Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Nov 13 23:09:52 vech ovpn-server[7301]: Local Options hash (VER=V4): '47106f19'
- Nov 13 23:09:52 vech ovpn-server[7301]: Expected Remote Options hash (VER=V4): '8a6c6b5b'
- Nov 13 23:09:52 vech ovpn-server[7301]: TCP connection established with [AF_INET]37.29.41.60:11946
- Nov 13 23:09:52 vech ovpn-server[7301]: TCPv4_SERVER link local: [undef]
- Nov 13 23:09:52 vech ovpn-server[7301]: TCPv4_SERVER link remote: [AF_INET]37.29.41.60:11946
- Nov 13 23:09:53 vech ovpn-server[7301]: 37.29.41.60:11946 TLS: Initial packet from [AF_INET]37.29.41.60:11946, sid=99f62b47 af62008a
- Nov 13 23:10:03 vech ovpn-server[7301]: 37.29.41.60:11946 VERIFY OK: depth=1, C=RU, ST=ABO, L=Mogoitui, O=VecHPro, OU=VecHPro, CN=VecHPro CA, name=EasyRSA, emailAddress=vech2k@gmail.com
- Nov 13 23:10:03 vech ovpn-server[7301]: 37.29.41.60:11946 VERIFY OK: depth=0, C=RU, ST=ABO, L=Mogoitui, O=VecHPro, OU=VecHPro, CN=mpsn80, name=EasyRSA, emailAddress=vech2k@gmail.com
- Nov 13 23:10:07 vech ovpn-server[7301]: 37.29.41.60:11946 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Nov 13 23:10:07 vech ovpn-server[7301]: 37.29.41.60:11946 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 23:10:07 vech ovpn-server[7301]: 37.29.41.60:11946 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Nov 13 23:10:07 vech ovpn-server[7301]: 37.29.41.60:11946 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 13 23:10:07 vech ovpn-server[7301]: 37.29.41.60:11946 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Nov 13 23:10:07 vech ovpn-server[7301]: 37.29.41.60:11946 [mpsn80] Peer Connection Initiated with [AF_INET]37.29.41.60:11946
- Nov 13 23:10:07 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 MULTI_sva: pool returned IPv4=192.168.91.2, IPv6=(Not enabled)
- Nov 13 23:10:09 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 PUSH: Received control message: 'PUSH_REQUEST'
- Nov 13 23:10:09 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 send_push_reply(): safe_cap=940
- Nov 13 23:10:09 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 SENT CONTROL [mpsn80]: 'PUSH_REPLY,ping 20,ping-restart 120,ifconfig 192.168.91.2 255.255.255.0' (status=1)
- Nov 13 23:11:02 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 MULTI: Learn: 9a:6b:11:16:cd:4e -> mpsn80/37.29.41.60:11946
- Nov 14 00:10:19 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 VERIFY OK: depth=1, C=RU, ST=ABO, L=Mogoitui, O=VecHPro, OU=VecHPro, CN=VecHPro CA, name=EasyRSA, emailAddress=vech2k@gmail.com
- Nov 14 00:10:19 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 VERIFY OK: depth=0, C=RU, ST=ABO, L=Mogoitui, O=VecHPro, OU=VecHPro, CN=mpsn80, name=EasyRSA, emailAddress=vech2k@gmail.com
- Nov 14 00:10:23 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Nov 14 00:10:23 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 00:10:23 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Nov 14 00:10:23 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 14 00:10:24 vech ovpn-server[7301]: mpsn80/37.29.41.60:11946 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- на этом умерло, сейчас уже 00:58 и клиент не пытается переподключиться
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement