Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- May 1 10:13:30 openvpn 58105 ROUTE_GATEWAY 76.252.172.1
- May 1 10:13:30 openvpn 58105 TUN/TAP device ovpnc1 exists previously, keep at program end
- May 1 10:13:30 openvpn 58105 TUN/TAP device /dev/tun1 opened
- May 1 10:13:30 openvpn 58105 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- May 1 10:13:30 openvpn 58105 /sbin/ifconfig ovpnc1 10.20.10.6 10.20.10.5 mtu 1500 netmask 255.255.255.255 up
- May 1 10:13:30 openvpn 58105 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1560 10.20.10.6 10.20.10.5 init
- May 1 10:13:30 openvpn 58105 Initialization Sequence Completed
- May 1 10:18:58 openvpn 58105 MANAGEMENT: Client connected from /var/etc/openvpn/client1.sock
- May 1 10:18:58 openvpn 58105 MANAGEMENT: CMD 'state 1'
- May 1 10:18:58 openvpn 58105 MANAGEMENT: CMD 'status 2'
- May 1 10:18:58 openvpn 58105 MANAGEMENT: Client disconnected
- May 1 10:19:27 openvpn 58105 [706d7693721e5b67d3cd20e49ffcb621] Inactivity timeout (--ping-restart), restarting
- May 1 10:19:27 openvpn 58105 TCP/UDP: Closing socket
- May 1 10:19:27 openvpn 58105 SIGUSR1[soft,ping-restart] received, process restarting
- May 1 10:19:27 openvpn 58105 Restart pause, 2 second(s)
- May 1 10:19:29 openvpn 58105 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- May 1 10:19:29 openvpn 58105 Re-using SSL/TLS context
- May 1 10:19:29 openvpn 58105 LZO compression initialized
- May 1 10:19:29 openvpn 58105 Control Channel MTU parms [ L:1558 D:1212 EF:38 EB:0 ET:0 EL:3 ]
- May 1 10:19:29 openvpn 58105 Socket Buffers: R=[42080->42080] S=[57344->57344]
- May 1 10:19:29 openvpn 58105 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:143 ET:0 EL:3 AF:3/1 ]
- May 1 10:19:29 openvpn 58105 Local Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
- May 1 10:19:29 openvpn 58105 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-128-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
- May 1 10:19:29 openvpn 58105 Local Options hash (VER=V4): '66096c33'
- May 1 10:19:29 openvpn 58105 Expected Remote Options hash (VER=V4): '691e95c7'
- May 1 10:19:29 openvpn 58105 UDPv4 link local (bound): [AF_INET]76.252.172.72
- May 1 10:19:29 openvpn 58105 UDPv4 link remote: [AF_INET]172.98.67.93:1198
- May 1 10:19:29 openvpn 58105 TLS: Initial packet from [AF_INET]172.98.67.93:1198, sid=c73383c5 b9ec1279
- May 1 10:19:29 openvpn 58105 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
- May 1 10:19:29 openvpn 58105 Validating certificate key usage
- May 1 10:19:29 openvpn 58105 ++ Certificate has key usage 00a0, expects 00a0
- May 1 10:19:29 openvpn 58105 VERIFY KU OK
- May 1 10:19:29 openvpn 58105 Validating certificate extended key usage
- May 1 10:19:29 openvpn 58105 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- May 1 10:19:29 openvpn 58105 VERIFY EKU OK
- May 1 10:19:29 openvpn 58105 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=2af46f5c059ee3d03726456db9356b93, name=2af46f5c059ee3d03726456db9356b93
- May 1 10:19:29 openvpn 58105 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1558', remote='link-mtu 1542'
- May 1 10:19:29 openvpn 58105 WARNING: 'cipher' is used inconsistently, local='cipher AES-128-CBC', remote='cipher BF-CBC'
- May 1 10:19:29 openvpn 58105 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- May 1 10:19:29 openvpn 58105 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- May 1 10:19:29 openvpn 58105 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- May 1 10:19:29 openvpn 58105 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- May 1 10:19:29 openvpn 58105 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- May 1 10:19:29 openvpn 58105 [2af46f5c059ee3d03726456db9356b93] Peer Connection Initiated with [AF_INET]172.98.67.93:1198
- May 1 10:19:31 openvpn 58105 SENT CONTROL [2af46f5c059ee3d03726456db9356b93]: 'PUSH_REQUEST' (status=1)
- May 1 10:19:31 openvpn 58105 AUTH: Received control message: AUTH_FAILED
- May 1 10:19:31 openvpn 58105 TCP/UDP: Closing socket
- May 1 10:19:31 openvpn 58105 Closing TUN/TAP interface
- May 1 10:19:31 openvpn 58105 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1558 10.20.10.6 10.20.10.5 init
- May 1 10:19:31 openvpn 58105 SIGTERM[soft,auth-failure] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement