Guest User

Untitled

a guest
May 14th, 2018
747
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Mon May 14 19:38:38 2018 OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
  2.  
  3. Mon May 14 19:38:38 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
  4.  
  5. Mon May 14 19:38:38 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  6.  
  7. Mon May 14 19:38:38 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]177.234.153.145:1198
  8.  
  9. Mon May 14 19:38:38 2018 Socket Buffers: R=[163840->163840] S=[163840->163840]
  10.  
  11. Mon May 14 19:38:38 2018 UDP link local: (not bound)
  12.  
  13. Mon May 14 19:38:38 2018 UDP link remote: [AF_INET]177.234.153.145:1198
  14.  
  15. Mon May 14 19:38:38 2018 TLS: Initial packet from [AF_INET]177.234.153.145:1198, sid=97e1a1a1 b5b41b94
  16.  
  17. Mon May 14 19:38:38 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  18.  
  19. Mon May 14 19:38:38 2018 VERIFY OK: depth=1, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=Private Internet Access, name=Private Internet Access, emailAddress=secure@privateinternetaccess.com
  20.  
  21. Mon May 14 19:38:38 2018 Validating certificate key usage
  22.  
  23. Mon May 14 19:38:38 2018 ++ Certificate has key usage 00a0, expects 00a0
  24.  
  25. Mon May 14 19:38:38 2018 VERIFY KU OK
  26.  
  27. Mon May 14 19:38:38 2018 Validating certificate extended key usage
  28.  
  29. Mon May 14 19:38:38 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  30.  
  31. Mon May 14 19:38:38 2018 VERIFY EKU OK
  32.  
  33. Mon May 14 19:38:38 2018 VERIFY OK: depth=0, C=US, ST=CA, L=LosAngeles, O=Private Internet Access, OU=Private Internet Access, CN=c639445f751951f6ef990700bf590a8a, name=c639445f751951f6ef990700bf590a8a
  34.  
  35. Mon May 14 19:38:39 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  36.  
  37. Mon May 14 19:38:39 2018 [c639445f751951f6ef990700bf590a8a] Peer Connection Initiated with [AF_INET]177.234.153.145:1198
  38.  
  39. Mon May 14 19:38:40 2018 SENT CONTROL [c639445f751951f6ef990700bf590a8a]: 'PUSH_REQUEST' (status=1)
  40.  
  41. Mon May 14 19:38:40 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 209.222.18.222,dhcp-option DNS 209.222.18.218,ping 10,comp-lzo no,route 10.79.10.1,topology net30,ifconfig 10.79.10.10 10.79.10.9,auth-token'
  42.  
  43. Mon May 14 19:38:40 2018 OPTIONS IMPORT: timers and/or timeouts modified
  44.  
  45. Mon May 14 19:38:40 2018 OPTIONS IMPORT: compression parms modified
  46.  
  47. Mon May 14 19:38:40 2018 OPTIONS IMPORT: --ifconfig/up options modified
  48.  
  49. Mon May 14 19:38:40 2018 OPTIONS IMPORT: route options modified
  50.  
  51. Mon May 14 19:38:40 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  52.  
  53. Mon May 14 19:38:40 2018 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  54.  
  55. Mon May 14 19:38:40 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  56.  
  57. Mon May 14 19:38:40 2018 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  58.  
  59. Mon May 14 19:38:40 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  60.  
  61. Mon May 14 19:38:40 2018 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=b8:27:eb:fe:1d:f6
  62.  
  63. Mon May 14 19:38:40 2018 TUN/TAP device tun0 opened
  64.  
  65. Mon May 14 19:38:40 2018 TUN/TAP TX queue length set to 100
  66.  
  67. Mon May 14 19:38:40 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  68.  
  69. Mon May 14 19:38:40 2018 /sbin/ip link set dev tun0 up mtu 1500
  70.  
  71. Mon May 14 19:38:41 2018 /sbin/ip addr add dev tun0 local 10.79.10.10 peer 10.79.10.9
  72.  
  73. Mon May 14 19:38:41 2018 /etc/openvpn/update-resolv-conf tun0 1500 1558 10.79.10.10 10.79.10.9 init
  74.  
  75. dhcp-option DNSSEC allow-downgrade
  76.  
  77. dhcp-option DOMAIN-ROUTE .
  78.  
  79. dhcp-option DNS 209.222.18.222
  80.  
  81. dhcp-option DNS 209.222.18.218
  82.  
  83. Too few arguments.
  84.  
  85. Too few arguments.
  86.  
  87. Mon May 14 19:38:41 2018 /sbin/ip route add 177.234.153.145/32 via 192.168.0.1
  88.  
  89. Mon May 14 19:38:41 2018 /sbin/ip route add 0.0.0.0/1 via 10.79.10.9
  90.  
  91. Mon May 14 19:38:41 2018 /sbin/ip route add 128.0.0.0/1 via 10.79.10.9
  92.  
  93. Mon May 14 19:38:41 2018 /sbin/ip route add 10.79.10.1/32 via 10.79.10.9
  94.  
  95. Mon May 14 19:38:41 2018 Initialization Sequence Completed
  96.  
  97. ^CMon May 14 19:42:04 2018 event_wait : Interrupted system call (code=4)
  98.  
  99. Mon May 14 19:42:04 2018 /sbin/ip route del 10.79.10.1/32
  100.  
  101. Mon May 14 19:42:04 2018 /sbin/ip route del 177.234.153.145/32
  102.  
  103. Mon May 14 19:42:04 2018 /sbin/ip route del 0.0.0.0/1
  104.  
  105. Mon May 14 19:42:04 2018 /sbin/ip route del 128.0.0.0/1
  106.  
  107. Mon May 14 19:42:04 2018 Closing TUN/TAP interface
  108.  
  109. Mon May 14 19:42:04 2018 /sbin/ip addr del dev tun0 local 10.79.10.10 peer 10.79.10.9
  110.  
  111. Mon May 14 19:42:04 2018 /etc/openvpn/update-resolv-conf tun0 1500 1558 10.79.10.10 10.79.10.9 init
  112.  
  113. Too few arguments.
  114.  
  115. Too few arguments.
  116.  
  117. Mon May 14 19:42:04 2018 SIGINT[hard,] received, process exiting
RAW Paste Data