Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sat Jan 03 01:30:21 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec 1 2014
- Sat Jan 03 01:30:21 2015 library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.08
- Sat Jan 03 01:30:21 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Sat Jan 03 01:30:21 2015 Need hold release from management interface, waiting...
- Sat Jan 03 01:30:21 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'state on'
- Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'log all on'
- Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'hold off'
- Sat Jan 03 01:30:21 2015 MANAGEMENT: CMD 'hold release'
- Sat Jan 03 01:30:21 2015 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Sat Jan 03 01:30:21 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jan 03 01:30:21 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jan 03 01:30:21 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sat Jan 03 01:30:21 2015 Attempting to establish TCP connection with [AF_INET]xx.xx.xx.xx:500 [nonblock]
- Sat Jan 03 01:30:21 2015 MANAGEMENT: >STATE:1420245021,TCP_CONNECT,,,
- Sat Jan 03 01:30:22 2015 TCP connection established with [AF_INET]xx.xx.xx.xx:500
- Sat Jan 03 01:30:22 2015 TCPv4_CLIENT link local: [undef]
- Sat Jan 03 01:30:22 2015 TCPv4_CLIENT link remote: [AF_INET]xx.xx.xx.xx:500
- Sat Jan 03 01:30:22 2015 MANAGEMENT: >STATE:1420245022,WAIT,,,
- Sat Jan 03 01:30:22 2015 MANAGEMENT: >STATE:1420245022,AUTH,,,
- Sat Jan 03 01:30:22 2015 TLS: Initial packet from [AF_INET]xx.xx.xx.xx:500, sid=9d373638 0b3ba3a6
- Sat Jan 03 01:30:23 2015 VERIFY OK: depth=1, C=FR, ST=XX, L=Nowhere, O=ANONYMOUS, OU=AN, CN=ANONYMOUS CA, name=EasyRSA, [email protected]
- Sat Jan 03 01:30:23 2015 VERIFY OK: nsCertType=SERVER
- Sat Jan 03 01:30:23 2015 Validating certificate key usage
- Sat Jan 03 01:30:23 2015 ++ Certificate has key usage 00a0, expects 00a0
- Sat Jan 03 01:30:23 2015 VERIFY KU OK
- Sat Jan 03 01:30:23 2015 Validating certificate extended key usage
- Sat Jan 03 01:30:23 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sat Jan 03 01:30:23 2015 VERIFY EKU OK
- Sat Jan 03 01:30:23 2015 VERIFY OK: depth=0, C=FR, ST=XX, L=Nowhere, O=ANONYMOUS, OU=AN, CN=server, name=EasyRSA, [email protected]
- Sat Jan 03 01:30:25 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Jan 03 01:30:25 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jan 03 01:30:25 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Jan 03 01:30:25 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Jan 03 01:30:25 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sat Jan 03 01:30:25 2015 [server] Peer Connection Initiated with [AF_INET]xx.xx.xx.xx:500
- Sat Jan 03 01:30:26 2015 MANAGEMENT: >STATE:1420245026,GET_CONFIG,,,
- Sat Jan 03 01:30:27 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sat Jan 03 01:30:27 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: timers and/or timeouts modified
- Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: --ifconfig/up options modified
- Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: route options modified
- Sat Jan 03 01:30:27 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sat Jan 03 01:30:27 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sat Jan 03 01:30:27 2015 MANAGEMENT: >STATE:1420245027,ASSIGN_IP,,10.8.0.6,
- Sat Jan 03 01:30:27 2015 open_tun, tt->ipv6=0
- Sat Jan 03 01:30:27 2015 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{3C6983D2-26F9-4462-B395-EFCC442E186B}.tap
- Sat Jan 03 01:30:27 2015 TAP-Windows Driver Version 9.21
- Sat Jan 03 01:30:27 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {3C6983D2-26F9-4462-B395-EFCC442E186B} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
- Sat Jan 03 01:30:27 2015 Successful ARP Flush on interface [26] {3C6983D2-26F9-4462-B395-EFCC442E186B}
- Sat Jan 03 01:30:32 2015 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD xx.xx.xx.xx MASK 255.255.255.255 192.168.0.254
- Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
- Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 192.168.0.254 MASK 255.255.255.255 192.168.0.254 IF 3
- Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
- Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5
- Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
- Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5
- Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
- Sat Jan 03 01:30:32 2015 MANAGEMENT: >STATE:1420245032,ADD_ROUTES,,,
- Sat Jan 03 01:30:32 2015 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.5
- Sat Jan 03 01:30:32 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sat Jan 03 01:30:32 2015 Route addition via IPAPI succeeded [adaptive]
- Sat Jan 03 01:30:32 2015 Initialization Sequence Completed
- Sat Jan 03 01:30:32 2015 MANAGEMENT: >STATE:1420245032,CONNECTED,SUCCESS,10.8.0.6,xx.xx.xx.xx
Advertisement
Add Comment
Please, Sign In to add comment