# openvpn --config config.ovpn Mon Dec 15 17:40:02 2014 OpenVPN 2.3.6 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Dec 1 2014 Mon Dec 15 17:40:02 2014 library versions: OpenSSL 1.0.1j-fips 15 Oct 2014, LZO 2.08 Mon Dec 15 17:40:02 2014 Control Channel Authentication: tls-auth using INLINE static key file Mon Dec 15 17:40:02 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Dec 15 17:40:02 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Dec 15 17:40:02 2014 Socket Buffers: R=[87380->131072] S=[16384->131072] Mon Dec 15 17:40:02 2014 Attempting to establish TCP connection with [AF_INET]78.129.153.40:443 [nonblock] Mon Dec 15 17:40:03 2014 TCP connection established with [AF_INET]78.129.153.40:443 Mon Dec 15 17:40:03 2014 TCPv4_CLIENT link local: [undef] Mon Dec 15 17:40:03 2014 TCPv4_CLIENT link remote: [AF_INET]78.129.153.40:443 Mon Dec 15 17:40:03 2014 TLS: Initial packet from [AF_INET]78.129.153.40:443, sid=ed549190 620a2508 Mon Dec 15 17:40:06 2014 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org Mon Dec 15 17:40:06 2014 Validating certificate key usage Mon Dec 15 17:40:06 2014 ++ Certificate has key usage 00a0, expects 00a0 Mon Dec 15 17:40:06 2014 VERIFY KU OK Mon Dec 15 17:40:06 2014 Validating certificate extended key usage Mon Dec 15 17:40:06 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Mon Dec 15 17:40:06 2014 VERIFY EKU OK Mon Dec 15 17:40:06 2014 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org Mon Dec 15 17:40:12 2014 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Dec 15 17:40:12 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Dec 15 17:40:12 2014 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Dec 15 17:40:12 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Dec 15 17:40:12 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 AES128-SHA, 4096 bit RSA Mon Dec 15 17:40:12 2014 [server] Peer Connection Initiated with [AF_INET]78.129.153.40:443 Mon Dec 15 17:40:14 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Mon Dec 15 17:40:14 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.5.0.1,comp-lzo no,route 10.5.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.5.6.62 10.5.6.61' Mon Dec 15 17:40:14 2014 OPTIONS IMPORT: timers and/or timeouts modified Mon Dec 15 17:40:14 2014 OPTIONS IMPORT: LZO parms modified Mon Dec 15 17:40:14 2014 OPTIONS IMPORT: --ifconfig/up options modified Mon Dec 15 17:40:14 2014 OPTIONS IMPORT: route options modified Mon Dec 15 17:40:14 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Mon Dec 15 17:40:14 2014 ROUTE_GATEWAY 192.168.100.1/255.255.255.0 IFACE=wlp3s0 HWADDR=4c:80:93:66:b2:64 Mon Dec 15 17:40:14 2014 TUN/TAP device tun0 opened Mon Dec 15 17:40:14 2014 TUN/TAP TX queue length set to 100 Mon Dec 15 17:40:14 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Mon Dec 15 17:40:14 2014 /usr/sbin/ip link set dev tun0 up mtu 1500 Mon Dec 15 17:40:14 2014 /usr/sbin/ip addr add dev tun0 local 10.5.6.62 peer 10.5.6.61 Mon Dec 15 17:40:14 2014 /usr/sbin/ip route add 78.129.153.40/32 via 192.168.100.1 Mon Dec 15 17:40:14 2014 /usr/sbin/ip route add 0.0.0.0/1 via 10.5.6.61 Mon Dec 15 17:40:14 2014 /usr/sbin/ip route add 128.0.0.0/1 via 10.5.6.61 Mon Dec 15 17:40:14 2014 /usr/sbin/ip route add 10.5.0.1/32 via 10.5.6.61 Mon Dec 15 17:40:14 2014 Initialization Sequence Completed