Advertisement
Guest User

Untitled

a guest
Mar 29th, 2019
119
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 36.14 KB | None | 0 0
  1. Fri Mar 29 21:03:18 2019 NOTE: --user option is not implemented on Windows
  2. Fri Mar 29 21:03:18 2019 NOTE: --group option is not implemented on Windows
  3. Fri Mar 29 21:03:18 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  4. Fri Mar 29 21:03:18 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  5. Fri Mar 29 21:03:18 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  6. Enter Management Password:
  7. Fri Mar 29 21:03:18 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  8. Fri Mar 29 21:03:18 2019 Need hold release from management interface, waiting...
  9. Fri Mar 29 21:03:18 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  10. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'state on'
  11. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'log all on'
  12. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'echo all on'
  13. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'bytecount 5'
  14. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'hold off'
  15. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'hold release'
  16. Fri Mar 29 21:03:18 2019 MANAGEMENT: CMD 'password [...]'
  17. Fri Mar 29 21:03:18 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  18. Fri Mar 29 21:03:18 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  19. Fri Mar 29 21:03:18 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  20. Fri Mar 29 21:03:18 2019 MANAGEMENT: >STATE:1553889798,RESOLVE,,,,,,
  21. Fri Mar 29 21:03:18 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  22. Fri Mar 29 21:03:18 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  23. Fri Mar 29 21:03:18 2019 UDP link local: (not bound)
  24. Fri Mar 29 21:03:18 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  25. Fri Mar 29 21:03:18 2019 MANAGEMENT: >STATE:1553889798,WAIT,,,,,,
  26. Fri Mar 29 21:03:18 2019 MANAGEMENT: >STATE:1553889798,AUTH,,,,,,
  27. Fri Mar 29 21:03:18 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=4253e0ca c8483d94
  28. Fri Mar 29 21:03:19 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  29. Fri Mar 29 21:03:19 2019 VERIFY KU OK
  30. Fri Mar 29 21:03:19 2019 Validating certificate extended key usage
  31. Fri Mar 29 21:03:19 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  32. Fri Mar 29 21:03:19 2019 VERIFY EKU OK
  33. Fri Mar 29 21:03:19 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  34. Fri Mar 29 21:03:19 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  35. Fri Mar 29 21:03:19 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  36. Fri Mar 29 21:03:20 2019 MANAGEMENT: >STATE:1553889800,GET_CONFIG,,,,,,
  37. Fri Mar 29 21:03:20 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  38. Fri Mar 29 21:03:20 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  39. Fri Mar 29 21:03:20 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  40. Fri Mar 29 21:03:20 2019 OPTIONS IMPORT: timers and/or timeouts modified
  41. Fri Mar 29 21:03:20 2019 OPTIONS IMPORT: --ifconfig/up options modified
  42. Fri Mar 29 21:03:20 2019 OPTIONS IMPORT: route options modified
  43. Fri Mar 29 21:03:20 2019 OPTIONS IMPORT: route-related options modified
  44. Fri Mar 29 21:03:20 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  45. Fri Mar 29 21:03:20 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  46. Fri Mar 29 21:03:20 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  47. Fri Mar 29 21:03:20 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  48. Fri Mar 29 21:03:20 2019 interactive service msg_channel=704
  49. Fri Mar 29 21:03:20 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  50. Fri Mar 29 21:03:20 2019 open_tun
  51. Fri Mar 29 21:03:20 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  52. Fri Mar 29 21:03:20 2019 TAP-Windows Driver Version 9.21
  53. Fri Mar 29 21:03:20 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  54. Fri Mar 29 21:03:20 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  55. Fri Mar 29 21:03:20 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  56. Fri Mar 29 21:03:20 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  57. Fri Mar 29 21:03:20 2019 MANAGEMENT: >STATE:1553889800,ASSIGN_IP,,10.8.0.5,,,,
  58. Fri Mar 29 21:03:25 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  59. Fri Mar 29 21:03:25 2019 MANAGEMENT: >STATE:1553889805,ADD_ROUTES,,,,,,
  60. Fri Mar 29 21:03:25 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  61. Fri Mar 29 21:03:25 2019 Route addition via service succeeded
  62. Fri Mar 29 21:03:25 2019 Initialization Sequence Completed
  63. Fri Mar 29 21:03:25 2019 MANAGEMENT: >STATE:1553889805,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
  64. Fri Mar 29 21:04:10 2019 MANAGEMENT: CMD 'signal SIGHUP'
  65. Fri Mar 29 21:04:10 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  66. Fri Mar 29 21:04:10 2019 Route deletion via service succeeded
  67. Fri Mar 29 21:04:10 2019 Closing TUN/TAP interface
  68. Fri Mar 29 21:04:10 2019 TAP: DHCP address released
  69. Fri Mar 29 21:04:10 2019 SIGHUP[hard,] received, process restarting
  70. Fri Mar 29 21:04:10 2019 MANAGEMENT: >STATE:1553889850,RECONNECTING,SIGHUP,,,,,
  71. Fri Mar 29 21:04:10 2019 NOTE: --user option is not implemented on Windows
  72. Fri Mar 29 21:04:10 2019 NOTE: --group option is not implemented on Windows
  73. Fri Mar 29 21:04:10 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  74. Fri Mar 29 21:04:10 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  75. Fri Mar 29 21:04:10 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  76. Fri Mar 29 21:04:10 2019 Restart pause, 5 second(s)
  77. Fri Mar 29 21:04:15 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  78. Fri Mar 29 21:04:15 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  79. Fri Mar 29 21:04:15 2019 MANAGEMENT: >STATE:1553889855,RESOLVE,,,,,,
  80. Fri Mar 29 21:04:15 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  81. Fri Mar 29 21:04:15 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  82. Fri Mar 29 21:04:15 2019 UDP link local: (not bound)
  83. Fri Mar 29 21:04:15 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  84. Fri Mar 29 21:04:15 2019 MANAGEMENT: >STATE:1553889855,WAIT,,,,,,
  85. Fri Mar 29 21:04:15 2019 MANAGEMENT: >STATE:1553889855,AUTH,,,,,,
  86. Fri Mar 29 21:04:15 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=1730bbee 4f81ebcd
  87. Fri Mar 29 21:04:16 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  88. Fri Mar 29 21:04:16 2019 VERIFY KU OK
  89. Fri Mar 29 21:04:16 2019 Validating certificate extended key usage
  90. Fri Mar 29 21:04:16 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  91. Fri Mar 29 21:04:16 2019 VERIFY EKU OK
  92. Fri Mar 29 21:04:16 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  93. Fri Mar 29 21:04:16 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  94. Fri Mar 29 21:04:16 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  95. Fri Mar 29 21:04:17 2019 MANAGEMENT: >STATE:1553889857,GET_CONFIG,,,,,,
  96. Fri Mar 29 21:04:17 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  97. Fri Mar 29 21:04:17 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  98. Fri Mar 29 21:04:17 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  99. Fri Mar 29 21:04:17 2019 OPTIONS IMPORT: timers and/or timeouts modified
  100. Fri Mar 29 21:04:17 2019 OPTIONS IMPORT: --ifconfig/up options modified
  101. Fri Mar 29 21:04:17 2019 OPTIONS IMPORT: route options modified
  102. Fri Mar 29 21:04:17 2019 OPTIONS IMPORT: route-related options modified
  103. Fri Mar 29 21:04:17 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  104. Fri Mar 29 21:04:17 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  105. Fri Mar 29 21:04:17 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  106. Fri Mar 29 21:04:17 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  107. Fri Mar 29 21:04:17 2019 interactive service msg_channel=704
  108. Fri Mar 29 21:04:17 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  109. Fri Mar 29 21:04:17 2019 open_tun
  110. Fri Mar 29 21:04:17 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  111. Fri Mar 29 21:04:17 2019 TAP-Windows Driver Version 9.21
  112. Fri Mar 29 21:04:17 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  113. Fri Mar 29 21:04:17 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  114. Fri Mar 29 21:04:17 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  115. Fri Mar 29 21:04:17 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  116. Fri Mar 29 21:04:17 2019 MANAGEMENT: >STATE:1553889857,ASSIGN_IP,,10.8.0.5,,,,
  117. Fri Mar 29 21:04:22 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  118. Fri Mar 29 21:04:22 2019 MANAGEMENT: >STATE:1553889862,ADD_ROUTES,,,,,,
  119. Fri Mar 29 21:04:22 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  120. Fri Mar 29 21:04:22 2019 Route addition via service succeeded
  121. Fri Mar 29 21:04:22 2019 Initialization Sequence Completed
  122. Fri Mar 29 21:04:22 2019 MANAGEMENT: >STATE:1553889862,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
  123. Fri Mar 29 21:04:37 2019 MANAGEMENT: CMD 'signal SIGHUP'
  124. Fri Mar 29 21:04:37 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  125. Fri Mar 29 21:04:37 2019 Route deletion via service succeeded
  126. Fri Mar 29 21:04:37 2019 Closing TUN/TAP interface
  127. Fri Mar 29 21:04:37 2019 TAP: DHCP address released
  128. Fri Mar 29 21:04:37 2019 SIGHUP[hard,] received, process restarting
  129. Fri Mar 29 21:04:37 2019 MANAGEMENT: >STATE:1553889877,RECONNECTING,SIGHUP,,,,,
  130. Fri Mar 29 21:04:37 2019 NOTE: --user option is not implemented on Windows
  131. Fri Mar 29 21:04:37 2019 NOTE: --group option is not implemented on Windows
  132. Fri Mar 29 21:04:37 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  133. Fri Mar 29 21:04:37 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  134. Fri Mar 29 21:04:37 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  135. Fri Mar 29 21:04:37 2019 Restart pause, 5 second(s)
  136. Fri Mar 29 21:04:42 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  137. Fri Mar 29 21:04:42 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  138. Fri Mar 29 21:04:42 2019 MANAGEMENT: >STATE:1553889882,RESOLVE,,,,,,
  139. Fri Mar 29 21:04:42 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  140. Fri Mar 29 21:04:42 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  141. Fri Mar 29 21:04:42 2019 UDP link local: (not bound)
  142. Fri Mar 29 21:04:42 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  143. Fri Mar 29 21:04:42 2019 MANAGEMENT: >STATE:1553889882,WAIT,,,,,,
  144. Fri Mar 29 21:04:42 2019 MANAGEMENT: >STATE:1553889882,AUTH,,,,,,
  145. Fri Mar 29 21:04:42 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=03e23f1c 27d0057d
  146. Fri Mar 29 21:04:42 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  147. Fri Mar 29 21:04:42 2019 VERIFY KU OK
  148. Fri Mar 29 21:04:42 2019 Validating certificate extended key usage
  149. Fri Mar 29 21:04:42 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  150. Fri Mar 29 21:04:42 2019 VERIFY EKU OK
  151. Fri Mar 29 21:04:42 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  152. Fri Mar 29 21:04:42 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  153. Fri Mar 29 21:04:42 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  154. Fri Mar 29 21:04:44 2019 MANAGEMENT: >STATE:1553889884,GET_CONFIG,,,,,,
  155. Fri Mar 29 21:04:44 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  156. Fri Mar 29 21:04:44 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  157. Fri Mar 29 21:04:44 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  158. Fri Mar 29 21:04:44 2019 OPTIONS IMPORT: timers and/or timeouts modified
  159. Fri Mar 29 21:04:44 2019 OPTIONS IMPORT: --ifconfig/up options modified
  160. Fri Mar 29 21:04:44 2019 OPTIONS IMPORT: route options modified
  161. Fri Mar 29 21:04:44 2019 OPTIONS IMPORT: route-related options modified
  162. Fri Mar 29 21:04:44 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  163. Fri Mar 29 21:04:44 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  164. Fri Mar 29 21:04:44 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  165. Fri Mar 29 21:04:44 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  166. Fri Mar 29 21:04:44 2019 interactive service msg_channel=704
  167. Fri Mar 29 21:04:44 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  168. Fri Mar 29 21:04:44 2019 open_tun
  169. Fri Mar 29 21:04:44 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  170. Fri Mar 29 21:04:44 2019 TAP-Windows Driver Version 9.21
  171. Fri Mar 29 21:04:44 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  172. Fri Mar 29 21:04:44 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  173. Fri Mar 29 21:04:44 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  174. Fri Mar 29 21:04:44 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  175. Fri Mar 29 21:04:44 2019 MANAGEMENT: >STATE:1553889884,ASSIGN_IP,,10.8.0.5,,,,
  176. Fri Mar 29 21:04:49 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  177. Fri Mar 29 21:04:49 2019 MANAGEMENT: >STATE:1553889889,ADD_ROUTES,,,,,,
  178. Fri Mar 29 21:04:49 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  179. Fri Mar 29 21:04:49 2019 Route addition via service succeeded
  180. Fri Mar 29 21:04:49 2019 Initialization Sequence Completed
  181. Fri Mar 29 21:04:49 2019 MANAGEMENT: >STATE:1553889889,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
  182. Fri Mar 29 21:05:32 2019 MANAGEMENT: CMD 'signal SIGHUP'
  183. Fri Mar 29 21:05:32 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  184. Fri Mar 29 21:05:32 2019 Route deletion via service succeeded
  185. Fri Mar 29 21:05:32 2019 Closing TUN/TAP interface
  186. Fri Mar 29 21:05:32 2019 TAP: DHCP address released
  187. Fri Mar 29 21:05:32 2019 SIGHUP[hard,] received, process restarting
  188. Fri Mar 29 21:05:32 2019 MANAGEMENT: >STATE:1553889932,RECONNECTING,SIGHUP,,,,,
  189. Fri Mar 29 21:05:32 2019 NOTE: --user option is not implemented on Windows
  190. Fri Mar 29 21:05:32 2019 NOTE: --group option is not implemented on Windows
  191. Fri Mar 29 21:05:32 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  192. Fri Mar 29 21:05:32 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  193. Fri Mar 29 21:05:32 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  194. Fri Mar 29 21:05:32 2019 Restart pause, 5 second(s)
  195. Fri Mar 29 21:05:37 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  196. Fri Mar 29 21:05:37 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  197. Fri Mar 29 21:05:37 2019 MANAGEMENT: >STATE:1553889937,RESOLVE,,,,,,
  198. Fri Mar 29 21:05:37 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  199. Fri Mar 29 21:05:37 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  200. Fri Mar 29 21:05:37 2019 UDP link local: (not bound)
  201. Fri Mar 29 21:05:37 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  202. Fri Mar 29 21:05:37 2019 MANAGEMENT: >STATE:1553889937,WAIT,,,,,,
  203. Fri Mar 29 21:05:37 2019 MANAGEMENT: >STATE:1553889937,AUTH,,,,,,
  204. Fri Mar 29 21:05:37 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=61812efa 3b0e86a5
  205. Fri Mar 29 21:05:38 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  206. Fri Mar 29 21:05:38 2019 VERIFY KU OK
  207. Fri Mar 29 21:05:38 2019 Validating certificate extended key usage
  208. Fri Mar 29 21:05:38 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  209. Fri Mar 29 21:05:38 2019 VERIFY EKU OK
  210. Fri Mar 29 21:05:38 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  211. Fri Mar 29 21:05:38 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  212. Fri Mar 29 21:05:38 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  213. Fri Mar 29 21:05:39 2019 MANAGEMENT: >STATE:1553889939,GET_CONFIG,,,,,,
  214. Fri Mar 29 21:05:39 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  215. Fri Mar 29 21:05:39 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  216. Fri Mar 29 21:05:39 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  217. Fri Mar 29 21:05:39 2019 OPTIONS IMPORT: timers and/or timeouts modified
  218. Fri Mar 29 21:05:39 2019 OPTIONS IMPORT: --ifconfig/up options modified
  219. Fri Mar 29 21:05:39 2019 OPTIONS IMPORT: route options modified
  220. Fri Mar 29 21:05:39 2019 OPTIONS IMPORT: route-related options modified
  221. Fri Mar 29 21:05:39 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  222. Fri Mar 29 21:05:39 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  223. Fri Mar 29 21:05:39 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  224. Fri Mar 29 21:05:39 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  225. Fri Mar 29 21:05:39 2019 interactive service msg_channel=704
  226. Fri Mar 29 21:05:39 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  227. Fri Mar 29 21:05:39 2019 open_tun
  228. Fri Mar 29 21:05:39 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  229. Fri Mar 29 21:05:39 2019 TAP-Windows Driver Version 9.21
  230. Fri Mar 29 21:05:39 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  231. Fri Mar 29 21:05:39 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  232. Fri Mar 29 21:05:39 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  233. Fri Mar 29 21:05:39 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  234. Fri Mar 29 21:05:39 2019 MANAGEMENT: >STATE:1553889939,ASSIGN_IP,,10.8.0.5,,,,
  235. Fri Mar 29 21:05:44 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  236. Fri Mar 29 21:05:44 2019 MANAGEMENT: >STATE:1553889944,ADD_ROUTES,,,,,,
  237. Fri Mar 29 21:05:44 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  238. Fri Mar 29 21:05:44 2019 Route addition via service succeeded
  239. Fri Mar 29 21:05:44 2019 Initialization Sequence Completed
  240. Fri Mar 29 21:05:44 2019 MANAGEMENT: >STATE:1553889944,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
  241. Fri Mar 29 21:05:55 2019 MANAGEMENT: CMD 'signal SIGHUP'
  242. Fri Mar 29 21:05:55 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  243. Fri Mar 29 21:05:55 2019 Route deletion via service succeeded
  244. Fri Mar 29 21:05:55 2019 Closing TUN/TAP interface
  245. Fri Mar 29 21:05:55 2019 TAP: DHCP address released
  246. Fri Mar 29 21:05:55 2019 SIGHUP[hard,] received, process restarting
  247. Fri Mar 29 21:05:55 2019 MANAGEMENT: >STATE:1553889955,RECONNECTING,SIGHUP,,,,,
  248. Fri Mar 29 21:05:55 2019 NOTE: --user option is not implemented on Windows
  249. Fri Mar 29 21:05:55 2019 NOTE: --group option is not implemented on Windows
  250. Fri Mar 29 21:05:55 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  251. Fri Mar 29 21:05:55 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  252. Fri Mar 29 21:05:55 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  253. Fri Mar 29 21:05:55 2019 Restart pause, 5 second(s)
  254. Fri Mar 29 21:06:00 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  255. Fri Mar 29 21:06:00 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  256. Fri Mar 29 21:06:00 2019 MANAGEMENT: >STATE:1553889960,RESOLVE,,,,,,
  257. Fri Mar 29 21:06:00 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  258. Fri Mar 29 21:06:00 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  259. Fri Mar 29 21:06:00 2019 UDP link local: (not bound)
  260. Fri Mar 29 21:06:00 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  261. Fri Mar 29 21:06:00 2019 MANAGEMENT: >STATE:1553889960,WAIT,,,,,,
  262. Fri Mar 29 21:06:00 2019 MANAGEMENT: >STATE:1553889960,AUTH,,,,,,
  263. Fri Mar 29 21:06:00 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=cfad9620 abb0d414
  264. Fri Mar 29 21:06:00 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  265. Fri Mar 29 21:06:00 2019 VERIFY KU OK
  266. Fri Mar 29 21:06:00 2019 Validating certificate extended key usage
  267. Fri Mar 29 21:06:00 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  268. Fri Mar 29 21:06:00 2019 VERIFY EKU OK
  269. Fri Mar 29 21:06:00 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  270. Fri Mar 29 21:06:00 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  271. Fri Mar 29 21:06:00 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  272. Fri Mar 29 21:06:02 2019 MANAGEMENT: >STATE:1553889962,GET_CONFIG,,,,,,
  273. Fri Mar 29 21:06:02 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  274. Fri Mar 29 21:06:02 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  275. Fri Mar 29 21:06:02 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  276. Fri Mar 29 21:06:02 2019 OPTIONS IMPORT: timers and/or timeouts modified
  277. Fri Mar 29 21:06:02 2019 OPTIONS IMPORT: --ifconfig/up options modified
  278. Fri Mar 29 21:06:02 2019 OPTIONS IMPORT: route options modified
  279. Fri Mar 29 21:06:02 2019 OPTIONS IMPORT: route-related options modified
  280. Fri Mar 29 21:06:02 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  281. Fri Mar 29 21:06:02 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  282. Fri Mar 29 21:06:02 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  283. Fri Mar 29 21:06:02 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  284. Fri Mar 29 21:06:02 2019 interactive service msg_channel=704
  285. Fri Mar 29 21:06:02 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  286. Fri Mar 29 21:06:02 2019 open_tun
  287. Fri Mar 29 21:06:02 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  288. Fri Mar 29 21:06:02 2019 TAP-Windows Driver Version 9.21
  289. Fri Mar 29 21:06:02 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  290. Fri Mar 29 21:06:02 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  291. Fri Mar 29 21:06:02 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  292. Fri Mar 29 21:06:02 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  293. Fri Mar 29 21:06:02 2019 MANAGEMENT: >STATE:1553889962,ASSIGN_IP,,10.8.0.5,,,,
  294. Fri Mar 29 21:06:07 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  295. Fri Mar 29 21:06:07 2019 MANAGEMENT: >STATE:1553889967,ADD_ROUTES,,,,,,
  296. Fri Mar 29 21:06:07 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  297. Fri Mar 29 21:06:07 2019 Route addition via service succeeded
  298. Fri Mar 29 21:06:07 2019 Initialization Sequence Completed
  299. Fri Mar 29 21:06:07 2019 MANAGEMENT: >STATE:1553889967,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
  300. Fri Mar 29 21:07:08 2019 MANAGEMENT: CMD 'signal SIGHUP'
  301. Fri Mar 29 21:07:08 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  302. Fri Mar 29 21:07:08 2019 Route deletion via service succeeded
  303. Fri Mar 29 21:07:08 2019 Closing TUN/TAP interface
  304. Fri Mar 29 21:07:08 2019 TAP: DHCP address released
  305. Fri Mar 29 21:07:08 2019 SIGHUP[hard,] received, process restarting
  306. Fri Mar 29 21:07:08 2019 MANAGEMENT: >STATE:1553890028,RECONNECTING,SIGHUP,,,,,
  307. Fri Mar 29 21:07:08 2019 NOTE: --user option is not implemented on Windows
  308. Fri Mar 29 21:07:08 2019 NOTE: --group option is not implemented on Windows
  309. Fri Mar 29 21:07:08 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  310. Fri Mar 29 21:07:08 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  311. Fri Mar 29 21:07:08 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  312. Fri Mar 29 21:07:08 2019 Restart pause, 5 second(s)
  313. Fri Mar 29 21:07:13 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  314. Fri Mar 29 21:07:13 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  315. Fri Mar 29 21:07:13 2019 MANAGEMENT: >STATE:1553890033,RESOLVE,,,,,,
  316. Fri Mar 29 21:07:13 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  317. Fri Mar 29 21:07:13 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  318. Fri Mar 29 21:07:13 2019 UDP link local: (not bound)
  319. Fri Mar 29 21:07:13 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  320. Fri Mar 29 21:07:13 2019 MANAGEMENT: >STATE:1553890033,WAIT,,,,,,
  321. Fri Mar 29 21:07:13 2019 MANAGEMENT: >STATE:1553890033,AUTH,,,,,,
  322. Fri Mar 29 21:07:13 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=70eee1d1 f46250f7
  323. Fri Mar 29 21:07:13 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  324. Fri Mar 29 21:07:13 2019 VERIFY KU OK
  325. Fri Mar 29 21:07:13 2019 Validating certificate extended key usage
  326. Fri Mar 29 21:07:13 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  327. Fri Mar 29 21:07:13 2019 VERIFY EKU OK
  328. Fri Mar 29 21:07:13 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  329. Fri Mar 29 21:07:13 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  330. Fri Mar 29 21:07:13 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  331. Fri Mar 29 21:07:14 2019 MANAGEMENT: >STATE:1553890034,GET_CONFIG,,,,,,
  332. Fri Mar 29 21:07:14 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  333. Fri Mar 29 21:07:14 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  334. Fri Mar 29 21:07:14 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  335. Fri Mar 29 21:07:14 2019 OPTIONS IMPORT: timers and/or timeouts modified
  336. Fri Mar 29 21:07:14 2019 OPTIONS IMPORT: --ifconfig/up options modified
  337. Fri Mar 29 21:07:14 2019 OPTIONS IMPORT: route options modified
  338. Fri Mar 29 21:07:14 2019 OPTIONS IMPORT: route-related options modified
  339. Fri Mar 29 21:07:14 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  340. Fri Mar 29 21:07:14 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  341. Fri Mar 29 21:07:14 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  342. Fri Mar 29 21:07:14 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  343. Fri Mar 29 21:07:14 2019 interactive service msg_channel=704
  344. Fri Mar 29 21:07:14 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  345. Fri Mar 29 21:07:14 2019 open_tun
  346. Fri Mar 29 21:07:14 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  347. Fri Mar 29 21:07:14 2019 TAP-Windows Driver Version 9.21
  348. Fri Mar 29 21:07:14 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  349. Fri Mar 29 21:07:14 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  350. Fri Mar 29 21:07:14 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  351. Fri Mar 29 21:07:14 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  352. Fri Mar 29 21:07:14 2019 MANAGEMENT: >STATE:1553890034,ASSIGN_IP,,10.8.0.5,,,,
  353. Fri Mar 29 21:07:19 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  354. Fri Mar 29 21:07:19 2019 MANAGEMENT: >STATE:1553890039,ADD_ROUTES,,,,,,
  355. Fri Mar 29 21:07:19 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  356. Fri Mar 29 21:07:19 2019 Route addition via service succeeded
  357. Fri Mar 29 21:07:19 2019 Initialization Sequence Completed
  358. Fri Mar 29 21:07:19 2019 MANAGEMENT: >STATE:1553890039,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
  359. Fri Mar 29 21:11:39 2019 MANAGEMENT: CMD 'signal SIGHUP'
  360. Fri Mar 29 21:11:39 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  361. Fri Mar 29 21:11:39 2019 Route deletion via service succeeded
  362. Fri Mar 29 21:11:39 2019 Closing TUN/TAP interface
  363. Fri Mar 29 21:11:39 2019 TAP: DHCP address released
  364. Fri Mar 29 21:11:39 2019 SIGHUP[hard,] received, process restarting
  365. Fri Mar 29 21:11:39 2019 MANAGEMENT: >STATE:1553890299,RECONNECTING,SIGHUP,,,,,
  366. Fri Mar 29 21:11:39 2019 NOTE: --user option is not implemented on Windows
  367. Fri Mar 29 21:11:39 2019 NOTE: --group option is not implemented on Windows
  368. Fri Mar 29 21:11:39 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  369. Fri Mar 29 21:11:39 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  370. Fri Mar 29 21:11:39 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  371. Fri Mar 29 21:11:39 2019 Restart pause, 5 second(s)
  372. Fri Mar 29 21:11:44 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  373. Fri Mar 29 21:11:44 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  374. Fri Mar 29 21:11:44 2019 MANAGEMENT: >STATE:1553890304,RESOLVE,,,,,,
  375. Fri Mar 29 21:11:44 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]88.99.208.131:7456
  376. Fri Mar 29 21:11:44 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  377. Fri Mar 29 21:11:44 2019 UDP link local: (not bound)
  378. Fri Mar 29 21:11:44 2019 UDP link remote: [AF_INET]88.99.208.131:7456
  379. Fri Mar 29 21:11:44 2019 MANAGEMENT: >STATE:1553890304,WAIT,,,,,,
  380. Fri Mar 29 21:11:44 2019 MANAGEMENT: >STATE:1553890304,AUTH,,,,,,
  381. Fri Mar 29 21:11:44 2019 TLS: Initial packet from [AF_INET]88.99.208.131:7456, sid=2939fe1e 44a45672
  382. Fri Mar 29 21:11:44 2019 VERIFY OK: depth=1, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=Timber CA, name=TimberCa, emailAddress=timberlife.server@gmail.com
  383. Fri Mar 29 21:11:44 2019 VERIFY KU OK
  384. Fri Mar 29 21:11:44 2019 Validating certificate extended key usage
  385. Fri Mar 29 21:11:44 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  386. Fri Mar 29 21:11:44 2019 VERIFY EKU OK
  387. Fri Mar 29 21:11:44 2019 VERIFY OK: depth=0, C=DE, ST=TM, L=Timberia, O=Timber, OU=Timber, CN=timber-real.life, name=Timber VPN, emailAddress=timberlife.server@gmail.com
  388. Fri Mar 29 21:11:45 2019 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  389. Fri Mar 29 21:11:45 2019 [timber-real.life] Peer Connection Initiated with [AF_INET]88.99.208.131:7456
  390. Fri Mar 29 21:11:46 2019 MANAGEMENT: >STATE:1553890306,GET_CONFIG,,,,,,
  391. Fri Mar 29 21:11:46 2019 SENT CONTROL [timber-real.life]: 'PUSH_REQUEST' (status=1)
  392. Fri Mar 29 21:11:46 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,net_gateway,route 10.8.0.1,ifconfig 10.8.0.5 255.255.255.0'
  393. Fri Mar 29 21:11:46 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:5: net_gateway (2.4.6)
  394. Fri Mar 29 21:11:46 2019 OPTIONS IMPORT: timers and/or timeouts modified
  395. Fri Mar 29 21:11:46 2019 OPTIONS IMPORT: --ifconfig/up options modified
  396. Fri Mar 29 21:11:46 2019 OPTIONS IMPORT: route options modified
  397. Fri Mar 29 21:11:46 2019 OPTIONS IMPORT: route-related options modified
  398. Fri Mar 29 21:11:46 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  399. Fri Mar 29 21:11:46 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  400. Fri Mar 29 21:11:46 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  401. Fri Mar 29 21:11:46 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  402. Fri Mar 29 21:11:46 2019 interactive service msg_channel=704
  403. Fri Mar 29 21:11:46 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=20 HWADDR=38:ba:f8:19:ed:5d
  404. Fri Mar 29 21:11:46 2019 open_tun
  405. Fri Mar 29 21:11:46 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{0F2DC23C-4DDA-4509-B0AF-7589177BD828}.tap
  406. Fri Mar 29 21:11:46 2019 TAP-Windows Driver Version 9.21
  407. Fri Mar 29 21:11:46 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.5/255.255.255.0 [SUCCEEDED]
  408. Fri Mar 29 21:11:46 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.5/255.255.255.0 on interface {0F2DC23C-4DDA-4509-B0AF-7589177BD828} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  409. Fri Mar 29 21:11:46 2019 Successful ARP Flush on interface [6] {0F2DC23C-4DDA-4509-B0AF-7589177BD828}
  410. Fri Mar 29 21:11:46 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  411. Fri Mar 29 21:11:46 2019 MANAGEMENT: >STATE:1553890306,ASSIGN_IP,,10.8.0.5,,,,
  412. Fri Mar 29 21:11:51 2019 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  413. Fri Mar 29 21:11:51 2019 MANAGEMENT: >STATE:1553890311,ADD_ROUTES,,,,,,
  414. Fri Mar 29 21:11:51 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.1
  415. Fri Mar 29 21:11:51 2019 Route addition via service succeeded
  416. Fri Mar 29 21:11:51 2019 Initialization Sequence Completed
  417. Fri Mar 29 21:11:51 2019 MANAGEMENT: >STATE:1553890311,CONNECTED,SUCCESS,10.8.0.5,88.99.208.131,7456,,
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement