Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Thu Mar 23 15:40:45 2017 OpenVPN 2.3.0 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Mar 23 2015
- Enter Management Password:
- Thu Mar 23 15:40:45 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Thu Mar 23 15:40:45 2017 Need hold release from management interface, waiting...
- Thu Mar 23 15:40:45 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Thu Mar 23 15:40:45 2017 MANAGEMENT: CMD 'state on'
- Thu Mar 23 15:40:45 2017 MANAGEMENT: CMD 'log all on'
- Thu Mar 23 15:40:45 2017 MANAGEMENT: CMD 'hold off'
- Thu Mar 23 15:40:45 2017 MANAGEMENT: CMD 'hold release'
- Thu Mar 23 15:40:57 2017 MANAGEMENT: CMD 'username "Auth" "jacob.skuratovski@ssi-schaefer.com"'
- Thu Mar 23 15:40:57 2017 MANAGEMENT: CMD 'password [...]'
- Thu Mar 23 15:40:57 2017 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
- Thu Mar 23 15:40:57 2017 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Thu Mar 23 15:40:57 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Thu Mar 23 15:40:57 2017 MANAGEMENT: >STATE:1490280057,RESOLVE,,,
- Thu Mar 23 15:40:57 2017 UDPv4 link local: [undef]
- Thu Mar 23 15:40:57 2017 UDPv4 link remote: [AF_INET]212.185.103.88:1194
- Thu Mar 23 15:40:57 2017 MANAGEMENT: >STATE:1490280057,WAIT,,,
- Thu Mar 23 15:40:57 2017 MANAGEMENT: >STATE:1490280057,AUTH,,,
- Thu Mar 23 15:40:57 2017 TLS: Initial packet from [AF_INET]212.185.103.88:1194, sid=1043c01f 93afd860
- Thu Mar 23 15:40:57 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu Mar 23 15:40:58 2017 VERIFY OK: depth=1, C=de, L=Giebelstadt, O=SSI Schaefer Noell, CN=SSI Schaefer Noell VPN CA, emailAddress=fw-admins@ssi-schaefer-noell.com
- Thu Mar 23 15:40:58 2017 VERIFY X509NAME OK: C=de, L=Giebelstadt, O=SSI Schaefer Noell, CN=wufw1.ssi-schaefer-noell.com, emailAddress=fw-admins@ssi-schaefer-noell.com
- Thu Mar 23 15:40:58 2017 VERIFY OK: depth=0, C=de, L=Giebelstadt, O=SSI Schaefer Noell, CN=wufw1.ssi-schaefer-noell.com, emailAddress=fw-admins@ssi-schaefer-noell.com
- Thu Mar 23 15:40:58 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Thu Mar 23 15:40:58 2017 Data Channel Encrypt: Using 128 bit message hash 'MD5' for HMAC authentication
- Thu Mar 23 15:40:58 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Thu Mar 23 15:40:58 2017 Data Channel Decrypt: Using 128 bit message hash 'MD5' for HMAC authentication
- Thu Mar 23 15:40:58 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Thu Mar 23 15:40:58 2017 [wufw1.ssi-schaefer-noell.com] Peer Connection Initiated with [AF_INET]212.185.103.88:1194
- Thu Mar 23 15:40:59 2017 MANAGEMENT: >STATE:1490280059,GET_CONFIG,,,
- Thu Mar 23 15:41:00 2017 SENT CONTROL [wufw1.ssi-schaefer-noell.com]: 'PUSH_REQUEST' (status=1)
- Thu Mar 23 15:41:01 2017 AUTH: Received control message: AUTH_FAILED
- Thu Mar 23 15:41:01 2017 SIGUSR1[soft,auth-failure] received, process restarting
- Thu Mar 23 15:41:01 2017 MANAGEMENT: >STATE:1490280061,RECONNECTING,auth-failure,,
- Thu Mar 23 15:41:01 2017 Restart pause, 2 second(s)
- Thu Mar 23 15:41:11 2017 MANAGEMENT: CMD 'username "Auth" "jacob.skuratovski"'
- Thu Mar 23 15:41:11 2017 MANAGEMENT: CMD 'password [...]'
- Thu Mar 23 15:41:11 2017 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
- Thu Mar 23 15:41:11 2017 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Thu Mar 23 15:41:11 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Thu Mar 23 15:41:11 2017 MANAGEMENT: >STATE:1490280071,RESOLVE,,,
- Thu Mar 23 15:41:11 2017 UDPv4 link local: [undef]
- Thu Mar 23 15:41:11 2017 UDPv4 link remote: [AF_INET]212.185.103.88:1194
- Thu Mar 23 15:41:11 2017 MANAGEMENT: >STATE:1490280071,WAIT,,,
- Thu Mar 23 15:41:11 2017 MANAGEMENT: >STATE:1490280071,AUTH,,,
- Thu Mar 23 15:41:11 2017 TLS: Initial packet from [AF_INET]212.185.103.88:1194, sid=3ca59337 f9a917c1
- Thu Mar 23 15:41:11 2017 VERIFY OK: depth=1, C=de, L=Giebelstadt, O=SSI Schaefer Noell, CN=SSI Schaefer Noell VPN CA, emailAddress=fw-admins@ssi-schaefer-noell.com
- Thu Mar 23 15:41:11 2017 VERIFY X509NAME OK: C=de, L=Giebelstadt, O=SSI Schaefer Noell, CN=wufw1.ssi-schaefer-noell.com, emailAddress=fw-admins@ssi-schaefer-noell.com
- Thu Mar 23 15:41:11 2017 VERIFY OK: depth=0, C=de, L=Giebelstadt, O=SSI Schaefer Noell, CN=wufw1.ssi-schaefer-noell.com, emailAddress=fw-admins@ssi-schaefer-noell.com
- Thu Mar 23 15:41:11 2017 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Thu Mar 23 15:41:11 2017 Data Channel Encrypt: Using 128 bit message hash 'MD5' for HMAC authentication
- Thu Mar 23 15:41:11 2017 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Thu Mar 23 15:41:11 2017 Data Channel Decrypt: Using 128 bit message hash 'MD5' for HMAC authentication
- Thu Mar 23 15:41:11 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Thu Mar 23 15:41:11 2017 [wufw1.ssi-schaefer-noell.com] Peer Connection Initiated with [AF_INET]212.185.103.88:1194
- Thu Mar 23 15:41:12 2017 MANAGEMENT: >STATE:1490280072,GET_CONFIG,,,
- Thu Mar 23 15:41:13 2017 SENT CONTROL [wufw1.ssi-schaefer-noell.com]: 'PUSH_REQUEST' (status=1)
- Thu Mar 23 15:41:14 2017 PUSH: Received control message: 'PUSH_REPLY,route 10.245.0.1,topology net30,ping 10,ping-restart 120,route 140.5.0.0 255.255.0.0,route 169.5.12.0 255.255.255.0,route 49.15.1.0 255.255.255.192,route 135.135.0.0 255.255.255.0,route 196.102.165.0 255.255.255.0,route 139.110.38.0 255.255.254.0,route 156.88.0.0 255.248.0.0,route 169.5.8.0 255.255.255.0,route 160.100.26.0 255.255.255.0,route 150.0.250.51 255.255.255.255,route 192.1.2.0 255.255.255.0,route 150.0.51.0 255.255.255.0,route 192.168.0.0 255.255.0.0,route 10.0.0.0 255.0.0.0,route 172.16.0.0 255.240.0.0,dhcp-option DNS 172.26.1.31,dhcp-option DNS 172.26.65.6,dhcp-option DOMAIN wu.ssn,ifconfig 10.245.1.26 10.245.1.25'
- Thu Mar 23 15:41:14 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Thu Mar 23 15:41:14 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Thu Mar 23 15:41:14 2017 OPTIONS IMPORT: route options modified
- Thu Mar 23 15:41:14 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu Mar 23 15:41:14 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=13 HWADDR=b8:08:cf:3b:bf:f2
- Thu Mar 23 15:41:14 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Thu Mar 23 15:41:14 2017 MANAGEMENT: >STATE:1490280074,ASSIGN_IP,,10.245.1.26,
- Thu Mar 23 15:41:14 2017 open_tun, tt->ipv6=0
- Thu Mar 23 15:41:14 2017 TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{E5DFC8DD-F5CF-42DB-8823-851FD0315A5C}.tap
- Thu Mar 23 15:41:14 2017 TAP-Windows Driver Version 9.20
- Thu Mar 23 15:41:14 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.245.1.26/255.255.255.252 on interface {E5DFC8DD-F5CF-42DB-8823-851FD0315A5C} [DHCP-serv: 10.245.1.25, lease-time: 31536000]
- Thu Mar 23 15:41:14 2017 NOTE: FlushIpNetTable failed on interface [18] {E5DFC8DD-F5CF-42DB-8823-851FD0315A5C} (status=5) : Zugriff verweigert
- Thu Mar 23 15:41:18 2017 TEST ROUTES: 17/17 succeeded len=17 ret=1 a=0 u/d=up
- Thu Mar 23 15:41:18 2017 MANAGEMENT: >STATE:1490280078,ADD_ROUTES,,,
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 212.185.103.88 MASK 255.255.255.255 192.168.0.1
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 10.245.0.1 MASK 255.255.255.255 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 140.5.0.0 MASK 255.255.0.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 169.5.12.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 49.15.1.0 MASK 255.255.255.192 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 135.135.0.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 196.102.165.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 139.110.38.0 MASK 255.255.254.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 156.88.0.0 MASK 255.248.0.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 169.5.8.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 160.100.26.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 150.0.250.51 MASK 255.255.255.255 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 192.1.2.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 150.0.51.0 MASK 255.255.255.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 192.168.0.0 MASK 255.255.0.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 10.0.0.0 MASK 255.0.0.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 C:\Windows\system32\route.exe ADD 172.16.0.0 MASK 255.240.0.0 10.245.1.25
- Thu Mar 23 15:41:18 2017 Route addition via service succeeded
- Thu Mar 23 15:41:18 2017 Initialization Sequence Completed
- Thu Mar 23 15:41:18 2017 MANAGEMENT: >STATE:1490280078,CONNECTED,SUCCESS,10.245.1.26,212.185.103.88
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement