Advertisement
Guest User

Untitled

a guest
Sep 28th, 2015
117
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 27.80 KB | None | 0 0
  1. with route-nopull & route 10.8.0.0 255.255.255.0
  2.  
  3. Mon Sep 28 14:45:23 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
  4. Mon Sep 28 14:45:23 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
  5. Mon Sep 28 14:45:23 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  6. Mon Sep 28 14:45:23 2015 Need hold release from management interface, waiting...
  7. Mon Sep 28 14:45:23 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  8. Mon Sep 28 14:45:23 2015 MANAGEMENT: CMD 'state on'
  9. Mon Sep 28 14:45:23 2015 MANAGEMENT: CMD 'log all on'
  10. Mon Sep 28 14:45:23 2015 MANAGEMENT: CMD 'hold off'
  11. Mon Sep 28 14:45:23 2015 MANAGEMENT: CMD 'hold release'
  12. Mon Sep 28 14:45:23 2015 Control Channel Authentication: using 'C:\vpn\ta.key' as a OpenVPN static key file
  13. Mon Sep 28 14:45:23 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  14. Mon Sep 28 14:45:23 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  15. Mon Sep 28 14:45:23 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
  16. Mon Sep 28 14:45:23 2015 UDPv4 link local (bound): [undef]
  17. Mon Sep 28 14:45:23 2015 UDPv4 link remote: [AF_INET]78.46.197.102:1488
  18. Mon Sep 28 14:45:23 2015 MANAGEMENT: >STATE:1443440723,WAIT,,,
  19. Mon Sep 28 14:45:24 2015 MANAGEMENT: >STATE:1443440724,AUTH,,,
  20. Mon Sep 28 14:45:24 2015 TLS: Initial packet from [AF_INET]78.46.197.102:1488, sid=3b122ce1 c4e80da1
  21. Mon Sep 28 14:45:24 2015 VERIFY OK: depth=1, C=RU, ST=None, L=None, O=server, OU=server, CN=server CA, name=server, emailAddress=bakatrouble@gmail.com
  22. Mon Sep 28 14:45:24 2015 Validating certificate key usage
  23. Mon Sep 28 14:45:24 2015 ++ Certificate has key usage 00a0, expects 00a0
  24. Mon Sep 28 14:45:24 2015 VERIFY KU OK
  25. Mon Sep 28 14:45:24 2015 Validating certificate extended key usage
  26. Mon Sep 28 14:45:24 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  27. Mon Sep 28 14:45:24 2015 VERIFY EKU OK
  28. Mon Sep 28 14:45:24 2015 VERIFY OK: depth=0, C=RU, ST=None, L=None, O=server, OU=server, CN=server, name=server, emailAddress=bakatrouble@gmail.com
  29. Mon Sep 28 14:45:25 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  30. Mon Sep 28 14:45:25 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  31. Mon Sep 28 14:45:25 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  32. Mon Sep 28 14:45:25 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  33. Mon Sep 28 14:45:25 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  34. Mon Sep 28 14:45:25 2015 [server] Peer Connection Initiated with [AF_INET]78.46.197.102:1488
  35. Mon Sep 28 14:45:26 2015 MANAGEMENT: >STATE:1443440726,GET_CONFIG,,,
  36. Mon Sep 28 14:45:27 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  37. Mon Sep 28 14:45:27 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21'
  38. Mon Sep 28 14:45:27 2015 Options error: option 'redirect-gateway' cannot be used in this context ([PUSH-OPTIONS])
  39. Mon Sep 28 14:45:27 2015 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
  40. Mon Sep 28 14:45:27 2015 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
  41. Mon Sep 28 14:45:27 2015 Options error: option 'route' cannot be used in this context ([PUSH-OPTIONS])
  42. Mon Sep 28 14:45:27 2015 OPTIONS IMPORT: timers and/or timeouts modified
  43. Mon Sep 28 14:45:27 2015 OPTIONS IMPORT: --ifconfig/up options modified
  44. Mon Sep 28 14:45:27 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  45. Mon Sep 28 14:45:27 2015 MANAGEMENT: >STATE:1443440727,ASSIGN_IP,,10.8.0.22,
  46. Mon Sep 28 14:45:27 2015 open_tun, tt->ipv6=0
  47. Mon Sep 28 14:45:27 2015 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C6984B11-8AA5-4294-BB39-7799069991E6}.tap
  48. Mon Sep 28 14:45:27 2015 TAP-Windows Driver Version 9.21
  49. Mon Sep 28 14:45:27 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {C6984B11-8AA5-4294-BB39-7799069991E6} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
  50. Mon Sep 28 14:45:27 2015 Successful ARP Flush on interface [49] {C6984B11-8AA5-4294-BB39-7799069991E6}
  51. Mon Sep 28 14:45:32 2015 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
  52. Mon Sep 28 14:45:32 2015 Initialization Sequence Completed
  53. Mon Sep 28 14:45:32 2015 MANAGEMENT: >STATE:1443440732,CONNECTED,SUCCESS,10.8.0.22,78.46.197.102
  54. Mon Sep 28 15:12:44 2015 MANAGEMENT: CMD 'signal SIGHUP'
  55. Mon Sep 28 15:12:44 2015 Closing TUN/TAP interface
  56. Mon Sep 28 15:12:44 2015 SIGHUP[hard,] received, process restarting
  57. Mon Sep 28 15:12:44 2015 MANAGEMENT: >STATE:1443442364,RECONNECTING,SIGHUP,,
  58. Mon Sep 28 15:12:44 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
  59. Mon Sep 28 15:12:44 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
  60. Mon Sep 28 15:12:44 2015 Restart pause, 2 second(s)
  61. Mon Sep 28 15:12:46 2015 Control Channel Authentication: using 'C:\vpn\ta.key' as a OpenVPN static key file
  62. Mon Sep 28 15:12:46 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  63. Mon Sep 28 15:12:46 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  64. Mon Sep 28 15:12:46 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
  65. Mon Sep 28 15:12:46 2015 UDPv4 link local (bound): [undef]
  66. Mon Sep 28 15:12:46 2015 UDPv4 link remote: [AF_INET]78.46.197.102:1488
  67. Mon Sep 28 15:12:46 2015 MANAGEMENT: >STATE:1443442366,WAIT,,,
  68. Mon Sep 28 15:12:46 2015 MANAGEMENT: >STATE:1443442366,AUTH,,,
  69. Mon Sep 28 15:12:46 2015 TLS: Initial packet from [AF_INET]78.46.197.102:1488, sid=27af317f e4c351de
  70. Mon Sep 28 15:12:47 2015 VERIFY OK: depth=1, C=RU, ST=None, L=None, O=server, OU=server, CN=server CA, name=server, emailAddress=bakatrouble@gmail.com
  71. Mon Sep 28 15:12:47 2015 Validating certificate key usage
  72. Mon Sep 28 15:12:47 2015 ++ Certificate has key usage 00a0, expects 00a0
  73. Mon Sep 28 15:12:47 2015 VERIFY KU OK
  74. Mon Sep 28 15:12:47 2015 Validating certificate extended key usage
  75. Mon Sep 28 15:12:47 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  76. Mon Sep 28 15:12:47 2015 VERIFY EKU OK
  77. Mon Sep 28 15:12:47 2015 VERIFY OK: depth=0, C=RU, ST=None, L=None, O=server, OU=server, CN=server, name=server, emailAddress=bakatrouble@gmail.com
  78. Mon Sep 28 15:12:47 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  79. Mon Sep 28 15:12:47 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  80. Mon Sep 28 15:12:47 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  81. Mon Sep 28 15:12:47 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  82. Mon Sep 28 15:12:47 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  83. Mon Sep 28 15:12:47 2015 [server] Peer Connection Initiated with [AF_INET]78.46.197.102:1488
  84. Mon Sep 28 15:12:48 2015 MANAGEMENT: >STATE:1443442368,GET_CONFIG,,,
  85. Mon Sep 28 15:12:49 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  86. Mon Sep 28 15:12:49 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21'
  87. Mon Sep 28 15:12:49 2015 OPTIONS IMPORT: timers and/or timeouts modified
  88. Mon Sep 28 15:12:49 2015 OPTIONS IMPORT: --ifconfig/up options modified
  89. Mon Sep 28 15:12:49 2015 OPTIONS IMPORT: route options modified
  90. Mon Sep 28 15:12:49 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  91. Mon Sep 28 15:12:50 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  92. Mon Sep 28 15:12:50 2015 MANAGEMENT: >STATE:1443442370,ASSIGN_IP,,10.8.0.22,
  93. Mon Sep 28 15:12:50 2015 open_tun, tt->ipv6=0
  94. Mon Sep 28 15:12:50 2015 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C6984B11-8AA5-4294-BB39-7799069991E6}.tap
  95. Mon Sep 28 15:12:50 2015 TAP-Windows Driver Version 9.21
  96. Mon Sep 28 15:12:50 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {C6984B11-8AA5-4294-BB39-7799069991E6} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
  97. Mon Sep 28 15:12:50 2015 Successful ARP Flush on interface [49] {C6984B11-8AA5-4294-BB39-7799069991E6}
  98. Mon Sep 28 15:12:55 2015 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  99. Mon Sep 28 15:12:55 2015 C:\WINDOWS\system32\route.exe ADD 78.46.197.102 MASK 255.255.255.255 192.168.1.1
  100. Mon Sep 28 15:12:55 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  101. Mon Sep 28 15:12:55 2015 Route addition via IPAPI succeeded [adaptive]
  102. Mon Sep 28 15:12:55 2015 C:\WINDOWS\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 24
  103. Mon Sep 28 15:12:55 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  104. Mon Sep 28 15:12:55 2015 Route addition via IPAPI succeeded [adaptive]
  105. Mon Sep 28 15:12:55 2015 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.21
  106. Mon Sep 28 15:12:55 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  107. Mon Sep 28 15:12:55 2015 Route addition via IPAPI succeeded [adaptive]
  108. Mon Sep 28 15:12:55 2015 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.21
  109. Mon Sep 28 15:12:55 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  110. Mon Sep 28 15:12:55 2015 Route addition via IPAPI succeeded [adaptive]
  111. Mon Sep 28 15:12:55 2015 MANAGEMENT: >STATE:1443442375,ADD_ROUTES,,,
  112. Mon Sep 28 15:12:55 2015 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  113. Mon Sep 28 15:12:55 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  114. Mon Sep 28 15:12:55 2015 Route addition via IPAPI succeeded [adaptive]
  115. Mon Sep 28 15:12:55 2015 Initialization Sequence Completed
  116. Mon Sep 28 15:12:55 2015 MANAGEMENT: >STATE:1443442375,CONNECTED,SUCCESS,10.8.0.22,78.46.197.102
  117. Mon Sep 28 15:19:15 2015 MANAGEMENT: CMD 'signal SIGHUP'
  118. Mon Sep 28 15:19:15 2015 C:\WINDOWS\system32\route.exe DELETE 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  119. Mon Sep 28 15:19:15 2015 Route deletion via IPAPI succeeded [adaptive]
  120. Mon Sep 28 15:19:15 2015 C:\WINDOWS\system32\route.exe DELETE 78.46.197.102 MASK 255.255.255.255 192.168.1.1
  121. Mon Sep 28 15:19:15 2015 Route deletion via IPAPI succeeded [adaptive]
  122. Mon Sep 28 15:19:15 2015 C:\WINDOWS\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
  123. Mon Sep 28 15:19:15 2015 Route deletion via IPAPI succeeded [adaptive]
  124. Mon Sep 28 15:19:15 2015 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.21
  125. Mon Sep 28 15:19:15 2015 Route deletion via IPAPI succeeded [adaptive]
  126. Mon Sep 28 15:19:15 2015 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.21
  127. Mon Sep 28 15:19:15 2015 Route deletion via IPAPI succeeded [adaptive]
  128. Mon Sep 28 15:19:15 2015 Closing TUN/TAP interface
  129. Mon Sep 28 15:19:15 2015 SIGHUP[hard,] received, process restarting
  130. Mon Sep 28 15:19:15 2015 MANAGEMENT: >STATE:1443442755,RECONNECTING,SIGHUP,,
  131. Mon Sep 28 15:19:15 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
  132. Mon Sep 28 15:19:15 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
  133. Mon Sep 28 15:19:15 2015 Restart pause, 2 second(s)
  134. Mon Sep 28 15:19:17 2015 Control Channel Authentication: using 'C:\vpn\ta.key' as a OpenVPN static key file
  135. Mon Sep 28 15:19:17 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  136. Mon Sep 28 15:19:17 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  137. Mon Sep 28 15:19:17 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
  138. Mon Sep 28 15:19:17 2015 UDPv4 link local (bound): [undef]
  139. Mon Sep 28 15:19:17 2015 UDPv4 link remote: [AF_INET]78.46.197.102:1488
  140. Mon Sep 28 15:19:17 2015 MANAGEMENT: >STATE:1443442757,WAIT,,,
  141. Mon Sep 28 15:19:18 2015 MANAGEMENT: >STATE:1443442758,AUTH,,,
  142. Mon Sep 28 15:19:18 2015 TLS: Initial packet from [AF_INET]78.46.197.102:1488, sid=e4ef5113 1e123d25
  143. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  144. Mon Sep 28 15:19:18 2015 VERIFY OK: depth=1, C=RU, ST=None, L=None, O=server, OU=server, CN=server CA, name=server, emailAddress=bakatrouble@gmail.com
  145. Mon Sep 28 15:19:18 2015 Validating certificate key usage
  146. Mon Sep 28 15:19:18 2015 ++ Certificate has key usage 00a0, expects 00a0
  147. Mon Sep 28 15:19:18 2015 VERIFY KU OK
  148. Mon Sep 28 15:19:18 2015 Validating certificate extended key usage
  149. Mon Sep 28 15:19:18 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  150. Mon Sep 28 15:19:18 2015 VERIFY EKU OK
  151. Mon Sep 28 15:19:18 2015 VERIFY OK: depth=0, C=RU, ST=None, L=None, O=server, OU=server, CN=server, name=server, emailAddress=bakatrouble@gmail.com
  152. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  153. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  154. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  155. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  156. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  157. Mon Sep 28 15:19:18 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  158. Mon Sep 28 15:19:19 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  159. Mon Sep 28 15:19:19 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  160. Mon Sep 28 15:19:19 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  161. Mon Sep 28 15:19:19 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  162. Mon Sep 28 15:19:19 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  163. Mon Sep 28 15:19:19 2015 [server] Peer Connection Initiated with [AF_INET]78.46.197.102:1488
  164. Mon Sep 28 15:19:20 2015 MANAGEMENT: >STATE:1443442760,GET_CONFIG,,,
  165. Mon Sep 28 15:19:21 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  166. Mon Sep 28 15:19:21 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21'
  167. Mon Sep 28 15:19:21 2015 Options error: option 'redirect-gateway' cannot be used in this context ([PUSH-OPTIONS])
  168. Mon Sep 28 15:19:21 2015 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
  169. Mon Sep 28 15:19:21 2015 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
  170. Mon Sep 28 15:19:21 2015 Options error: option 'route' cannot be used in this context ([PUSH-OPTIONS])
  171. Mon Sep 28 15:19:21 2015 OPTIONS IMPORT: timers and/or timeouts modified
  172. Mon Sep 28 15:19:21 2015 OPTIONS IMPORT: --ifconfig/up options modified
  173. Mon Sep 28 15:19:21 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  174. Mon Sep 28 15:19:21 2015 MANAGEMENT: >STATE:1443442761,ASSIGN_IP,,10.8.0.22,
  175. Mon Sep 28 15:19:21 2015 open_tun, tt->ipv6=0
  176. Mon Sep 28 15:19:21 2015 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C6984B11-8AA5-4294-BB39-7799069991E6}.tap
  177. Mon Sep 28 15:19:21 2015 TAP-Windows Driver Version 9.21
  178. Mon Sep 28 15:19:21 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {C6984B11-8AA5-4294-BB39-7799069991E6} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
  179. Mon Sep 28 15:19:21 2015 Successful ARP Flush on interface [49] {C6984B11-8AA5-4294-BB39-7799069991E6}
  180. Mon Sep 28 15:19:26 2015 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  181. Mon Sep 28 15:19:26 2015 MANAGEMENT: >STATE:1443442766,ADD_ROUTES,,,
  182. Mon Sep 28 15:19:26 2015 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  183. Mon Sep 28 15:19:26 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  184. Mon Sep 28 15:19:26 2015 Route addition via IPAPI succeeded [adaptive]
  185. Mon Sep 28 15:19:26 2015 Initialization Sequence Completed
  186. Mon Sep 28 15:19:26 2015 MANAGEMENT: >STATE:1443442766,CONNECTED,SUCCESS,10.8.0.22,78.46.197.102
  187. Mon Sep 28 15:24:49 2015 MANAGEMENT: CMD 'signal SIGHUP'
  188. Mon Sep 28 15:24:49 2015 C:\WINDOWS\system32\route.exe DELETE 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  189. Mon Sep 28 15:24:49 2015 Route deletion via IPAPI succeeded [adaptive]
  190. Mon Sep 28 15:24:49 2015 Closing TUN/TAP interface
  191. Mon Sep 28 15:24:49 2015 SIGHUP[hard,] received, process restarting
  192. Mon Sep 28 15:24:49 2015 MANAGEMENT: >STATE:1443443089,RECONNECTING,SIGHUP,,
  193. Mon Sep 28 15:24:49 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
  194. Mon Sep 28 15:24:49 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
  195. Mon Sep 28 15:24:49 2015 Restart pause, 2 second(s)
  196. Mon Sep 28 15:24:51 2015 Control Channel Authentication: using 'C:\vpn\ta.key' as a OpenVPN static key file
  197. Mon Sep 28 15:24:51 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  198. Mon Sep 28 15:24:51 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  199. Mon Sep 28 15:24:51 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
  200. Mon Sep 28 15:24:51 2015 UDPv4 link local (bound): [undef]
  201. Mon Sep 28 15:24:51 2015 UDPv4 link remote: [AF_INET]78.46.197.102:1488
  202. Mon Sep 28 15:24:51 2015 MANAGEMENT: >STATE:1443443091,WAIT,,,
  203. Mon Sep 28 15:24:51 2015 MANAGEMENT: >STATE:1443443091,AUTH,,,
  204. Mon Sep 28 15:24:51 2015 TLS: Initial packet from [AF_INET]78.46.197.102:1488, sid=5573d409 b9604a66
  205. Mon Sep 28 15:24:51 2015 VERIFY OK: depth=1, C=RU, ST=None, L=None, O=server, OU=server, CN=server CA, name=server, emailAddress=bakatrouble@gmail.com
  206. Mon Sep 28 15:24:51 2015 Validating certificate key usage
  207. Mon Sep 28 15:24:51 2015 ++ Certificate has key usage 00a0, expects 00a0
  208. Mon Sep 28 15:24:51 2015 VERIFY KU OK
  209. Mon Sep 28 15:24:51 2015 Validating certificate extended key usage
  210. Mon Sep 28 15:24:51 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  211. Mon Sep 28 15:24:51 2015 VERIFY EKU OK
  212. Mon Sep 28 15:24:51 2015 VERIFY OK: depth=0, C=RU, ST=None, L=None, O=server, OU=server, CN=server, name=server, emailAddress=bakatrouble@gmail.com
  213. Mon Sep 28 15:24:51 2015 TLS Error: local/remote TLS keys are out of sync: [AF_INET]78.46.197.102:1488 [0]
  214. Mon Sep 28 15:24:52 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  215. Mon Sep 28 15:24:52 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  216. Mon Sep 28 15:24:52 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  217. Mon Sep 28 15:24:52 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  218. Mon Sep 28 15:24:52 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  219. Mon Sep 28 15:24:52 2015 [server] Peer Connection Initiated with [AF_INET]78.46.197.102:1488
  220. Mon Sep 28 15:24:53 2015 MANAGEMENT: >STATE:1443443093,GET_CONFIG,,,
  221. Mon Sep 28 15:24:54 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  222. Mon Sep 28 15:24:54 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21'
  223. Mon Sep 28 15:24:54 2015 Options error: option 'redirect-gateway' cannot be used in this context ([PUSH-OPTIONS])
  224. Mon Sep 28 15:24:54 2015 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
  225. Mon Sep 28 15:24:54 2015 Options error: option 'dhcp-option' cannot be used in this context ([PUSH-OPTIONS])
  226. Mon Sep 28 15:24:54 2015 Options error: option 'route' cannot be used in this context ([PUSH-OPTIONS])
  227. Mon Sep 28 15:24:54 2015 OPTIONS IMPORT: timers and/or timeouts modified
  228. Mon Sep 28 15:24:54 2015 OPTIONS IMPORT: --ifconfig/up options modified
  229. Mon Sep 28 15:24:54 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  230. Mon Sep 28 15:24:54 2015 MANAGEMENT: >STATE:1443443094,ASSIGN_IP,,10.8.0.22,
  231. Mon Sep 28 15:24:54 2015 open_tun, tt->ipv6=0
  232. Mon Sep 28 15:24:54 2015 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C6984B11-8AA5-4294-BB39-7799069991E6}.tap
  233. Mon Sep 28 15:24:54 2015 TAP-Windows Driver Version 9.21
  234. Mon Sep 28 15:24:54 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {C6984B11-8AA5-4294-BB39-7799069991E6} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
  235. Mon Sep 28 15:24:54 2015 Successful ARP Flush on interface [49] {C6984B11-8AA5-4294-BB39-7799069991E6}
  236. Mon Sep 28 15:24:59 2015 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
  237. Mon Sep 28 15:24:59 2015 MANAGEMENT: >STATE:1443443099,ADD_ROUTES,,,
  238. Mon Sep 28 15:24:59 2015 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  239. Mon Sep 28 15:24:59 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  240. Mon Sep 28 15:24:59 2015 Route addition via IPAPI succeeded [adaptive]
  241. Mon Sep 28 15:24:59 2015 Initialization Sequence Completed
  242. Mon Sep 28 15:24:59 2015 MANAGEMENT: >STATE:1443443099,CONNECTED,SUCCESS,10.8.0.22,78.46.197.102
  243.  
  244. witout route-nopull
  245.  
  246. Mon Sep 28 15:29:29 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
  247. Mon Sep 28 15:29:29 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
  248. Mon Sep 28 15:29:29 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  249. Mon Sep 28 15:29:29 2015 Need hold release from management interface, waiting...
  250. Mon Sep 28 15:29:30 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  251. Mon Sep 28 15:29:30 2015 MANAGEMENT: CMD 'state on'
  252. Mon Sep 28 15:29:30 2015 MANAGEMENT: CMD 'log all on'
  253. Mon Sep 28 15:29:30 2015 MANAGEMENT: CMD 'hold off'
  254. Mon Sep 28 15:29:30 2015 MANAGEMENT: CMD 'hold release'
  255. Mon Sep 28 15:29:30 2015 Control Channel Authentication: using 'C:\vpn\ta.key' as a OpenVPN static key file
  256. Mon Sep 28 15:29:30 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  257. Mon Sep 28 15:29:30 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  258. Mon Sep 28 15:29:30 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
  259. Mon Sep 28 15:29:30 2015 UDPv4 link local (bound): [undef]
  260. Mon Sep 28 15:29:30 2015 UDPv4 link remote: [AF_INET]78.46.197.102:1488
  261. Mon Sep 28 15:29:30 2015 MANAGEMENT: >STATE:1443443370,WAIT,,,
  262. Mon Sep 28 15:29:30 2015 MANAGEMENT: >STATE:1443443370,AUTH,,,
  263. Mon Sep 28 15:29:30 2015 TLS: Initial packet from [AF_INET]78.46.197.102:1488, sid=8c665fef d9407d43
  264. Mon Sep 28 15:29:31 2015 VERIFY OK: depth=1, C=RU, ST=None, L=None, O=server, OU=server, CN=server CA, name=server, emailAddress=bakatrouble@gmail.com
  265. Mon Sep 28 15:29:31 2015 Validating certificate key usage
  266. Mon Sep 28 15:29:31 2015 ++ Certificate has key usage 00a0, expects 00a0
  267. Mon Sep 28 15:29:31 2015 VERIFY KU OK
  268. Mon Sep 28 15:29:31 2015 Validating certificate extended key usage
  269. Mon Sep 28 15:29:31 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  270. Mon Sep 28 15:29:31 2015 VERIFY EKU OK
  271. Mon Sep 28 15:29:31 2015 VERIFY OK: depth=0, C=RU, ST=None, L=None, O=server, OU=server, CN=server, name=server, emailAddress=bakatrouble@gmail.com
  272. Mon Sep 28 15:29:32 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  273. Mon Sep 28 15:29:32 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  274. Mon Sep 28 15:29:32 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  275. Mon Sep 28 15:29:32 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  276. Mon Sep 28 15:29:32 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  277. Mon Sep 28 15:29:32 2015 [server] Peer Connection Initiated with [AF_INET]78.46.197.102:1488
  278. Mon Sep 28 15:29:33 2015 MANAGEMENT: >STATE:1443443373,GET_CONFIG,,,
  279. Mon Sep 28 15:29:34 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  280. Mon Sep 28 15:29:34 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21'
  281. Mon Sep 28 15:29:34 2015 OPTIONS IMPORT: timers and/or timeouts modified
  282. Mon Sep 28 15:29:34 2015 OPTIONS IMPORT: --ifconfig/up options modified
  283. Mon Sep 28 15:29:34 2015 OPTIONS IMPORT: route options modified
  284. Mon Sep 28 15:29:34 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  285. Mon Sep 28 15:29:34 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  286. Mon Sep 28 15:29:34 2015 MANAGEMENT: >STATE:1443443374,ASSIGN_IP,,10.8.0.22,
  287. Mon Sep 28 15:29:34 2015 open_tun, tt->ipv6=0
  288. Mon Sep 28 15:29:34 2015 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C6984B11-8AA5-4294-BB39-7799069991E6}.tap
  289. Mon Sep 28 15:29:34 2015 TAP-Windows Driver Version 9.21
  290. Mon Sep 28 15:29:34 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {C6984B11-8AA5-4294-BB39-7799069991E6} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
  291. Mon Sep 28 15:29:34 2015 Successful ARP Flush on interface [49] {C6984B11-8AA5-4294-BB39-7799069991E6}
  292. Mon Sep 28 15:29:39 2015 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
  293. Mon Sep 28 15:29:39 2015 C:\WINDOWS\system32\route.exe ADD 78.46.197.102 MASK 255.255.255.255 192.168.1.1
  294. Mon Sep 28 15:29:39 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  295. Mon Sep 28 15:29:39 2015 Route addition via IPAPI succeeded [adaptive]
  296. Mon Sep 28 15:29:39 2015 C:\WINDOWS\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 24
  297. Mon Sep 28 15:29:39 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  298. Mon Sep 28 15:29:39 2015 Route addition via IPAPI succeeded [adaptive]
  299. Mon Sep 28 15:29:39 2015 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.21
  300. Mon Sep 28 15:29:39 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  301. Mon Sep 28 15:29:39 2015 Route addition via IPAPI succeeded [adaptive]
  302. Mon Sep 28 15:29:39 2015 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.21
  303. Mon Sep 28 15:29:39 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  304. Mon Sep 28 15:29:39 2015 Route addition via IPAPI succeeded [adaptive]
  305. Mon Sep 28 15:29:39 2015 MANAGEMENT: >STATE:1443443379,ADD_ROUTES,,,
  306. Mon Sep 28 15:29:39 2015 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  307. Mon Sep 28 15:29:39 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  308. Mon Sep 28 15:29:39 2015 Route addition via IPAPI succeeded [adaptive]
  309. Mon Sep 28 15:29:39 2015 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.21
  310. Mon Sep 28 15:29:39 2015 ROUTE: route addition failed using CreateIpForwardEntry: Ýòîò îáúåêò óæå ñóùåñòâóåò. [status=5010 if_index=49]
  311. Mon Sep 28 15:29:39 2015 Route addition via IPAPI failed [adaptive]
  312. Mon Sep 28 15:29:39 2015 Route addition fallback to route.exe
  313. Mon Sep 28 15:29:39 2015 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  314. Mon Sep 28 15:29:39 2015 Initialization Sequence Completed
  315. Mon Sep 28 15:29:39 2015 MANAGEMENT: >STATE:1443443379,CONNECTED,SUCCESS,10.8.0.22,78.46.197.102
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement