Advertisement
Guest User

Untitled

a guest
Nov 13th, 2019
135
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.60 KB | None | 0 0
  1. Wed Nov 13 18:14:42 2019 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
  2. Wed Nov 13 18:14:42 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  3. Wed Nov 13 18:14:42 2019 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10
  4. Wed Nov 13 18:14:42 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  5. Wed Nov 13 18:14:42 2019 Need hold release from management interface, waiting...
  6. Wed Nov 13 18:14:42 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  7. Wed Nov 13 18:14:42 2019 MANAGEMENT: CMD 'state on'
  8. Wed Nov 13 18:14:42 2019 MANAGEMENT: CMD 'log all on'
  9. Wed Nov 13 18:14:42 2019 MANAGEMENT: CMD 'echo all on'
  10. Wed Nov 13 18:14:42 2019 MANAGEMENT: CMD 'bytecount 5'
  11. Wed Nov 13 18:14:42 2019 MANAGEMENT: CMD 'hold off'
  12. Wed Nov 13 18:14:42 2019 MANAGEMENT: CMD 'hold release'
  13. Wed Nov 13 18:14:53 2019 MANAGEMENT: CMD 'username "Auth" "upxax"'
  14. Wed Nov 13 18:14:53 2019 MANAGEMENT: CMD 'password [...]'
  15. Wed Nov 13 18:14:53 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]141.52.8.20:1194
  16. Wed Nov 13 18:14:53 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  17. Wed Nov 13 18:14:53 2019 UDP link local: (not bound)
  18. Wed Nov 13 18:14:53 2019 UDP link remote: [AF_INET]141.52.8.20:1194
  19. Wed Nov 13 18:14:53 2019 MANAGEMENT: >STATE:1573665293,WAIT,,,,,,
  20. Wed Nov 13 18:14:53 2019 MANAGEMENT: >STATE:1573665293,AUTH,,,,,,
  21. Wed Nov 13 18:14:53 2019 TLS: Initial packet from [AF_INET]141.52.8.20:1194, sid=82e68797 d76d0250
  22. Wed Nov 13 18:14:53 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  23. Wed Nov 13 18:14:53 2019 VERIFY OK: depth=3, C=DE, O=T-Systems Enterprise Services GmbH, OU=T-Systems Trust Center, CN=T-TeleSec GlobalRoot Class 2
  24. Wed Nov 13 18:14:53 2019 VERIFY OK: depth=2, C=DE, O=Verein zur Foerderung eines Deutschen Forschungsnetzes e. V., OU=DFN-PKI, CN=DFN-Verein Certification Authority 2
  25. Wed Nov 13 18:14:53 2019 VERIFY OK: depth=1, C=DE, ST=Baden-Wuerttemberg, L=Karlsruhe, O=Karlsruhe Institute of Technology, CN=KIT-CA
  26. Wed Nov 13 18:14:53 2019 VERIFY X509NAME OK: C=DE, ST=Baden-Wuerttemberg, L=Karlsruhe, O=Karlsruhe Institute of Technology, OU=Steinbuch Centre for Computing, CN=ovpn.scc.kit.edu
  27. Wed Nov 13 18:14:53 2019 VERIFY OK: depth=0, C=DE, ST=Baden-Wuerttemberg, L=Karlsruhe, O=Karlsruhe Institute of Technology, OU=Steinbuch Centre for Computing, CN=ovpn.scc.kit.edu
  28. Wed Nov 13 18:14:53 2019 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
  29. Wed Nov 13 18:14:53 2019 [ovpn.scc.kit.edu] Peer Connection Initiated with [AF_INET]141.52.8.20:1194
  30. Wed Nov 13 18:14:54 2019 MANAGEMENT: >STATE:1573665294,GET_CONFIG,,,,,,
  31. Wed Nov 13 18:14:54 2019 SENT CONTROL [ovpn.scc.kit.edu]: 'PUSH_REQUEST' (status=1)
  32. Wed Nov 13 18:14:54 2019 PUSH: Received control message: 'PUSH_REPLY,topology subnet,redirect-gateway def1,route-ipv6 2000::/3,dhcp-option DNS 141.3.175.71,dhcp-option DNS 141.3.175.72,dhcp-option DOMAIN kit.edu,tun-ipv6,route-gateway 141.52.104.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 2a00:1398:300:201::1016/64 2a00:1398:300:201::1,ifconfig 141.52.104.24 255.255.255.0,peer-id 77,cipher AES-256-GCM'
  33. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: timers and/or timeouts modified
  34. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: --ifconfig/up options modified
  35. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: route options modified
  36. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: route-related options modified
  37. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  38. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: peer-id set
  39. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
  40. Wed Nov 13 18:14:54 2019 OPTIONS IMPORT: data channel crypto options modified
  41. Wed Nov 13 18:14:54 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  42. Wed Nov 13 18:14:54 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  43. Wed Nov 13 18:14:54 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  44. Wed Nov 13 18:14:54 2019 interactive service msg_channel=0
  45. Wed Nov 13 18:14:54 2019 ROUTE_GATEWAY 192.168.178.1/255.255.255.0 I=13 HWADDR=c4:9d:ed:12:f8:52
  46. Wed Nov 13 18:14:54 2019 GDG6: remote_host_ipv6=n/a
  47. Wed Nov 13 18:14:54 2019 NOTE: GetBestInterfaceEx returned error: Element nicht gefunden. (code=1168)
  48. Wed Nov 13 18:14:54 2019 ROUTE6: default_gateway=UNDEF
  49. Wed Nov 13 18:14:54 2019 open_tun
  50. Wed Nov 13 18:14:54 2019 CreateFile failed on TAP device: \\.\Global\{2FDDDCF7-CD9B-4C78-840E-28B067849770}.tap
  51. Wed Nov 13 18:14:54 2019 All TAP-Windows adapters on this system are currently in use.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement