Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue May 07 22:48:22 2013 OpenVPN 2.2-beta5 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Nov 30 2010
- Tue May 07 22:48:22 2013 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.
- Tue May 07 22:48:22 2013 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Tue May 07 22:48:25 2013 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Tue May 07 22:48:25 2013 LZO compression initialized
- Tue May 07 22:48:25 2013 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
- Tue May 07 22:48:25 2013 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Tue May 07 22:48:25 2013 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Tue May 07 22:48:25 2013 Local Options hash (VER=V4): '41690919'
- Tue May 07 22:48:25 2013 Expected Remote Options hash (VER=V4): '530fdded'
- Tue May 07 22:48:25 2013 UDPv4 link local (bound): [undef]:1194
- Tue May 07 22:48:25 2013 UDPv4 link remote: 199.15.249.2:1194
- Tue May 07 22:48:25 2013 TLS: Initial packet from 199.15.249.2:1194, sid=146ee0d9 fe9a820d
- Tue May 07 22:48:26 2013 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=Fort-Funston_CA/[email protected]
- Tue May 07 22:48:26 2013 Validating certificate key usage
- Tue May 07 22:48:26 2013 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 07 22:48:26 2013 VERIFY KU OK
- Tue May 07 22:48:26 2013 Validating certificate extended key usage
- Tue May 07 22:48:26 2013 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 07 22:48:26 2013 VERIFY EKU OK
- Tue May 07 22:48:26 2013 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=server/[email protected]
- Tue May 07 22:48:29 2013 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 07 22:48:29 2013 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 07 22:48:29 2013 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 07 22:48:29 2013 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 07 22:48:29 2013 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Tue May 07 22:48:29 2013 [server] Peer Connection Initiated with 199.15.249.2:1194
- Tue May 07 22:48:31 2013 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Tue May 07 22:48:31 2013 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Tue May 07 22:48:31 2013 OPTIONS IMPORT: timers and/or timeouts modified
- Tue May 07 22:48:31 2013 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 07 22:48:31 2013 OPTIONS IMPORT: route options modified
- Tue May 07 22:48:31 2013 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue May 07 22:48:31 2013 ROUTE default_gateway=192.168.1.1
- Tue May 07 22:48:31 2013 TAP-WIN32 device [Подключение по локальной сети] opened: \\.\Global\{B0146F60-54E4-4BAF-AADF-0FC5AE982DC2}.tap
- Tue May 07 22:48:31 2013 TAP-Win32 Driver Version 9.7
- Tue May 07 22:48:31 2013 TAP-Win32 MTU=1500
- Tue May 07 22:48:31 2013 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {B0146F60-54E4-4BAF-AADF-0FC5AE982DC2} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
- Tue May 07 22:48:31 2013 Successful ARP Flush on interface [22] {B0146F60-54E4-4BAF-AADF-0FC5AE982DC2}
- Tue May 07 22:48:37 2013 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 199.15.249.2 MASK 255.255.255.255 192.168.1.1
- Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
- Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5
- Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
- Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5
- Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
- Tue May 07 22:48:37 2013 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.5
- Tue May 07 22:48:37 2013 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Tue May 07 22:48:37 2013 Route addition via IPAPI succeeded [adaptive]
- Tue May 07 22:48:37 2013 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment