Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Jun 30 15:22:55 openvpn: user 'railgun' authenticated
- Jun 30 15:22:55 openvpn[69392]: 192.168.1.122:54533 [railgun] Peer Connection Initiated with [AF_INET]192.168.1.122:54533
- Jun 30 15:22:55 openvpn[69392]: railgun/192.168.1.122:54533 MULTI_sva: pool returned IPv4=10.235.212.6, IPv6=(Not enabled)
- Jun 30 15:22:57 openvpn[69392]: railgun/192.168.1.122:54533 send_push_reply(): safe_cap=940
- Jun 30 15:23:04 openvpn[91254]: TLS: soft reset sec=0 bytes=270710199/0 pkts=614103/0
- Jun 30 15:23:04 openvpn[91254]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Jun 30 15:23:04 openvpn[91254]: Validating certificate key usage
- Jun 30 15:23:04 openvpn[91254]: ++ Certificate has key usage 00a0, expects 00a0
- Jun 30 15:23:04 openvpn[91254]: VERIFY KU OK
- Jun 30 15:23:04 openvpn[91254]: Validating certificate extended key usage
- Jun 30 15:23:04 openvpn[91254]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jun 30 15:23:04 openvpn[91254]: VERIFY EKU OK
- Jun 30 15:23:04 openvpn[91254]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jun 30 15:23:04 openvpn[91254]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jun 30 15:23:04 openvpn[91254]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 30 15:23:04 openvpn[91254]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jun 30 15:23:04 openvpn[91254]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 30 15:23:04 openvpn[91254]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Jun 30 15:23:19 openvpn[524]: TLS: tls_process: killed expiring key
- Jun 30 15:23:20 openvpn[524]: TLS: soft reset sec=0 bytes=375140/0 pkts=3886/0
- Jun 30 15:23:20 openvpn[524]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Jun 30 15:23:20 openvpn[524]: Validating certificate key usage
- Jun 30 15:23:20 openvpn[524]: ++ Certificate has key usage 00a0, expects 00a0
- Jun 30 15:23:20 openvpn[524]: VERIFY KU OK
- Jun 30 15:23:20 openvpn[524]: Validating certificate extended key usage
- Jun 30 15:23:20 openvpn[524]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jun 30 15:23:20 openvpn[524]: VERIFY EKU OK
- Jun 30 15:23:20 openvpn[524]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jun 30 15:23:21 openvpn[524]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jun 30 15:23:21 openvpn[524]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 30 15:23:21 openvpn[524]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jun 30 15:23:21 openvpn[524]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 30 15:23:21 openvpn[524]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Jun 30 15:23:37 openvpn[12422]: TLS: tls_process: killed expiring key
- Jun 30 15:23:39 openvpn[12422]: TLS: soft reset sec=0 bytes=375241/0 pkts=3887/0
- Jun 30 15:23:40 openvpn[12422]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
- Jun 30 15:23:40 openvpn[12422]: Validating certificate key usage
- Jun 30 15:23:40 openvpn[12422]: ++ Certificate has key usage 00a0, expects 00a0
- Jun 30 15:23:40 openvpn[12422]: VERIFY KU OK
- Jun 30 15:23:40 openvpn[12422]: Validating certificate extended key usage
- Jun 30 15:23:40 openvpn[12422]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Jun 30 15:23:40 openvpn[12422]: VERIFY EKU OK
- Jun 30 15:23:40 openvpn[12422]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- Jun 30 15:23:40 openvpn[12422]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jun 30 15:23:40 openvpn[12422]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 30 15:23:40 openvpn[12422]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Jun 30 15:23:40 openvpn[12422]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Jun 30 15:23:40 openvpn[12422]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement