Guest User

logs

a guest
Jan 2nd, 2015
53
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.02 KB | None | 0 0
  1. Sat Jan 03 01:30:21 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec 1 2014
  2. Sat Jan 03 01:30:21 2015 library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.08
  3. Sat Jan 03 01:30:21 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  4. Sat Jan 03 01:30:21 2015 Need hold release from management interface, waiting...
  5. Sat Jan 03 01:30:21 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  6. Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'state on'
  7. Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'log all on'
  8. Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'hold off'
  9. Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'hold release'
  10. Sat Jan 03 01:30:21 2015 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
  11. Sat Jan 03 01:30:21 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  12. Sat Jan 03 01:30:21 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  13. Sat Jan 03 01:30:21 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
  14. Sat Jan 03 01:30:21 2015 Attempting to establish TCP connection with [AF_INET]xx.xx.xx.xx:500 [nonblock]
  15. Sat Jan 03 01:30:21 2015 MANAGEMENT: >STATE:1420245021,TCP_CONNECT,,,
  16. Sat Jan 03 01:30:22 2015 TCP connection established with [AF_INET]xx.xx.xx.xx:500
  17. Sat Jan 03 01:30:22 2015 TCPv4_CLIENT link local: [undef]
  18. Sat Jan 03 01:30:22 2015 TCPv4_CLIENT link remote: [AF_INET]xx.xx.xx.xx:500
  19. Sat Jan 03 01:30:22 2015 MANAGEMENT: >STATE:1420245022,WAIT,,,
  20. Sat Jan 03 01:30:22 2015 MANAGEMENT: >STATE:1420245022,AUTH,,,
  21. Sat Jan 03 01:30:22 2015 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:500, sid=9d373638 0b3ba3a6
  22. Sat Jan 03 01:30:23 2015 VERIFY OK: depth=1, C=FR, ST=XX, L=Nowhere, O=ANONYMOUS, OU=AN, CN=ANONYMOUS CA, name=EasyRSA, [email protected]
  23. Sat Jan 03 01:30:23 2015 VERIFY OK: nsCertType=SERVER
  24. Sat Jan 03 01:30:23 2015 Validating certificate key usage
  25. Sat Jan 03 01:30:23 2015 ++ Certificate has key usage 00a0, expects 00a0
  26. Sat Jan 03 01:30:23 2015 VERIFY KU OK
  27. Sat Jan 03 01:30:23 2015 Validating certificate extended key usage
  28. Sat Jan 03 01:30:23 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  29. Sat Jan 03 01:30:23 2015 VERIFY EKU OK
  30. Sat Jan 03 01:30:23 2015 VERIFY OK: depth=0, C=FR, ST=XX, L=Nowhere, O=ANONYMOUS, OU=AN, CN=server, name=EasyRSA, [email protected]
  31. Sat Jan 03 01:30:25 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  32. Sat Jan 03 01:30:25 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  33. Sat Jan 03 01:30:25 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  34. Sat Jan 03 01:30:25 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  35. Sat Jan 03 01:30:25 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  36. Sat Jan 03 01:30:25 2015 [server] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:500
  37. Sat Jan 03 01:30:26 2015 MANAGEMENT: >STATE:1420245026,GET_CONFIG,,,
  38. Sat Jan 03 01:30:27 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  39. Sat Jan 03 01:30:27 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
  40. Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: timers and/or timeouts modified
  41. Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: --ifconfig/up options modified
  42. Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: route options modified
  43. Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  44. Sat Jan 03 01:30:27 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  45. Sat Jan 03 01:30:27 2015 MANAGEMENT: >STATE:1420245027,ASSIGN_IP,,10.8.0.6,
  46. Sat Jan 03 01:30:27 2015 open_tun, tt->ipv6=0
  47. Sat Jan 03 01:30:27 2015 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{3C6983D2-26F9-4462-B395-EFCC442E186B}.tap
  48. Sat Jan 03 01:30:27 2015 TAP-Windows Driver Version 9.21
  49. Sat Jan 03 01:30:27 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {3C6983D2-26F9-4462-B395-EFCC442E186B} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
  50. Sat Jan 03 01:30:27 2015 Successful ARP Flush on interface [26] {3C6983D2-26F9-4462-B395-EFCC442E186B}
  51. Sat Jan 03 01:30:32 2015 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  52. Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD xx.xx.xx.xx MASK 255.255.255.255 192.168.0.254
  53. Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  54. Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
  55. Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 192.168.0.254 MASK 255.255.255.255 192.168.0.254 IF 3
  56. Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  57. Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
  58. Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5
  59. Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  60. Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
  61. Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5
  62. Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  63. Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
  64. Sat Jan 03 01:30:32 2015 MANAGEMENT: >STATE:1420245032,ADD_ROUTES,,,
  65. Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.5
  66. Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  67. Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
  68. Sat Jan 03 01:30:32 2015 Initialization Sequence Completed
  69. Sat Jan 03 01:30:32 2015 MANAGEMENT: >STATE:1420245032,CONNECTED,SUCCESS,10.8.0.6,xx.xx.xx.xx
Advertisement
Add Comment
Please, Sign In to add comment