Advertisement
Guest User

Untitled

a guest
May 1st, 2017
81
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.60 KB | None | 0 0
  1. May 1 10:13:30 openvpn 58105 ROUTE_GATEWAY 76.252.172.1
  2. May 1 10:13:30 openvpn 58105 TUN/TAP device ovpnc1 exists previously, keep at program end
  3. May 1 10:13:30 openvpn 58105 TUN/TAP device /dev/tun1 opened
  4. May 1 10:13:30 openvpn 58105 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  5. May 1 10:13:30 openvpn 58105 /sbin/ifconfig ovpnc1 10.20.10.6 10.20.10.5 mtu 1500 netmask 255.255.255.255 up
  6. May 1 10:13:30 openvpn 58105 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1560 10.20.10.6 10.20.10.5 init
  7. May 1 10:13:30 openvpn 58105 Initialization Sequence Completed
  8. May 1 10:18:58 openvpn 58105 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
  9. May 1 10:18:58 openvpn 58105 MANAGEMENT: CMD 'state 1'
  10. May 1 10:18:58 openvpn 58105 MANAGEMENT: CMD 'status 2'
  11. May 1 10:18:58 openvpn 58105 MANAGEMENT: Client disconnected
  12. May 1 10:19:27 openvpn 58105 [706d7693721e5b67d3cd20e49ffcb621] Inactivity timeout (--ping-restart), restarting
  13. May 1 10:19:27 openvpn 58105 TCP/UDP: Closing socket
  14. May 1 10:19:27 openvpn 58105 SIGUSR1[soft,ping-restart] received, process restarting
  15. May 1 10:19:27 openvpn 58105 Restart pause, 2 second(s)
  16. May 1 10:19:29 openvpn 58105 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  17. May 1 10:19:29 openvpn 58105 Re-using SSL/TLS context
  18. May 1 10:19:29 openvpn 58105 LZO compression initialized
  19. May 1 10:19:29 openvpn 58105 Control Channel MTU parms [ L:1558 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  20. May 1 10:19:29 openvpn 58105 Socket Buffers: R=[42080->42080] S=[57344->57344]
  21. May 1 10:19:29 openvpn 58105 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:143 ET:0 EL:3 AF:3/1 ]
  22. May 1 10:19:29 openvpn 58105 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
  23. May 1 10:19:29 openvpn 58105 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
  24. May 1 10:19:29 openvpn 58105 Local Options hash (VER=V4): '66096c33'
  25. May 1 10:19:29 openvpn 58105 Expected Remote Options hash (VER=V4): '691e95c7'
  26. May 1 10:19:29 openvpn 58105 UDPv4 link local (bound): [AF_INET]76.252.172.72
  27. May 1 10:19:29 openvpn 58105 UDPv4 link remote: [AF_INET]172.98.67.93:1198
  28. May 1 10:19:29 openvpn 58105 TLS: Initial packet from [AF_INET]172.98.67.93:1198, sid=c73383c5 b9ec1279
  29. May 1 10:19:29 openvpn 58105 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  30. May 1 10:19:29 openvpn 58105 Validating certificate key usage
  31. May 1 10:19:29 openvpn 58105 ++ Certificate has key usage 00a0, expects 00a0
  32. May 1 10:19:29 openvpn 58105 VERIFY KU OK
  33. May 1 10:19:29 openvpn 58105 Validating certificate extended key usage
  34. May 1 10:19:29 openvpn 58105 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  35. May 1 10:19:29 openvpn 58105 VERIFY EKU OK
  36. May 1 10:19:29 openvpn 58105 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=2af46f5c059ee3d03726456db9356b93, name=2af46f5c059ee3d03726456db9356b93
  37. May 1 10:19:29 openvpn 58105 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
  38. May 1 10:19:29 openvpn 58105 WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
  39. May 1 10:19:29 openvpn 58105 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  40. May 1 10:19:29 openvpn 58105 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  41. May 1 10:19:29 openvpn 58105 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  42. May 1 10:19:29 openvpn 58105 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  43. May 1 10:19:29 openvpn 58105 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  44. May 1 10:19:29 openvpn 58105 [2af46f5c059ee3d03726456db9356b93] Peer Connection Initiated with [AF_INET]172.98.67.93:1198
  45. May 1 10:19:31 openvpn 58105 SENT CONTROL [2af46f5c059ee3d03726456db9356b93]: 'PUSH_REQUEST' (status=1)
  46. May 1 10:19:31 openvpn 58105 AUTH: Received control message: AUTH_FAILED
  47. May 1 10:19:31 openvpn 58105 TCP/UDP: Closing socket
  48. May 1 10:19:31 openvpn 58105 Closing TUN/TAP interface
  49. May 1 10:19:31 openvpn 58105 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1558 10.20.10.6 10.20.10.5 init
  50. May 1 10:19:31 openvpn 58105 SIGTERM[soft,auth-failure] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement