Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Fri Jan 11 23:13:34 2019 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 3 2018
- Fri Jan 11 23:13:34 2019 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
- Fri Jan 11 23:13:34 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]213.240.145.124:1194
- Fri Jan 11 23:13:34 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Fri Jan 11 23:13:34 2019 UDP link local (bound): [AF_INET][undef]:1194
- Fri Jan 11 23:13:34 2019 UDP link remote: [AF_INET]213.240.145.124:1194
- Fri Jan 11 23:13:35 2019 TLS: Initial packet from [AF_INET]213.240.145.124:1194, sid=81ec7cfb 0041ba48
- Fri Jan 11 23:13:35 2019 VERIFY KU OK
- Fri Jan 11 23:13:35 2019 Validating certificate extended key usage
- Fri Jan 11 23:13:35 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Jan 11 23:13:35 2019 VERIFY EKU OK
- Fri Jan 11 23:13:35 2019 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Fri Jan 11 23:13:35 2019 [server] Peer Connection Initiated with [AF_INET]213.240.145.124:1194
- Fri Jan 11 23:13:36 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Fri Jan 11 23:13:41 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Fri Jan 11 23:13:42 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.181.176.1,route 10.181.176.1,topology net30,ping 10,ping-restart 120,ifconfig 10.181.180.4 10.181.176.1'
- Fri Jan 11 23:13:42 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Fri Jan 11 23:13:42 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Fri Jan 11 23:13:42 2019 OPTIONS IMPORT: route options modified
- Fri Jan 11 23:13:42 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Fri Jan 11 23:13:42 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Jan 11 23:13:42 2019 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Jan 11 23:13:42 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Jan 11 23:13:42 2019 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Jan 11 23:13:42 2019 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp3s0 HWADDR=5c:ac:4c:bd:e4:04
- Fri Jan 11 23:13:42 2019 TUN/TAP device tun0 opened
- Fri Jan 11 23:13:42 2019 TUN/TAP TX queue length set to 100
- Fri Jan 11 23:13:42 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Fri Jan 11 23:13:42 2019 /sbin/ip link set dev tun0 up mtu 1500
- Fri Jan 11 23:13:42 2019 /sbin/ip addr add dev tun0 local 10.181.180.4 peer 10.181.176.1
- Fri Jan 11 23:13:42 2019 /sbin/ip route add 10.181.176.1/32 via 10.181.176.1
- Fri Jan 11 23:13:42 2019 ERROR: Linux route add command failed: external program exited with error status: 2
- Fri Jan 11 23:13:42 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Fri Jan 11 23:13:42 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement