OZulfugarov

OpenVPN Status client

May 7th, 2013
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Tue May 07 22:48:22 2013 OpenVPN 2.2-beta5 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Nov 30 2010
  2. Tue May 07 22:48:22 2013 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA.  OpenVPN 2.0-beta16 and earlier used 5000 as the default port.
  3. Tue May 07 22:48:22 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4. Tue May 07 22:48:25 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  5. Tue May 07 22:48:25 2013 LZO compression initialized
  6. Tue May 07 22:48:25 2013 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
  7. Tue May 07 22:48:25 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
  8. Tue May 07 22:48:25 2013 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
  9. Tue May 07 22:48:25 2013 Local Options hash (VER=V4): '41690919'
  10. Tue May 07 22:48:25 2013 Expected Remote Options hash (VER=V4): '530fdded'
  11. Tue May 07 22:48:25 2013 UDPv4 link local (bound): [undef]:1194
  12. Tue May 07 22:48:25 2013 UDPv4 link remote: 199.15.249.2:1194
  13. Tue May 07 22:48:25 2013 TLS: Initial packet from 199.15.249.2:1194, sid=146ee0d9 fe9a820d
  14. Tue May 07 22:48:26 2013 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=Fort-Funston_CA/[email protected]
  15. Tue May 07 22:48:26 2013 Validating certificate key usage
  16. Tue May 07 22:48:26 2013 ++ Certificate has key usage  00a0, expects 00a0
  17. Tue May 07 22:48:26 2013 VERIFY KU OK
  18. Tue May 07 22:48:26 2013 Validating certificate extended key usage
  19. Tue May 07 22:48:26 2013 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  20. Tue May 07 22:48:26 2013 VERIFY EKU OK
  21. Tue May 07 22:48:26 2013 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=server/[email protected]
  22. Tue May 07 22:48:29 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  23. Tue May 07 22:48:29 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  24. Tue May 07 22:48:29 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  25. Tue May 07 22:48:29 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  26. Tue May 07 22:48:29 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  27. Tue May 07 22:48:29 2013 [server] Peer Connection Initiated with 199.15.249.2:1194
  28. Tue May 07 22:48:31 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  29. Tue May 07 22:48:31 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
  30. Tue May 07 22:48:31 2013 OPTIONS IMPORT: timers and/or timeouts modified
  31. Tue May 07 22:48:31 2013 OPTIONS IMPORT: --ifconfig/up options modified
  32. Tue May 07 22:48:31 2013 OPTIONS IMPORT: route options modified
  33. Tue May 07 22:48:31 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  34. Tue May 07 22:48:31 2013 ROUTE default_gateway=192.168.1.1
  35. Tue May 07 22:48:31 2013 TAP-WIN32 device [Подключение по локальной сети] opened: \\.\Global\{B0146F60-54E4-4BAF-AADF-0FC5AE982DC2}.tap
  36. Tue May 07 22:48:31 2013 TAP-Win32 Driver Version 9.7
  37. Tue May 07 22:48:31 2013 TAP-Win32 MTU=1500
  38. Tue May 07 22:48:31 2013 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {B0146F60-54E4-4BAF-AADF-0FC5AE982DC2} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
  39. Tue May 07 22:48:31 2013 Successful ARP Flush on interface [22] {B0146F60-54E4-4BAF-AADF-0FC5AE982DC2}
  40. Tue May 07 22:48:37 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  41. Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 199.15.249.2 MASK 255.255.255.255 192.168.1.1
  42. Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  43. Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
  44. Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5
  45. Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
  46. Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
  47. Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5
  48. Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
  49. Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
  50. Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.5
  51. Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
  52. Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
  53. Tue May 07 22:48:37 2013 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment