Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Wed May 08 18:06:19 2019 OpenVPN 2.3.8 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [IPv6] built on Jul 3 2017
- Wed May 08 18:06:19 2019 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.09
- Enter Management Password:
- Wed May 08 18:06:19 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Wed May 08 18:06:19 2019 Need hold release from management interface, waiting...
- Wed May 08 18:06:19 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Wed May 08 18:06:19 2019 MANAGEMENT: CMD 'state on'
- Wed May 08 18:06:19 2019 MANAGEMENT: CMD 'log all on'
- Wed May 08 18:06:19 2019 MANAGEMENT: CMD 'hold off'
- Wed May 08 18:06:19 2019 MANAGEMENT: CMD 'hold release'
- Wed May 08 18:06:44 2019 MANAGEMENT: CMD 'username "Auth" "francesco.sabatucci"'
- Wed May 08 18:06:44 2019 MANAGEMENT: CMD 'password [...]'
- Wed May 08 18:06:44 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed May 08 18:06:44 2019 UDPv4 link local: [undef]
- Wed May 08 18:06:44 2019 UDPv4 link remote: [AF_INET]185.157.231.234:8443
- Wed May 08 18:06:44 2019 MANAGEMENT: >STATE:1557331604,WAIT,,,,,,
- Wed May 08 18:06:44 2019 MANAGEMENT: >STATE:1557331604,AUTH,,,,,,
- Wed May 08 18:06:44 2019 TLS: Initial packet from [AF_INET]185.157.231.234:8443, sid=1fdaaaf9 5da45a1f
- Wed May 08 18:06:44 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed May 08 18:06:45 2019 VERIFY OK: depth=1, C=IT, ST=NA, L=Palermo, O=Giglio, OU=OU, CN=Sophos_CA_C240776R4QK4KB0, emailAddress=webmaster@giglio.com
- Wed May 08 18:06:45 2019 VERIFY X509NAME OK: C=IT, ST=NA, L=Palermo, O=Giglio, OU=OU, CN=SophosApplianceCertificate_C240776R4QK4KB0, emailAddress=webmaster@giglio.com
- Wed May 08 18:06:45 2019 VERIFY OK: depth=0, C=IT, ST=NA, L=Palermo, O=Giglio, OU=OU, CN=SophosApplianceCertificate_C240776R4QK4KB0, emailAddress=webmaster@giglio.com
- Wed May 08 18:06:45 2019 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Wed May 08 18:06:45 2019 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed May 08 18:06:45 2019 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Wed May 08 18:06:45 2019 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed May 08 18:06:45 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Wed May 08 18:06:45 2019 [SophosApplianceCertificate_C240776R4QK4KB0] Peer Connection Initiated with [AF_INET]185.157.231.234:8443
- Wed May 08 18:06:47 2019 MANAGEMENT: >STATE:1557331607,GET_CONFIG,,,,,,
- Wed May 08 18:06:48 2019 SENT CONTROL [SophosApplianceCertificate_C240776R4QK4KB0]: 'PUSH_REQUEST' (status=1)
- Wed May 08 18:06:48 2019 AUTH: Received control message: AUTH_FAILED
- Wed May 08 18:06:48 2019 SIGUSR1[soft,auth-failure] received, process restarting
- Wed May 08 18:06:48 2019 MANAGEMENT: >STATE:1557331608,RECONNECTING,auth-failure,,,,,
- Wed May 08 18:06:48 2019 Restart pause, 2 second(s)
- Wed May 08 18:07:37 2019 MANAGEMENT: CMD 'username "Auth" "francesco.sabatucci"'
- Wed May 08 18:07:37 2019 MANAGEMENT: CMD 'password [...]'
- Wed May 08 18:07:37 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed May 08 18:07:37 2019 UDPv4 link local: [undef]
- Wed May 08 18:07:37 2019 UDPv4 link remote: [AF_INET]185.157.231.234:8443
- Wed May 08 18:07:37 2019 MANAGEMENT: >STATE:1557331657,WAIT,,,,,,
- Wed May 08 18:07:37 2019 MANAGEMENT: >STATE:1557331657,AUTH,,,,,,
- Wed May 08 18:07:37 2019 TLS: Initial packet from [AF_INET]185.157.231.234:8443, sid=20a045bf cf6d38e0
- Wed May 08 18:07:38 2019 VERIFY OK: depth=1, C=IT, ST=NA, L=Palermo, O=Giglio, OU=OU, CN=Sophos_CA_C240776R4QK4KB0, emailAddress=webmaster@giglio.com
- Wed May 08 18:07:38 2019 VERIFY X509NAME OK: C=IT, ST=NA, L=Palermo, O=Giglio, OU=OU, CN=SophosApplianceCertificate_C240776R4QK4KB0, emailAddress=webmaster@giglio.com
- Wed May 08 18:07:38 2019 VERIFY OK: depth=0, C=IT, ST=NA, L=Palermo, O=Giglio, OU=OU, CN=SophosApplianceCertificate_C240776R4QK4KB0, emailAddress=webmaster@giglio.com
- Wed May 08 18:07:39 2019 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Wed May 08 18:07:39 2019 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed May 08 18:07:39 2019 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Wed May 08 18:07:39 2019 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed May 08 18:07:39 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Wed May 08 18:07:39 2019 [SophosApplianceCertificate_C240776R4QK4KB0] Peer Connection Initiated with [AF_INET]185.157.231.234:8443
- Wed May 08 18:07:40 2019 MANAGEMENT: >STATE:1557331660,GET_CONFIG,,,,,,
- Wed May 08 18:07:42 2019 SENT CONTROL [SophosApplianceCertificate_C240776R4QK4KB0]: 'PUSH_REQUEST' (status=1)
- Wed May 08 18:07:42 2019 AUTH: Received control message: AUTH_FAILED
- Wed May 08 18:07:42 2019 SIGUSR1[soft,auth-failure] received, process restarting
- Wed May 08 18:07:42 2019 MANAGEMENT: >STATE:1557331662,RECONNECTING,auth-failure,,,,,
- Wed May 08 18:07:42 2019 Restart pause, 2 second(s)
- Wed May 08 18:07:42 2019 MANAGEMENT: CMD 'auth-retry none'
- Wed May 08 18:07:44 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed May 08 18:07:44 2019 UDPv4 link local: [undef]
- Wed May 08 18:07:44 2019 UDPv4 link remote: [AF_INET]185.157.231.234:8443
- Wed May 08 18:07:44 2019 MANAGEMENT: >STATE:1557331664,WAIT,,,,,,
- Wed May 08 18:07:44 2019 MANAGEMENT: >STATE:1557331664,AUTH,,,,,,
- Wed May 08 18:07:44 2019 TLS: Initial packet from [AF_INET]185.157.231.234:8443, sid=7592c091 e10869b7
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement