Advertisement
Guest User

Untitled

a guest
Nov 27th, 2018
175
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.97 KB | None | 0 0
  1. Tue Nov 27 19:21:26 2018 OpenVPN 2.4.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  2. Tue Nov 27 19:21:26 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  3. Tue Nov 27 19:21:26 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  4. Tue Nov 27 19:21:26 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  5. Tue Nov 27 19:21:26 2018 TCP/UDP: Preserving recently used remote address: [AF_INET][redacted]:[redacted]
  6. Tue Nov 27 19:21:26 2018 Socket Buffers: [redacted]
  7. Tue Nov 27 19:21:26 2018 UDP link local: (not bound)
  8. Tue Nov 27 19:21:26 2018 UDP link remote: [AF_INET][redacted]:[redacted]
  9. Tue Nov 27 19:21:26 2018 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  10. Tue Nov 27 19:21:26 2018 TLS: Initial packet from [AF_INET][redacted]:[redacted], sid=[redacted]
  11. Tue Nov 27 19:21:26 2018 VERIFY OK: [redacted]
  12. Tue Nov 27 19:21:26 2018 Validating certificate key usage
  13. Tue Nov 27 19:21:26 2018 ++ Certificate has key usage 00a0, expects 00a0
  14. Tue Nov 27 19:21:26 2018 VERIFY KU OK
  15. Tue Nov 27 19:21:26 2018 Validating certificate extended key usage
  16. Tue Nov 27 19:21:26 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  17. Tue Nov 27 19:21:26 2018 VERIFY EKU OK
  18. Tue Nov 27 19:21:26 2018 VERIFY OK: [redacted]
  19. Tue Nov 27 19:21:26 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  20. Tue Nov 27 19:21:26 2018 [server] Peer Connection Initiated with [AF_INET][redacted]:[redacted]
  21. Tue Nov 27 19:21:27 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  22. Tue Nov 27 19:21:27 2018 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS [redacted],route-gateway [redacted],topology subnet,ping 10,ping-restart 60,ifconfig [redacted] 255.255.255.0,peer-id 15,cipher AES-256-GCM'
  23. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: timers and/or timeouts modified
  24. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: compression parms modified
  25. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: --ifconfig/up options modified
  26. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: route options modified
  27. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: route-related options modified
  28. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  29. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: peer-id set
  30. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: adjusting link_mtu to 1625
  31. Tue Nov 27 19:21:27 2018 OPTIONS IMPORT: data channel crypto options modified
  32. Tue Nov 27 19:21:27 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  33. Tue Nov 27 19:21:27 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  34. Tue Nov 27 19:21:27 2018 ROUTE_GATEWAY 10.0.2.2/255.255.255.0 IFACE=eth0 HWADDR=[redacted]
  35. Tue Nov 27 19:21:27 2018 TUN/TAP device tun0 opened
  36. Tue Nov 27 19:21:27 2018 Note: Cannot set tx queue length on tun0: Operation not permitted (errno=1)
  37. Tue Nov 27 19:21:27 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  38. Tue Nov 27 19:21:27 2018 /usr/bin/ip_unpriv link set dev tun0 up mtu 1500
  39. Tue Nov 27 19:21:27 2018 /usr/bin/ip_unpriv addr add dev tun0 [redacted]/24 broadcast [redacted]
  40. Tue Nov 27 19:21:33 2018 /usr/bin/ip_unpriv route add [redacted]/32 via 10.0.2.2
  41. Tue Nov 27 19:21:33 2018 /usr/bin/ip_unpriv route add 0.0.0.0/1 via [redacted]
  42. Tue Nov 27 19:21:33 2018 /usr/bin/ip_unpriv route add 128.0.0.0/1 via [redacted]
  43. Tue Nov 27 19:21:33 2018 UID set to tunnel
  44. Tue Nov 27 19:21:33 2018 Initialization Sequence Completed
  45. Tue Nov 27 20:21:27 2018 VERIFY OK: [redacted]
  46. Tue Nov 27 20:21:27 2018 Validating certificate key usage
  47. Tue Nov 27 20:21:27 2018 ++ Certificate has key usage 00a0, expects 00a0
  48. Tue Nov 27 20:21:27 2018 VERIFY KU OK
  49. Tue Nov 27 20:21:27 2018 Validating certificate extended key usage
  50. Tue Nov 27 20:21:27 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  51. Tue Nov 27 20:21:27 2018 VERIFY EKU OK
  52. Tue Nov 27 20:21:27 2018 VERIFY OK: [redacted]
  53. Tue Nov 27 20:21:27 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  54. Tue Nov 27 20:21:27 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  55. Tue Nov 27 20:21:27 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  56. Tue Nov 27 21:21:27 2018 TLS: soft reset sec=0 bytes=[redcated]
  57. Tue Nov 27 21:21:27 2018 VERIFY OK: [redacted]
  58. Tue Nov 27 21:21:27 2018 Validating certificate key usage
  59. Tue Nov 27 21:21:27 2018 ++ Certificate has key usage 00a0, expects 00a0
  60. Tue Nov 27 21:21:27 2018 VERIFY KU OK
  61. Tue Nov 27 21:21:27 2018 Validating certificate extended key usage
  62. Tue Nov 27 21:21:27 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  63. Tue Nov 27 21:21:27 2018 VERIFY EKU OK
  64. Tue Nov 27 21:21:27 2018 VERIFY OK: [redacted]
  65. Tue Nov 27 21:21:28 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  66. Tue Nov 27 21:21:28 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  67. Tue Nov 27 21:21:28 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  68. Tue Nov 27 22:21:27 2018 TLS: tls_process: killed expiring key
  69. Tue Nov 27 22:21:27 2018 VERIFY OK: [redacted]
  70. Tue Nov 27 22:21:27 2018 Validating certificate key usage
  71. Tue Nov 27 22:21:27 2018 ++ Certificate has key usage 00a0, expects 00a0
  72. Tue Nov 27 22:21:27 2018 VERIFY KU OK
  73. Tue Nov 27 22:21:27 2018 Validating certificate extended key usage
  74. Tue Nov 27 22:21:27 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  75. Tue Nov 27 22:21:27 2018 VERIFY EKU OK
  76. Tue Nov 27 22:21:27 2018 VERIFY OK: [redacted]
  77. Tue Nov 27 22:21:27 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  78. Tue Nov 27 22:21:27 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  79. Tue Nov 27 22:21:27 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  80. Tue Nov 27 23:21:27 2018 TLS: soft reset sec=0 bytes=[redcated]
  81. Tue Nov 27 23:21:27 2018 VERIFY OK: [redacted]
  82. Tue Nov 27 23:21:27 2018 Validating certificate key usage
  83. Tue Nov 27 23:21:27 2018 ++ Certificate has key usage 00a0, expects 00a0
  84. Tue Nov 27 23:21:27 2018 VERIFY KU OK
  85. Tue Nov 27 23:21:27 2018 Validating certificate extended key usage
  86. Tue Nov 27 23:21:27 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  87. Tue Nov 27 23:21:27 2018 VERIFY EKU OK
  88. Tue Nov 27 23:21:27 2018 VERIFY OK: [redacted]
  89. Tue Nov 27 23:21:27 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  90. Tue Nov 27 23:21:27 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  91. Tue Nov 27 23:21:27 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement