9 20:46:10 2012 Local Options hash (VER=V4): 'd79ca330'
  11. Mon Apr 9 20:46:10 2012 Expected Remote Options hash (VER=V4): 'f7df56b8'
  12. Mon Apr 9 20:46:10 2012 Socket Buffers: R=[112640->131072] S=[112640->131072]
  13. Mon Apr 9 20:46:10 2012 UDPv4 link local: [undef]
  14. Mon Apr 9 20:46:10 2012 UDPv4 link remote: [AF_INET]46.246.117.144:1199
  15. Mon Apr 9 20:46:11 2012 TLS: Initial packet from [AF_INET]46.246.117.144:1199, sid=b125b187 816c99a1
  16. Mon Apr 9 20:46:11 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  17. Mon Apr 9 20:46:12 2012 VERIFY OK: depth=1, /C=SE/ST=Calisota/L=Ankeborg/O=Anonine/OU=VPN/CN=Anonine_CA/emailAddress=support@anonine.com
  18. Mon Apr 9 20:46:12 2012 VERIFY OK: nsCertType=SERVER
  19. Mon Apr 9 20:46:12 2012 VERIFY OK: depth=0, /C=SE/ST=Calisota/L=Ankeborg/O=Anonine/CN=carme/emailAddress=support@anonine.com
  20. Mon Apr 9 20:46:13 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  21. Mon Apr 9 20:46:13 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  22. Mon Apr 9 20:46:13 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  23. Mon Apr 9 20:46:13 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  24. Mon Apr 9 20:46:13 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  25. Mon Apr 9 20:46:13 2012 [carme] Peer Connection Initiated with [AF_INET]46.246.117.144:1199
  26. Mon Apr 9 20:46:15 2012 SENT CONTROL [carme]: 'PUSH_REQUEST' (status=1)
  27. Mon Apr 9 20:46:15 2012 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 80.67.0.2,dhcp-option DNS 91.213.246.2,route-gateway 178.73.206.129,ping 10,ping-restart 30,ifconfig 178.73.206.223 255.255.255.128'
  28. Mon Apr 9 20:46:15 2012 OPTIONS IMPORT: timers and/or timeouts modified
  29. Mon Apr 9 20:46:15 2012 OPTIONS IMPORT: --ifconfig/up options modified
  30. Mon Apr 9 20:46:15 2012 OPTIONS IMPORT: route options modified
  31. Mon Apr 9 20:46:15 2012 OPTIONS IMPORT: route-related options modified
  32. Mon Apr 9 20:46:15 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  33. Mon Apr 9 20:46:15 2012 ROUTE default_gateway=192.168.10.1
  34. Mon Apr 9 20:46:15 2012 TUN/TAP device tap0 opened
  35. Mon Apr 9 20:46:15 2012 TUN/TAP TX queue length set to 100
  36. Mon Apr 9 20:46:15 2012 /sbin/ifconfig tap0 178.73.206.223 netmask 255.255.255.128 mtu 1500 broadcast 178.73.206.255
  37. Mon Apr 9 20:46:15 2012 /sbin/route add -net 46.246.117.144 netmask 255.255.255.255 gw 192.168.10.1
  38. Mon Apr 9 20:46:15 2012 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 178.73.206.129
  39. Mon Apr 9 20:46:15 2012 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 178.73.206.129
  40. Mon Apr 9 20:46:15 2012 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement