Advertisement
Guest User

Untitled

a guest
Jan 28th, 2018
418
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.20 KB | None | 0 0
  1. Sun Jan 28 11:08:14 2018 OpenVPN 2.3.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jun 23 2017
  2. Sun Jan 28 11:08:14 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.09
  3. Enter Management Password:
  4. Sun Jan 28 11:08:14 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  5. Sun Jan 28 11:08:14 2018 Need hold release from management interface, waiting...
  6. Sun Jan 28 11:08:14 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  7. Sun Jan 28 11:08:14 2018 MANAGEMENT: CMD 'state on'
  8. Sun Jan 28 11:08:14 2018 MANAGEMENT: CMD 'log all on'
  9. Sun Jan 28 11:08:14 2018 MANAGEMENT: CMD 'hold off'
  10. Sun Jan 28 11:08:14 2018 MANAGEMENT: CMD 'hold release'
  11. Sun Jan 28 11:08:23 2018 MANAGEMENT: CMD 'username "Auth" "Pachcio"'
  12. Sun Jan 28 11:08:23 2018 MANAGEMENT: CMD 'password [...]'
  13. Sun Jan 28 11:08:23 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  14. Sun Jan 28 11:08:23 2018 MANAGEMENT: >STATE:1517134103,RESOLVE,,,,,,
  15. Sun Jan 28 11:08:23 2018 Attempting to establish TCP connection with [AF_INET]193.238.94.74:22443 [nonblock]
  16. Sun Jan 28 11:08:23 2018 MANAGEMENT: >STATE:1517134103,TCP_CONNECT,,,,,,
  17. Sun Jan 28 11:08:24 2018 TCP connection established with [AF_INET]193.238.94.74:22443
  18. Sun Jan 28 11:08:24 2018 TCPv4_CLIENT link local: [undef]
  19. Sun Jan 28 11:08:24 2018 TCPv4_CLIENT link remote: [AF_INET]193.238.94.74:22443
  20. Sun Jan 28 11:08:24 2018 MANAGEMENT: >STATE:1517134104,WAIT,,,,,,
  21. Sun Jan 28 11:08:24 2018 MANAGEMENT: >STATE:1517134104,AUTH,,,,,,
  22. Sun Jan 28 11:08:24 2018 TLS: Initial packet from [AF_INET]193.238.94.74:22443, sid=91e4cb06 cc817c8c
  23. Sun Jan 28 11:08:24 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  24. Sun Jan 28 11:08:24 2018 VERIFY OK: depth=1, C=pl, L=Łódź, O=foxior.pl, CN=foxior.pl VPN CA, emailAddress=foxiorek@gmail.com
  25. Sun Jan 28 11:08:24 2018 VERIFY X509NAME OK: C=pl, L=Łódź, O=foxior.pl, CN=smilodon-utm, emailAddress=foxiorek@gmail.com
  26. Sun Jan 28 11:08:24 2018 VERIFY OK: depth=0, C=pl, L=Łódź, O=foxior.pl, CN=smilodon-utm, emailAddress=foxiorek@gmail.com
  27. Sun Jan 28 11:08:25 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  28. Sun Jan 28 11:08:25 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  29. Sun Jan 28 11:08:25 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  30. Sun Jan 28 11:08:25 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  31. Sun Jan 28 11:08:25 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  32. Sun Jan 28 11:08:25 2018 [smilodon-utm] Peer Connection Initiated with [AF_INET]193.238.94.74:22443
  33. Sun Jan 28 11:08:26 2018 MANAGEMENT: >STATE:1517134106,GET_CONFIG,,,,,,
  34. Sun Jan 28 11:08:27 2018 SENT CONTROL [smilodon-utm]: 'PUSH_REQUEST' (status=1)
  35. Sun Jan 28 11:08:27 2018 AUTH: Received control message: AUTH_FAILED
  36. Sun Jan 28 11:08:27 2018 SIGUSR1[soft,auth-failure] received, process restarting
  37. Sun Jan 28 11:08:27 2018 MANAGEMENT: >STATE:1517134107,RECONNECTING,auth-failure,,,,,
  38. Sun Jan 28 11:08:27 2018 Restart pause, 5 second(s)
  39. Sun Jan 28 11:16:23 2018 MANAGEMENT: CMD 'username "Auth" "Pachcio"'
  40. Sun Jan 28 11:16:23 2018 MANAGEMENT: CMD 'password [...]'
  41. Sun Jan 28 11:16:23 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  42. Sun Jan 28 11:16:23 2018 MANAGEMENT: >STATE:1517134583,RESOLVE,,,,,,
  43. Sun Jan 28 11:16:23 2018 Attempting to establish TCP connection with [AF_INET]193.238.94.74:22443 [nonblock]
  44. Sun Jan 28 11:16:23 2018 MANAGEMENT: >STATE:1517134583,TCP_CONNECT,,,,,,
  45. Sun Jan 28 11:16:24 2018 TCP connection established with [AF_INET]193.238.94.74:22443
  46. Sun Jan 28 11:16:24 2018 TCPv4_CLIENT link local: [undef]
  47. Sun Jan 28 11:16:24 2018 TCPv4_CLIENT link remote: [AF_INET]193.238.94.74:22443
  48. Sun Jan 28 11:16:24 2018 MANAGEMENT: >STATE:1517134584,WAIT,,,,,,
  49. Sun Jan 28 11:16:24 2018 MANAGEMENT: >STATE:1517134584,AUTH,,,,,,
  50. Sun Jan 28 11:16:24 2018 TLS: Initial packet from [AF_INET]193.238.94.74:22443, sid=eb4d5d00 589cbab4
  51. Sun Jan 28 11:16:24 2018 VERIFY OK: depth=1, C=pl, L=Łódź, O=foxior.pl, CN=foxior.pl VPN CA, emailAddress=foxiorek@gmail.com
  52. Sun Jan 28 11:16:24 2018 VERIFY X509NAME OK: C=pl, L=Łódź, O=foxior.pl, CN=smilodon-utm, emailAddress=foxiorek@gmail.com
  53. Sun Jan 28 11:16:24 2018 VERIFY OK: depth=0, C=pl, L=Łódź, O=foxior.pl, CN=smilodon-utm, emailAddress=foxiorek@gmail.com
  54. Sun Jan 28 11:16:25 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  55. Sun Jan 28 11:16:25 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  56. Sun Jan 28 11:16:25 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  57. Sun Jan 28 11:16:25 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  58. Sun Jan 28 11:16:25 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  59. Sun Jan 28 11:16:25 2018 [smilodon-utm] Peer Connection Initiated with [AF_INET]193.238.94.74:22443
  60. Sun Jan 28 11:16:26 2018 MANAGEMENT: >STATE:1517134586,GET_CONFIG,,,,,,
  61. Sun Jan 28 11:16:27 2018 SENT CONTROL [smilodon-utm]: 'PUSH_REQUEST' (status=1)
  62. Sun Jan 28 11:16:27 2018 AUTH: Received control message: AUTH_FAILED
  63. Sun Jan 28 11:16:27 2018 SIGUSR1[soft,auth-failure] received, process restarting
  64. Sun Jan 28 11:16:27 2018 MANAGEMENT: >STATE:1517134587,RECONNECTING,auth-failure,,,,,
  65. Sun Jan 28 11:16:27 2018 Restart pause, 5 second(s)
  66. Sun Jan 28 11:16:27 2018 MANAGEMENT: CMD 'auth-retry none'
  67. Sun Jan 28 11:16:32 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  68. Sun Jan 28 11:16:32 2018 MANAGEMENT: >STATE:1517134592,RESOLVE,,,,,,
  69. Sun Jan 28 11:16:32 2018 Attempting to establish TCP connection with [AF_INET]193.238.94.74:22443 [nonblock]
  70. Sun Jan 28 11:16:32 2018 MANAGEMENT: >STATE:1517134592,TCP_CONNECT,,,,,,
  71. Sun Jan 28 11:16:33 2018 TCP connection established with [AF_INET]193.238.94.74:22443
  72. Sun Jan 28 11:16:33 2018 TCPv4_CLIENT link local: [undef]
  73. Sun Jan 28 11:16:33 2018 TCPv4_CLIENT link remote: [AF_INET]193.238.94.74:22443
  74. Sun Jan 28 11:16:33 2018 MANAGEMENT: >STATE:1517134593,WAIT,,,,,,
  75. Sun Jan 28 11:16:33 2018 MANAGEMENT: >STATE:1517134593,AUTH,,,,,,
  76. Sun Jan 28 11:16:33 2018 TLS: Initial packet from [AF_INET]193.238.94.74:22443, sid=f76122c6 4b3b2024
  77. Sun Jan 28 11:27:15 2018 MANAGEMENT: CMD 'username "Auth" "pachcio"'
  78. Sun Jan 28 11:27:15 2018 MANAGEMENT: CMD 'password [...]'
  79. Sun Jan 28 11:27:15 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  80. Sun Jan 28 11:27:15 2018 TLS Error: TLS handshake failed
  81. Sun Jan 28 11:27:15 2018 Fatal TLS error (check_tls_errors_co), restarting
  82. Sun Jan 28 11:27:15 2018 SIGUSR1[soft,tls-error] received, process restarting
  83. Sun Jan 28 11:27:15 2018 MANAGEMENT: >STATE:1517135235,RECONNECTING,tls-error,,,,,
  84. Sun Jan 28 11:27:15 2018 Restart pause, 5 second(s)
  85. Sun Jan 28 11:27:15 2018 MANAGEMENT: CMD 'auth-retry none'
  86. Sun Jan 28 11:27:20 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  87. Sun Jan 28 11:27:20 2018 MANAGEMENT: >STATE:1517135240,RESOLVE,,,,,,
  88. Sun Jan 28 11:27:20 2018 Attempting to establish TCP connection with [AF_INET]193.238.94.74:22443 [nonblock]
  89. Sun Jan 28 11:27:20 2018 MANAGEMENT: >STATE:1517135240,TCP_CONNECT,,,,,,
  90. Sun Jan 28 11:27:21 2018 TCP connection established with [AF_INET]193.238.94.74:22443
  91. Sun Jan 28 11:27:21 2018 TCPv4_CLIENT link local: [undef]
  92. Sun Jan 28 11:27:21 2018 TCPv4_CLIENT link remote: [AF_INET]193.238.94.74:22443
  93. Sun Jan 28 11:27:21 2018 MANAGEMENT: >STATE:1517135241,WAIT,,,,,,
  94. Sun Jan 28 11:27:21 2018 MANAGEMENT: >STATE:1517135241,AUTH,,,,,,
  95. Sun Jan 28 11:27:21 2018 TLS: Initial packet from [AF_INET]193.238.94.74:22443, sid=4e2758c9 30b73758
  96. Sun Jan 28 11:27:21 2018 VERIFY OK: depth=1, C=pl, L=Łódź, O=foxior.pl, CN=foxior.pl VPN CA, emailAddress=foxiorek@gmail.com
  97. Sun Jan 28 11:27:21 2018 VERIFY X509NAME OK: C=pl, L=Łódź, O=foxior.pl, CN=smilodon-utm, emailAddress=foxiorek@gmail.com
  98. Sun Jan 28 11:27:21 2018 VERIFY OK: depth=0, C=pl, L=Łódź, O=foxior.pl, CN=smilodon-utm, emailAddress=foxiorek@gmail.com
  99. Sun Jan 28 11:27:22 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  100. Sun Jan 28 11:27:22 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  101. Sun Jan 28 11:27:22 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  102. Sun Jan 28 11:27:22 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  103. Sun Jan 28 11:27:22 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  104. Sun Jan 28 11:27:22 2018 [smilodon-utm] Peer Connection Initiated with [AF_INET]193.238.94.74:22443
  105. Sun Jan 28 11:27:23 2018 MANAGEMENT: >STATE:1517135243,GET_CONFIG,,,,,,
  106. Sun Jan 28 11:27:24 2018 SENT CONTROL [smilodon-utm]: 'PUSH_REQUEST' (status=1)
  107. Sun Jan 28 11:27:24 2018 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.242.2.1,route-gateway 10.242.2.1,topology subnet,ping 10,ping-restart 120,route 192.168.6.0 255.255.255.0,route 10.242.2.0 255.255.255.0,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,ifconfig 10.242.2.3 255.255.255.0'
  108. Sun Jan 28 11:27:24 2018 OPTIONS IMPORT: timers and/or timeouts modified
  109. Sun Jan 28 11:27:24 2018 OPTIONS IMPORT: --ifconfig/up options modified
  110. Sun Jan 28 11:27:24 2018 OPTIONS IMPORT: route options modified
  111. Sun Jan 28 11:27:24 2018 OPTIONS IMPORT: route-related options modified
  112. Sun Jan 28 11:27:24 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  113. Sun Jan 28 11:27:24 2018 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=13 HWADDR=d8:cb:8a:a3:4b:76
  114. Sun Jan 28 11:27:24 2018 open_tun, tt->ipv6=0
  115. Sun Jan 28 11:27:24 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{987349A0-FDC1-49E8-9C28-70727DF08894}.tap
  116. Sun Jan 28 11:27:24 2018 TAP-Windows Driver Version 9.21
  117. Sun Jan 28 11:27:24 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.242.2.0/10.242.2.3/255.255.255.0 [SUCCEEDED]
  118. Sun Jan 28 11:27:24 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.242.2.3/255.255.255.0 on interface {987349A0-FDC1-49E8-9C28-70727DF08894} [DHCP-serv: 10.242.2.254, lease-time: 31536000]
  119. Sun Jan 28 11:27:24 2018 Successful ARP Flush on interface [10] {987349A0-FDC1-49E8-9C28-70727DF08894}
  120. Sun Jan 28 11:27:24 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  121. Sun Jan 28 11:27:24 2018 MANAGEMENT: >STATE:1517135244,ASSIGN_IP,,10.242.2.3,,,,
  122. Sun Jan 28 11:27:28 2018 TEST ROUTES: 3/3 succeeded len=3 ret=1 a=0 u/d=up
  123. Sun Jan 28 11:27:28 2018 MANAGEMENT: >STATE:1517135248,ADD_ROUTES,,,,,,
  124. Sun Jan 28 11:27:28 2018 C:\WINDOWS\system32\route.exe ADD 193.238.94.74 MASK 255.255.255.255 192.168.2.1
  125. Sun Jan 28 11:27:28 2018 Route addition via service succeeded
  126. Sun Jan 28 11:27:28 2018 C:\WINDOWS\system32\route.exe ADD 192.168.6.0 MASK 255.255.255.0 10.242.2.1
  127. Sun Jan 28 11:27:28 2018 Route addition via service succeeded
  128. Sun Jan 28 11:27:28 2018 C:\WINDOWS\system32\route.exe ADD 10.242.2.0 MASK 255.255.255.0 10.242.2.1
  129. Sun Jan 28 11:27:28 2018 Route addition via service succeeded
  130. Sun Jan 28 11:27:28 2018 Initialization Sequence Completed
  131. Sun Jan 28 11:27:28 2018 MANAGEMENT: >STATE:1517135248,CONNECTED,SUCCESS,10.242.2.3,193.238.94.74,22443,192.168.2.2,57394
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement