Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue Jun 29 20:05:20 2010 OpenVPN 2.1_rc22 i686-pc-cygwin [SSL] [LZO2] built on Nov 23 2009
- Tue Jun 29 20:05:30 2010 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
- Tue Jun 29 20:05:30 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Tue Jun 29 20:05:30 2010 LZO compression initialized
- Tue Jun 29 20:05:30 2010 Control Channel MTU parms [ L:1556 D:140 EF:40 EB:0 ET:0 EL:0 ]
- Tue Jun 29 20:05:30 2010 Data Channel MTU parms [ L:1556 D:1450 EF:56 EB:135 ET:0 EL:0 AF:3/1 ]
- Tue Jun 29 20:05:30 2010 Local Options hash (VER=V4): '619088b2'
- Tue Jun 29 20:05:30 2010 Expected Remote Options hash (VER=V4): 'a4f12474'
- Tue Jun 29 20:05:30 2010 Attempting to establish TCP connection with 87.88.75.75:8013
- Tue Jun 29 20:05:30 2010 TCP connection established with 87.88.75.75:8013
- Tue Jun 29 20:05:30 2010 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Tue Jun 29 20:05:30 2010 TCPv4_CLIENT link local: [undef]
- Tue Jun 29 20:05:30 2010 TCPv4_CLIENT link remote: 87.88.75.75:8013
- Tue Jun 29 20:05:30 2010 TLS: Initial packet from 87.88.75.75:8013, sid=890c247a 9617f35d
- Tue Jun 29 20:05:30 2010 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Tue Jun 29 20:05:31 2010 VERIFY OK: depth=1, /C=fr/L=paris/O=Rafaliga/CN=Rafaliga_VPN_CA/emailAddress=p.paruznik@mac.com
- Tue Jun 29 20:05:31 2010 VERIFY X509NAME OK: /C=fr/L=paris/O=Rafaliga/CN=fire-wall.fingerit/emailAddress=p.paruznik@mac.com
- Tue Jun 29 20:05:31 2010 VERIFY OK: depth=0, /C=fr/L=paris/O=Rafaliga/CN=fire-wall.fingerit/emailAddress=p.paruznik@mac.com
- Tue Jun 29 20:05:33 2010 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Tue Jun 29 20:05:33 2010 Data Channel Encrypt: Using 128 bit message hash 'MD5' for HMAC authentication
- Tue Jun 29 20:05:33 2010 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Tue Jun 29 20:05:33 2010 Data Channel Decrypt: Using 128 bit message hash 'MD5' for HMAC authentication
- Tue Jun 29 20:05:33 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Tue Jun 29 20:05:33 2010 [fire-wall.fingerit] Peer Connection Initiated with 87.88.75.75:8013
- Tue Jun 29 20:05:36 2010 SENT CONTROL [fire-wall.fingerit]: 'PUSH_REQUEST' (status=1)
- Tue Jun 29 20:05:36 2010 PUSH: Received control message: 'PUSH_REPLY,ifconfig 10.242.2.10 10.242.2.9,ping-restart 120,ping 10,topology net30,route 10.242.2.1,route 172.50.1.0 255.255.255.0,route 172.50.2.0 255.255.255.0'
- Tue Jun 29 20:05:36 2010 OPTIONS IMPORT: timers and/or timeouts modified
- Tue Jun 29 20:05:36 2010 OPTIONS IMPORT: --ifconfig/up options modified
- Tue Jun 29 20:05:36 2010 OPTIONS IMPORT: route options modified
- Tue Jun 29 20:05:36 2010 ROUTE default_gateway=192.168.0.254
- Tue Jun 29 20:05:36 2010 CreateFile failed on TAP device: \\.\Global\{6274A09C-233D-404C-9837-9F28E1EB8A3A}.tap
- Tue Jun 29 20:05:36 2010 All TAP-Win32 adapters on this system are currently in use.
- Tue Jun 29 20:05:36 2010 Exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement