Advertisement
Guest User

Untitled

a guest
Nov 15th, 2017
75
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.75 KB | None | 0 0
  1. Wed Nov 15 12:57:38 2017 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
  2. Wed Nov 15 12:57:38 2017 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
  3. Enter Auth Username: **********
  4. Enter Auth Password: ******************************************
  5. Wed Nov 15 12:57:54 2017 Control Channel Authentication: tls-auth using INLINE static key file
  6. Wed Nov 15 12:57:54 2017 Outgoing Control Channel Authentication: Using 512 bit message hash \'SHA512\' for HMAC authentication
  7. Wed Nov 15 12:57:54 2017 Incoming Control Channel Authentication: Using 512 bit message hash \'SHA512\' for HMAC authentication
  8. Wed Nov 15 12:57:54 2017 Socket Buffers: R=[212992->212992] S=[212992->212992]
  9. Wed Nov 15 12:57:54 2017 UDPv4 link local: [undef]
  10. Wed Nov 15 12:57:54 2017 UDPv4 link remote: [AF_INET]192.99.32.226:80
  11. Wed Nov 15 12:58:54 2017 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  12. Wed Nov 15 12:58:54 2017 TLS Error: TLS handshake failed
  13. Wed Nov 15 12:58:54 2017 SIGUSR1[soft,tls-error] received, process restarting
  14. Wed Nov 15 12:58:54 2017 Restart pause, 2 second(s)
  15. Wed Nov 15 12:58:56 2017 Socket Buffers: R=[212992->212992] S=[212992->212992]
  16. Wed Nov 15 12:58:56 2017 UDPv4 link local: [undef]
  17. Wed Nov 15 12:58:56 2017 UDPv4 link remote: [AF_INET]192.99.32.226:443
  18. Wed Nov 15 12:58:56 2017 TLS: Initial packet from [AF_INET]192.99.32.226:443, sid=de7ccff4 fd1f8635
  19. Wed Nov 15 12:58:56 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  20. Wed Nov 15 12:58:57 2017 VERIFY OK: depth=1, C=NA, ST=NA, L=NA, O=SecureVPN.to, CN=SecureVPN.to
  21. Wed Nov 15 12:58:57 2017 Validating certificate key usage
  22. Wed Nov 15 12:58:57 2017 ++ Certificate has key usage 00a0, expects 00a0
  23. Wed Nov 15 12:58:57 2017 VERIFY KU OK
  24. Wed Nov 15 12:58:57 2017 Validating certificate extended key usage
  25. Wed Nov 15 12:58:57 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  26. Wed Nov 15 12:58:57 2017 VERIFY EKU OK
  27. Wed Nov 15 12:58:57 2017 VERIFY OK: depth=0, C=NA, ST=NA, L=NA, O=SecureVPN.to, CN=server
  28. Wed Nov 15 12:58:58 2017 Data Channel Encrypt: Cipher \'AES-256-CBC\' initialized with 256 bit key
  29. Wed Nov 15 12:58:58 2017 Data Channel Encrypt: Using 512 bit message hash \'SHA512\' for HMAC authentication
  30. Wed Nov 15 12:58:58 2017 Data Channel Decrypt: Cipher \'AES-256-CBC\' initialized with 256 bit key
  31. Wed Nov 15 12:58:58 2017 Data Channel Decrypt: Using 512 bit message hash \'SHA512\' for HMAC authentication
  32. Wed Nov 15 12:58:58 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  33. Wed Nov 15 12:58:58 2017 [server] Peer Connection Initiated with [AF_INET]192.99.32.226:443
  34. Wed Nov 15 12:59:00 2017 SENT CONTROL [server]: \'PUSH_REQUEST\' (status=1)
  35. Wed Nov 15 12:59:01 2017 PUSH: Received control message: \'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 156.154.70.5,dhcp-option DNS 156.154.71.5,sndbuf 65536,rcvbuf 65536,route-gateway 10.21.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.21.10.142 255.255.252.0,peer-id 0\'
  36. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: timers and/or timeouts modified
  37. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  38. Wed Nov 15 12:59:01 2017 Socket Buffers: R=[212992->131072] S=[212992->131072]
  39. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: --ifconfig/up options modified
  40. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: route options modified
  41. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: route-related options modified
  42. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  43. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: peer-id set
  44. Wed Nov 15 12:59:01 2017 OPTIONS IMPORT: adjusting link_mtu to 1608
  45. Wed Nov 15 12:59:01 2017 ROUTE_GATEWAY 10.75.0.1/255.255.0.0 IFACE=enp2s0 HWADDR=34:64:a9:20:97:c7
  46. Wed Nov 15 12:59:01 2017 TUN/TAP device tun0 opened
  47. Wed Nov 15 12:59:01 2017 TUN/TAP TX queue length set to 100
  48. Wed Nov 15 12:59:01 2017 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  49. Wed Nov 15 12:59:01 2017 /sbin/ip link set dev tun0 up mtu 1500
  50. Wed Nov 15 12:59:01 2017 /sbin/ip addr add dev tun0 10.21.10.142/22 broadcast 10.21.11.255
  51. Wed Nov 15 12:59:01 2017 /sbin/ip route add 192.99.32.226/32 via 10.75.0.1
  52. Wed Nov 15 12:59:01 2017 /sbin/ip route add 0.0.0.0/1 via 10.21.8.1
  53. Wed Nov 15 12:59:01 2017 /sbin/ip route add 128.0.0.0/1 via 10.21.8.1
  54. Wed Nov 15 12:59:01 2017 Initialization Sequence Completed
  55. Wed Nov 15 13:58:58 2017 TLS: soft reset sec=0 bytes=83760/0 pkts=720/0
  56. Wed Nov 15 13:58:58 2017 VERIFY OK: depth=1, C=NA, ST=NA, L=NA, O=SecureVPN.to, CN=SecureVPN.to
  57. Wed Nov 15 13:58:58 2017 Validating certificate key usage
  58. Wed Nov 15 13:58:58 2017 ++ Certificate has key
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement