Advertisement
Guest User

Untitled

a guest
Jun 30th, 2014
191
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.89 KB | None | 0 0
  1. Jun 30 15:22:55 openvpn: user 'railgun' authenticated
  2. Jun 30 15:22:55 openvpn[69392]: 192.168.1.122:54533 [railgun] Peer Connection Initiated with [AF_INET]192.168.1.122:54533
  3. Jun 30 15:22:55 openvpn[69392]: railgun/192.168.1.122:54533 MULTI_sva: pool returned IPv4=10.235.212.6, IPv6=(Not enabled)
  4. Jun 30 15:22:57 openvpn[69392]: railgun/192.168.1.122:54533 send_push_reply(): safe_cap=940
  5. Jun 30 15:23:04 openvpn[91254]: TLS: soft reset sec=0 bytes=270710199/0 pkts=614103/0
  6. Jun 30 15:23:04 openvpn[91254]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  7. Jun 30 15:23:04 openvpn[91254]: Validating certificate key usage
  8. Jun 30 15:23:04 openvpn[91254]: ++ Certificate has key usage 00a0, expects 00a0
  9. Jun 30 15:23:04 openvpn[91254]: VERIFY KU OK
  10. Jun 30 15:23:04 openvpn[91254]: Validating certificate extended key usage
  11. Jun 30 15:23:04 openvpn[91254]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  12. Jun 30 15:23:04 openvpn[91254]: VERIFY EKU OK
  13. Jun 30 15:23:04 openvpn[91254]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  14. Jun 30 15:23:04 openvpn[91254]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  15. Jun 30 15:23:04 openvpn[91254]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  16. Jun 30 15:23:04 openvpn[91254]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  17. Jun 30 15:23:04 openvpn[91254]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  18. Jun 30 15:23:04 openvpn[91254]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  19. Jun 30 15:23:19 openvpn[524]: TLS: tls_process: killed expiring key
  20. Jun 30 15:23:20 openvpn[524]: TLS: soft reset sec=0 bytes=375140/0 pkts=3886/0
  21. Jun 30 15:23:20 openvpn[524]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  22. Jun 30 15:23:20 openvpn[524]: Validating certificate key usage
  23. Jun 30 15:23:20 openvpn[524]: ++ Certificate has key usage 00a0, expects 00a0
  24. Jun 30 15:23:20 openvpn[524]: VERIFY KU OK
  25. Jun 30 15:23:20 openvpn[524]: Validating certificate extended key usage
  26. Jun 30 15:23:20 openvpn[524]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  27. Jun 30 15:23:20 openvpn[524]: VERIFY EKU OK
  28. Jun 30 15:23:20 openvpn[524]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  29. Jun 30 15:23:21 openvpn[524]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  30. Jun 30 15:23:21 openvpn[524]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  31. Jun 30 15:23:21 openvpn[524]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  32. Jun 30 15:23:21 openvpn[524]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  33. Jun 30 15:23:21 openvpn[524]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  34. Jun 30 15:23:37 openvpn[12422]: TLS: tls_process: killed expiring key
  35. Jun 30 15:23:39 openvpn[12422]: TLS: soft reset sec=0 bytes=375241/0 pkts=3887/0
  36. Jun 30 15:23:40 openvpn[12422]: VERIFY OK: depth=1, C=US, ST=OH, L=Columbus, O=Private Internet Access, CN=Private Internet Access CA, emailAddress=secure@privateinternetaccess.com
  37. Jun 30 15:23:40 openvpn[12422]: Validating certificate key usage
  38. Jun 30 15:23:40 openvpn[12422]: ++ Certificate has key usage 00a0, expects 00a0
  39. Jun 30 15:23:40 openvpn[12422]: VERIFY KU OK
  40. Jun 30 15:23:40 openvpn[12422]: Validating certificate extended key usage
  41. Jun 30 15:23:40 openvpn[12422]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  42. Jun 30 15:23:40 openvpn[12422]: VERIFY EKU OK
  43. Jun 30 15:23:40 openvpn[12422]: VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  44. Jun 30 15:23:40 openvpn[12422]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  45. Jun 30 15:23:40 openvpn[12422]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  46. Jun 30 15:23:40 openvpn[12422]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  47. Jun 30 15:23:40 openvpn[12422]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  48. Jun 30 15:23:40 openvpn[12422]: Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement