Advertisement
Guest User

Untitled

a guest
Jan 15th, 2019
139
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.08 KB | None | 0 0
  1. Wed Jan 16 14:06:19 2019 NOTE: --user option is not implemented on Windows
  2. Wed Jan 16 14:06:19 2019 NOTE: --group option is not implemented on Windows
  3. Wed Jan 16 14:06:19 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 26 2018
  4. Wed Jan 16 14:06:19 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  5. Wed Jan 16 14:06:19 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  6. Wed Jan 16 14:06:19 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
  7. Wed Jan 16 14:06:19 2019 Need hold release from management interface, waiting...
  8. Wed Jan 16 14:06:20 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
  9. Wed Jan 16 14:06:20 2019 MANAGEMENT: CMD 'state on'
  10. Wed Jan 16 14:06:20 2019 MANAGEMENT: CMD 'log all on'
  11. Wed Jan 16 14:06:20 2019 MANAGEMENT: CMD 'echo all on'
  12. Wed Jan 16 14:06:20 2019 MANAGEMENT: CMD 'bytecount 5'
  13. Wed Jan 16 14:06:20 2019 MANAGEMENT: CMD 'hold off'
  14. Wed Jan 16 14:06:20 2019 MANAGEMENT: CMD 'hold release'
  15. Wed Jan 16 14:06:20 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  16. Wed Jan 16 14:06:20 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  17. Wed Jan 16 14:06:20 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]157.230.132.111:1194
  18. Wed Jan 16 14:06:20 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  19. Wed Jan 16 14:06:20 2019 UDP link local: (not bound)
  20. Wed Jan 16 14:06:20 2019 UDP link remote: [AF_INET]157.230.132.111:1194
  21. Wed Jan 16 14:06:20 2019 MANAGEMENT: >STATE:1547607980,WAIT,,,,,,
  22. Wed Jan 16 14:06:20 2019 MANAGEMENT: >STATE:1547607980,AUTH,,,,,,
  23. Wed Jan 16 14:06:20 2019 TLS: Initial packet from [AF_INET]157.230.132.111:1194, sid=bb10cd07 02ad117f
  24. Wed Jan 16 14:06:20 2019 VERIFY OK: depth=1, CN=Easy-RSA CA
  25. Wed Jan 16 14:06:20 2019 VERIFY KU OK
  26. Wed Jan 16 14:06:20 2019 Validating certificate extended key usage
  27. Wed Jan 16 14:06:20 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  28. Wed Jan 16 14:06:20 2019 VERIFY EKU OK
  29. Wed Jan 16 14:06:20 2019 VERIFY OK: depth=0, CN=ovpn-serv
  30. Wed Jan 16 14:06:21 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  31. Wed Jan 16 14:06:21 2019 [ovpn-serv] Peer Connection Initiated with [AF_INET]157.230.132.111:1194
  32. Wed Jan 16 14:06:22 2019 MANAGEMENT: >STATE:1547607982,GET_CONFIG,,,,,,
  33. Wed Jan 16 14:06:22 2019 SENT CONTROL [ovpn-serv]: 'PUSH_REQUEST' (status=1)
  34. Wed Jan 16 14:06:22 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5,peer-id 1,cipher AES-256-GCM'
  35. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: timers and/or timeouts modified
  36. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: --ifconfig/up options modified
  37. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: route options modified
  38. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  39. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: peer-id set
  40. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: adjusting link_mtu to 1624
  41. Wed Jan 16 14:06:22 2019 OPTIONS IMPORT: data channel crypto options modified
  42. Wed Jan 16 14:06:22 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  43. Wed Jan 16 14:06:22 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  44. Wed Jan 16 14:06:22 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  45. Wed Jan 16 14:06:22 2019 interactive service msg_channel=548
  46. Wed Jan 16 14:06:22 2019 ROUTE_GATEWAY 10.0.0.138/255.255.255.0 I=15 HWADDR=7c:5c:f8:a6:79:b7
  47. Wed Jan 16 14:06:22 2019 open_tun
  48. Wed Jan 16 14:06:22 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{ED18EFF8-1F10-4071-9F99-B9DD6147633F}.tap
  49. Wed Jan 16 14:06:22 2019 TAP-Windows Driver Version 9.21
  50. Wed Jan 16 14:06:23 2019 NETSH: C:\Windows\system32\netsh.exe interface ip set address Ethernet 3 dhcp
  51. Wed Jan 16 14:06:23 2019 ERROR: netsh command failed: returned error code 1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement