Guest User

Untitled

a guest
Jun 25th, 2018
138
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.15 KB | None | 0 0
  1. root@bt:~/openvpn# openvpn password.ovpn
  2. Sun Feb 19 20:12:20 2012 us=29909 Current Parameter Settings:
  3. Sun Feb 19 20:12:20 2012 us=30231 config = 'password.ovpn'
  4. Sun Feb 19 20:12:20 2012 us=30326 mode = 0
  5. Sun Feb 19 20:12:20 2012 us=30407 persist_config = DISABLED
  6. Sun Feb 19 20:12:20 2012 us=30490 persist_mode = 1
  7. Sun Feb 19 20:12:20 2012 us=30571 show_ciphers = DISABLED
  8. Sun Feb 19 20:12:20 2012 us=30655 show_digests = DISABLED
  9. Sun Feb 19 20:12:20 2012 us=30744 show_engines = DISABLED
  10. Sun Feb 19 20:12:20 2012 us=30827 genkey = DISABLED
  11. Sun Feb 19 20:12:20 2012 us=30906 key_pass_file = '[UNDEF]'
  12. Sun Feb 19 20:12:20 2012 us=30990 show_tls_ciphers = DISABLED
  13. Sun Feb 19 20:12:20 2012 us=31068 Connection profiles [default]:
  14. Sun Feb 19 20:12:20 2012 us=31154 proto = tcp-client
  15. Sun Feb 19 20:12:20 2012 us=31241 local = '[UNDEF]'
  16. Sun Feb 19 20:12:20 2012 us=31324 local_port = 0
  17. Sun Feb 19 20:12:20 2012 us=31411 remote = '212.254.246.102'
  18. Sun Feb 19 20:12:20 2012 us=31496 remote_port = 443
  19. Sun Feb 19 20:12:20 2012 us=31573 remote_float = DISABLED
  20. Sun Feb 19 20:12:20 2012 us=31656 bind_defined = DISABLED
  21. Sun Feb 19 20:12:20 2012 us=31736 bind_local = DISABLED
  22. Sun Feb 19 20:12:20 2012 us=31815 connect_retry_seconds = 5
  23. Sun Feb 19 20:12:20 2012 us=31896 connect_timeout = 10
  24. Sun Feb 19 20:12:20 2012 us=31978 connect_retry_max = 0
  25. Sun Feb 19 20:12:20 2012 us=32059 socks_proxy_server = '[UNDEF]'
  26. Sun Feb 19 20:12:20 2012 us=32144 socks_proxy_port = 0
  27. Sun Feb 19 20:12:20 2012 us=32232 socks_proxy_retry = DISABLED
  28. Sun Feb 19 20:12:20 2012 us=32322 Connection profiles END
  29. Sun Feb 19 20:12:20 2012 us=32405 remote_random = DISABLED
  30. Sun Feb 19 20:12:20 2012 us=32486 ipchange = '[UNDEF]'
  31. Sun Feb 19 20:12:20 2012 us=32566 dev = 'tun'
  32. Sun Feb 19 20:12:20 2012 us=32643 dev_type = '[UNDEF]'
  33. Sun Feb 19 20:12:20 2012 us=32724 dev_node = '[UNDEF]'
  34. Sun Feb 19 20:12:20 2012 us=32812 lladdr = '[UNDEF]'
  35. Sun Feb 19 20:12:20 2012 us=36155 topology = 1
  36. Sun Feb 19 20:12:20 2012 us=36228 tun_ipv6 = DISABLED
  37. Sun Feb 19 20:12:20 2012 us=36271 ifconfig_local = '[UNDEF]'
  38. Sun Feb 19 20:12:20 2012 us=36314 ifconfig_remote_netmask = '[UNDEF]'
  39. Sun Feb 19 20:12:20 2012 us=36355 ifconfig_noexec = DISABLED
  40. Sun Feb 19 20:12:20 2012 us=36398 ifconfig_nowarn = DISABLED
  41. Sun Feb 19 20:12:20 2012 us=36440 shaper = 0
  42. Sun Feb 19 20:12:20 2012 us=36480 tun_mtu = 1500
  43. Sun Feb 19 20:12:20 2012 us=36520 tun_mtu_defined = ENABLED
  44. Sun Feb 19 20:12:20 2012 us=36561 link_mtu = 1500
  45. Sun Feb 19 20:12:20 2012 us=36601 link_mtu_defined = DISABLED
  46. Sun Feb 19 20:12:20 2012 us=36642 tun_mtu_extra = 0
  47. Sun Feb 19 20:12:20 2012 us=36682 tun_mtu_extra_defined = DISABLED
  48. Sun Feb 19 20:12:20 2012 us=36722 fragment = 0
  49. Sun Feb 19 20:12:20 2012 us=36762 mtu_discover_type = -1
  50. Sun Feb 19 20:12:20 2012 us=36802 mtu_test = 0
  51. Sun Feb 19 20:12:20 2012 us=36841 mlock = DISABLED
  52. Sun Feb 19 20:12:20 2012 us=36881 keepalive_ping = 0
  53. Sun Feb 19 20:12:20 2012 us=36922 keepalive_timeout = 0
  54. Sun Feb 19 20:12:20 2012 us=36962 inactivity_timeout = 0
  55. Sun Feb 19 20:12:20 2012 us=37002 ping_send_timeout = 0
  56. Sun Feb 19 20:12:20 2012 us=37044 ping_rec_timeout = 0
  57. Sun Feb 19 20:12:20 2012 us=37086 ping_rec_timeout_action = 0
  58. Sun Feb 19 20:12:20 2012 us=37132 ping_timer_remote = DISABLED
  59. Sun Feb 19 20:12:20 2012 us=37230 remap_sigusr1 = 0
  60. Sun Feb 19 20:12:20 2012 us=37272 explicit_exit_notification = 0
  61. Sun Feb 19 20:12:20 2012 us=37316 persist_tun = ENABLED
  62. Sun Feb 19 20:12:20 2012 us=37390 persist_local_ip = DISABLED
  63. Sun Feb 19 20:12:20 2012 us=37452 persist_remote_ip = DISABLED
  64. Sun Feb 19 20:12:20 2012 us=37500 persist_key = ENABLED
  65. Sun Feb 19 20:12:20 2012 us=37548 mssfix = 1450
  66. Sun Feb 19 20:12:20 2012 us=37595 passtos = DISABLED
  67. Sun Feb 19 20:12:20 2012 us=37641 resolve_retry_seconds = 1000000000
  68. Sun Feb 19 20:12:20 2012 us=37685 username = '[UNDEF]'
  69. Sun Feb 19 20:12:20 2012 us=37729 groupname = '[UNDEF]'
  70. Sun Feb 19 20:12:20 2012 us=37776 chroot_dir = '[UNDEF]'
  71. Sun Feb 19 20:12:20 2012 us=37822 cd_dir = '[UNDEF]'
  72. Sun Feb 19 20:12:20 2012 us=37870 writepid = '[UNDEF]'
  73. Sun Feb 19 20:12:20 2012 us=37916 up_script = '[UNDEF]'
  74. Sun Feb 19 20:12:20 2012 us=37961 down_script = '[UNDEF]'
  75. Sun Feb 19 20:12:20 2012 us=38011 down_pre = DISABLED
  76. Sun Feb 19 20:12:20 2012 us=38058 up_restart = DISABLED
  77. Sun Feb 19 20:12:20 2012 us=38105 up_delay = DISABLED
  78. Sun Feb 19 20:12:20 2012 us=38150 daemon = DISABLED
  79. Sun Feb 19 20:12:20 2012 us=38192 inetd = 0
  80. Sun Feb 19 20:12:20 2012 us=38238 log = DISABLED
  81. Sun Feb 19 20:12:20 2012 us=38286 suppress_timestamps = DISABLED
  82. Sun Feb 19 20:12:20 2012 us=38335 nice = 0
  83. Sun Feb 19 20:12:20 2012 us=38378 verbosity = 5
  84. Sun Feb 19 20:12:20 2012 us=38424 mute = 0
  85. Sun Feb 19 20:12:20 2012 us=38473 gremlin = 0
  86. Sun Feb 19 20:12:20 2012 us=38521 status_file = '[UNDEF]'
  87. Sun Feb 19 20:12:20 2012 us=38571 status_file_version = 1
  88. Sun Feb 19 20:12:20 2012 us=38620 status_file_update_freq = 60
  89. Sun Feb 19 20:12:20 2012 us=38669 occ = ENABLED
  90. Sun Feb 19 20:12:20 2012 us=38717 rcvbuf = 65536
  91. Sun Feb 19 20:12:20 2012 us=38765 sndbuf = 65536
  92. Sun Feb 19 20:12:20 2012 us=38811 sockflags = 0
  93. Sun Feb 19 20:12:20 2012 us=38853 fast_io = DISABLED
  94. Sun Feb 19 20:12:20 2012 us=38897 lzo = 0
  95. Sun Feb 19 20:12:20 2012 us=38945 route_script = '[UNDEF]'
  96. Sun Feb 19 20:12:20 2012 us=39020 route_default_gateway = '[UNDEF]'
  97. Sun Feb 19 20:12:20 2012 us=39066 route_default_metric = 0
  98. Sun Feb 19 20:12:20 2012 us=39109 route_noexec = DISABLED
  99. Sun Feb 19 20:12:20 2012 us=39160 route_delay = 0
  100. Sun Feb 19 20:12:20 2012 us=39208 route_delay_window = 30
  101. Sun Feb 19 20:12:20 2012 us=39257 route_delay_defined = DISABLED
  102. Sun Feb 19 20:12:20 2012 us=39306 route_nopull = DISABLED
  103. Sun Feb 19 20:12:20 2012 us=39355 route_gateway_via_dhcp = DISABLED
  104. Sun Feb 19 20:12:20 2012 us=39404 max_routes = 100
  105. Sun Feb 19 20:12:20 2012 us=39453 allow_pull_fqdn = DISABLED
  106. Sun Feb 19 20:12:20 2012 us=39503 management_addr = '[UNDEF]'
  107. Sun Feb 19 20:12:20 2012 us=39556 management_port = 0
  108. Sun Feb 19 20:12:20 2012 us=39605 management_user_pass = '[UNDEF]'
  109. Sun Feb 19 20:12:20 2012 us=39655 management_log_history_cache = 250
  110. Sun Feb 19 20:12:20 2012 us=39702 management_echo_buffer_size = 100
  111. Sun Feb 19 20:12:20 2012 us=39746 management_write_peer_info_file = '[UNDEF]'
  112. Sun Feb 19 20:12:20 2012 us=39790 management_client_user = '[UNDEF]'
  113. Sun Feb 19 20:12:20 2012 us=39832 management_client_group = '[UNDEF]'
  114. Sun Feb 19 20:12:20 2012 us=39875 management_flags = 0
  115. Sun Feb 19 20:12:20 2012 us=39918 shared_secret_file = '[UNDEF]'
  116. Sun Feb 19 20:12:20 2012 us=39960 key_direction = 0
  117. Sun Feb 19 20:12:20 2012 us=40001 ciphername_defined = ENABLED
  118. Sun Feb 19 20:12:20 2012 us=40048 ciphername = 'BF-CBC'
  119. Sun Feb 19 20:12:20 2012 us=40097 authname_defined = ENABLED
  120. Sun Feb 19 20:12:20 2012 us=40147 authname = 'SHA1'
  121. Sun Feb 19 20:12:20 2012 us=40195 prng_hash = 'SHA1'
  122. Sun Feb 19 20:12:20 2012 us=40246 prng_nonce_secret_len = 16
  123. Sun Feb 19 20:12:20 2012 us=40295 keysize = 0
  124. Sun Feb 19 20:12:20 2012 us=40343 engine = DISABLED
  125. Sun Feb 19 20:12:20 2012 us=40392 replay = ENABLED
  126. Sun Feb 19 20:12:20 2012 us=40441 mute_replay_warnings = DISABLED
  127. Sun Feb 19 20:12:20 2012 us=40490 replay_window = 64
  128. Sun Feb 19 20:12:20 2012 us=40539 replay_time = 15
  129. Sun Feb 19 20:12:20 2012 us=40587 packet_id_file = '[UNDEF]'
  130. Sun Feb 19 20:12:20 2012 us=40630 use_iv = ENABLED
  131. Sun Feb 19 20:12:20 2012 us=40674 test_crypto = DISABLED
  132. Sun Feb 19 20:12:20 2012 us=40716 tls_server = DISABLED
  133. Sun Feb 19 20:12:20 2012 us=40757 tls_client = ENABLED
  134. Sun Feb 19 20:12:20 2012 us=40799 key_method = 2
  135. Sun Feb 19 20:12:20 2012 us=40840 ca_file = 'ca.crt'
  136. Sun Feb 19 20:12:20 2012 us=40881 ca_path = '[UNDEF]'
  137. Sun Feb 19 20:12:20 2012 us=40923 dh_file = '[UNDEF]'
  138. Sun Feb 19 20:12:20 2012 us=40967 cert_file = '[UNDEF]'
  139. Sun Feb 19 20:12:20 2012 us=41018 priv_key_file = '[UNDEF]'
  140. Sun Feb 19 20:12:20 2012 us=41067 pkcs12_file = '[UNDEF]'
  141. Sun Feb 19 20:12:20 2012 us=41118 cipher_list = '[UNDEF]'
  142. Sun Feb 19 20:12:20 2012 us=41486 tls_verify = '[UNDEF]'
  143. Sun Feb 19 20:12:20 2012 us=41609 tls_remote = '[UNDEF]'
  144. Sun Feb 19 20:12:20 2012 us=41693 crl_file = '[UNDEF]'
  145. Sun Feb 19 20:12:20 2012 us=41779 ns_cert_type = 64
  146. Sun Feb 19 20:12:20 2012 us=41867 remote_cert_ku[i] = 0
  147. Sun Feb 19 20:12:20 2012 us=41957 remote_cert_ku[i] = 0
  148. Sun Feb 19 20:12:20 2012 us=42045 remote_cert_ku[i] = 0
  149. Sun Feb 19 20:12:20 2012 us=42147 remote_cert_ku[i] = 0
  150. Sun Feb 19 20:12:20 2012 us=42232 remote_cert_ku[i] = 0
  151. Sun Feb 19 20:12:20 2012 us=42319 remote_cert_ku[i] = 0
  152. Sun Feb 19 20:12:20 2012 us=42409 remote_cert_ku[i] = 0
  153. Sun Feb 19 20:12:20 2012 us=43927 remote_cert_ku[i] = 0
  154. Sun Feb 19 20:12:20 2012 us=44021 remote_cert_ku[i] = 0
  155. Sun Feb 19 20:12:20 2012 us=44072 remote_cert_ku[i] = 0
  156. Sun Feb 19 20:12:20 2012 us=44121 remote_cert_ku[i] = 0
  157. Sun Feb 19 20:12:20 2012 us=44169 remote_cert_ku[i] = 0
  158. Sun Feb 19 20:12:20 2012 us=44219 remote_cert_ku[i] = 0
  159. Sun Feb 19 20:12:20 2012 us=44266 remote_cert_ku[i] = 0
  160. Sun Feb 19 20:12:20 2012 us=44314 remote_cert_ku[i] = 0
  161. Sun Feb 19 20:12:20 2012 us=44361 remote_cert_ku[i] = 0
  162. Sun Feb 19 20:12:20 2012 us=44409 remote_cert_eku = '[UNDEF]'
  163. Sun Feb 19 20:12:20 2012 us=44739 tls_timeout = 2
  164. Sun Feb 19 20:12:20 2012 us=44809 renegotiate_bytes = 0
  165. Sun Feb 19 20:12:20 2012 us=44858 renegotiate_packets = 0
  166. Sun Feb 19 20:12:20 2012 us=44910 renegotiate_seconds = 3600
  167. Sun Feb 19 20:12:20 2012 us=44952 handshake_window = 60
  168. Sun Feb 19 20:12:20 2012 us=44999 transition_window = 3600
  169. Sun Feb 19 20:12:20 2012 us=45048 single_session = DISABLED
  170. Sun Feb 19 20:12:20 2012 us=45091 tls_exit = DISABLED
  171. Sun Feb 19 20:12:20 2012 us=45136 tls_auth_file = '[UNDEF]'
  172. Sun Feb 19 20:12:20 2012 us=45225 pkcs11_protected_authentication = DISABLED
  173. Sun Feb 19 20:12:20 2012 us=45277 pkcs11_protected_authentication = DISABLED
  174. Sun Feb 19 20:12:20 2012 us=45324 pkcs11_protected_authentication = DISABLED
  175. Sun Feb 19 20:12:20 2012 us=45376 pkcs11_protected_authentication = DISABLED
  176. Sun Feb 19 20:12:20 2012 us=45425 pkcs11_protected_authentication = DISABLED
  177. Sun Feb 19 20:12:20 2012 us=45474 pkcs11_protected_authentication = DISABLED
  178. Sun Feb 19 20:12:20 2012 us=45524 pkcs11_protected_authentication = DISABLED
  179. Sun Feb 19 20:12:20 2012 us=45573 pkcs11_protected_authentication = DISABLED
  180. Sun Feb 19 20:12:20 2012 us=45622 pkcs11_protected_authentication = DISABLED
  181. Sun Feb 19 20:12:20 2012 us=45675 pkcs11_protected_authentication = DISABLED
  182. Sun Feb 19 20:12:20 2012 us=45738 pkcs11_protected_authentication = DISABLED
  183. Sun Feb 19 20:12:20 2012 us=45790 pkcs11_protected_authentication = DISABLED
  184. Sun Feb 19 20:12:20 2012 us=45843 pkcs11_protected_authentication = DISABLED
  185. Sun Feb 19 20:12:20 2012 us=45893 pkcs11_protected_authentication = DISABLED
  186. Sun Feb 19 20:12:20 2012 us=45943 pkcs11_protected_authentication = DISABLED
  187. Sun Feb 19 20:12:20 2012 us=45993 pkcs11_protected_authentication = DISABLED
  188. Sun Feb 19 20:12:20 2012 us=46045 pkcs11_private_mode = 00000000
  189. Sun Feb 19 20:12:20 2012 us=46096 pkcs11_private_mode = 00000000
  190. Sun Feb 19 20:12:20 2012 us=46147 pkcs11_private_mode = 00000000
  191. Sun Feb 19 20:12:20 2012 us=46197 pkcs11_private_mode = 00000000
  192. Sun Feb 19 20:12:20 2012 us=46248 pkcs11_private_mode = 00000000
  193. Sun Feb 19 20:12:20 2012 us=46297 pkcs11_private_mode = 00000000
  194. Sun Feb 19 20:12:20 2012 us=46349 pkcs11_private_mode = 00000000
  195. Sun Feb 19 20:12:20 2012 us=46401 pkcs11_private_mode = 00000000
  196. Sun Feb 19 20:12:20 2012 us=46452 pkcs11_private_mode = 00000000
  197. Sun Feb 19 20:12:20 2012 us=46503 pkcs11_private_mode = 00000000
  198. Sun Feb 19 20:12:20 2012 us=46553 pkcs11_private_mode = 00000000
  199. Sun Feb 19 20:12:20 2012 us=46604 pkcs11_private_mode = 00000000
  200. Sun Feb 19 20:12:20 2012 us=46659 pkcs11_private_mode = 00000000
  201. Sun Feb 19 20:12:20 2012 us=46708 pkcs11_private_mode = 00000000
  202. Sun Feb 19 20:12:20 2012 us=46757 pkcs11_private_mode = 00000000
  203. Sun Feb 19 20:12:20 2012 us=46807 pkcs11_private_mode = 00000000
  204. Sun Feb 19 20:12:20 2012 us=47084 pkcs11_cert_private = DISABLED
  205. Sun Feb 19 20:12:20 2012 us=47298 pkcs11_cert_private = DISABLED
  206. Sun Feb 19 20:12:20 2012 us=47395 pkcs11_cert_private = DISABLED
  207. Sun Feb 19 20:12:20 2012 us=47477 pkcs11_cert_private = DISABLED
  208. Sun Feb 19 20:12:20 2012 us=47559 pkcs11_cert_private = DISABLED
  209. Sun Feb 19 20:12:20 2012 us=47643 pkcs11_cert_private = DISABLED
  210. Sun Feb 19 20:12:20 2012 us=47727 pkcs11_cert_private = DISABLED
  211. Sun Feb 19 20:12:20 2012 us=47811 pkcs11_cert_private = DISABLED
  212. Sun Feb 19 20:12:20 2012 us=47896 pkcs11_cert_private = DISABLED
  213. Sun Feb 19 20:12:20 2012 us=47977 pkcs11_cert_private = DISABLED
  214. Sun Feb 19 20:12:20 2012 us=48056 pkcs11_cert_private = DISABLED
  215. Sun Feb 19 20:12:20 2012 us=48133 pkcs11_cert_private = DISABLED
  216. Sun Feb 19 20:12:20 2012 us=48213 pkcs11_cert_private = DISABLED
  217. Sun Feb 19 20:12:20 2012 us=48293 pkcs11_cert_private = DISABLED
  218. Sun Feb 19 20:12:20 2012 us=48371 pkcs11_cert_private = DISABLED
  219. Sun Feb 19 20:12:20 2012 us=48450 pkcs11_cert_private = DISABLED
  220. Sun Feb 19 20:12:20 2012 us=48530 pkcs11_pin_cache_period = -1
  221. Sun Feb 19 20:12:20 2012 us=48609 pkcs11_id = '[UNDEF]'
  222. Sun Feb 19 20:12:20 2012 us=48690 pkcs11_id_management = DISABLED
  223. Sun Feb 19 20:12:20 2012 us=48816 server_network = 0.0.0.0
  224. Sun Feb 19 20:12:20 2012 us=48904 server_netmask = 0.0.0.0
  225. Sun Feb 19 20:12:20 2012 us=48990 server_bridge_ip = 0.0.0.0
  226. Sun Feb 19 20:12:20 2012 us=49075 server_bridge_netmask = 0.0.0.0
  227. Sun Feb 19 20:12:20 2012 us=49195 server_bridge_pool_start = 0.0.0.0
  228. Sun Feb 19 20:12:20 2012 us=49284 server_bridge_pool_end = 0.0.0.0
  229. Sun Feb 19 20:12:20 2012 us=49368 ifconfig_pool_defined = DISABLED
  230. Sun Feb 19 20:12:20 2012 us=49453 ifconfig_pool_start = 0.0.0.0
  231. Sun Feb 19 20:12:20 2012 us=49538 ifconfig_pool_end = 0.0.0.0
  232. Sun Feb 19 20:12:20 2012 us=49623 ifconfig_pool_netmask = 0.0.0.0
  233. Sun Feb 19 20:12:20 2012 us=49702 ifconfig_pool_persist_filename = '[UNDEF]'
  234. Sun Feb 19 20:12:20 2012 us=49784 ifconfig_pool_persist_refresh_freq = 600
  235. Sun Feb 19 20:12:20 2012 us=49866 n_bcast_buf = 256
  236. Sun Feb 19 20:12:20 2012 us=49948 tcp_queue_limit = 64
  237. Sun Feb 19 20:12:20 2012 us=50028 real_hash_size = 256
  238. Sun Feb 19 20:12:20 2012 us=50106 virtual_hash_size = 256
  239. Sun Feb 19 20:12:20 2012 us=50183 client_connect_script = '[UNDEF]'
  240. Sun Feb 19 20:12:20 2012 us=50264 learn_address_script = '[UNDEF]'
  241. Sun Feb 19 20:12:20 2012 us=50346 client_disconnect_script = '[UNDEF]'
  242. Sun Feb 19 20:12:20 2012 us=50426 client_config_dir = '[UNDEF]'
  243. Sun Feb 19 20:12:20 2012 us=50505 ccd_exclusive = DISABLED
  244. Sun Feb 19 20:12:20 2012 us=50584 tmp_dir = '[UNDEF]'
  245. Sun Feb 19 20:12:20 2012 us=50662 push_ifconfig_defined = DISABLED
  246. Sun Feb 19 20:12:20 2012 us=50749 push_ifconfig_local = 0.0.0.0
  247. Sun Feb 19 20:12:20 2012 us=50835 push_ifconfig_remote_netmask = 0.0.0.0
  248. Sun Feb 19 20:12:20 2012 us=50916 enable_c2c = DISABLED
  249. Sun Feb 19 20:12:20 2012 us=50993 duplicate_cn = DISABLED
  250. Sun Feb 19 20:12:20 2012 us=51072 cf_max = 0
  251. Sun Feb 19 20:12:20 2012 us=51150 cf_per = 0
  252. Sun Feb 19 20:12:20 2012 us=51230 max_clients = 1024
  253. Sun Feb 19 20:12:20 2012 us=51311 max_routes_per_client = 256
  254. Sun Feb 19 20:12:20 2012 us=51393 auth_user_pass_verify_script = '[UNDEF]'
  255. Sun Feb 19 20:12:20 2012 us=51473 auth_user_pass_verify_script_via_file = DISABLED
  256. Sun Feb 19 20:12:20 2012 us=51554 ssl_flags = 0
  257. Sun Feb 19 20:12:20 2012 us=51633 port_share_host = '[UNDEF]'
  258. Sun Feb 19 20:12:20 2012 us=51713 port_share_port = 0
  259. Sun Feb 19 20:12:20 2012 us=51791 client = ENABLED
  260. Sun Feb 19 20:12:20 2012 us=51868 pull = ENABLED
  261. Sun Feb 19 20:12:20 2012 us=51945 auth_user_pass_file = 'password.txt'
  262. Sun Feb 19 20:12:20 2012 us=52040 OpenVPN 2.1.0 i486-pc-linux-gnu [SSL] [LZO2] [EPOLL] [PKCS11] [MH] [PF_INET6] [eurephia] built on Jul 20 2010
  263. Sun Feb 19 20:12:20 2012 us=52340 WARNING: file 'password.txt' is group or others accessible
  264. Sun Feb 19 20:12:20 2012 us=52731 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  265. Sun Feb 19 20:12:20 2012 us=56716 Control Channel MTU parms [ L:1543 D:140 EF:40 EB:0 ET:0 EL:0 ]
  266. Sun Feb 19 20:12:20 2012 us=57047 Data Channel MTU parms [ L:1543 D:1450 EF:43 EB:4 ET:0 EL:0 ]
  267. Sun Feb 19 20:12:20 2012 us=57266 Local Options String: 'V4,dev-type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_CLIENT,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-client'
  268. Sun Feb 19 20:12:20 2012 us=57361 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1543,tun-mtu 1500,proto TCPv4_SERVER,cipher BF-CBC,auth SHA1,keysize 128,key-method 2,tls-server'
  269. Sun Feb 19 20:12:20 2012 us=57513 Local Options hash (VER=V4): 'db02a8f8'
  270. Sun Feb 19 20:12:20 2012 us=57625 Expected Remote Options hash (VER=V4): '7e068940'
  271. Sun Feb 19 20:12:20 2012 us=57752 Attempting to establish TCP connection with [AF_INET]212.254.246.102:443 [nonblock]
  272. Sun Feb 19 20:12:21 2012 us=58127 TCP connection established with [AF_INET]212.254.246.102:443
  273. Sun Feb 19 20:12:21 2012 us=58279 Socket Buffers: R=[87380->131072] S=[16384->131072]
  274. Sun Feb 19 20:12:21 2012 us=58366 TCPv4_CLIENT link local: [undef]
  275. Sun Feb 19 20:12:21 2012 us=58977 TCPv4_CLIENT link remote: [AF_INET]212.254.246.102:443
  276. WRSun Feb 19 20:12:21 2012 us=115155 TLS: Initial packet from [AF_INET]212.254.246.102:443, sid=af9f1a00 6966424f
  277. WSun Feb 19 20:12:21 2012 us=115550 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  278. WRWRRRWWRWRWRRWWRWRWRRWWRWRWRRWWRWRWRRWWRWRWRRWWRWRWRRWWRWRWRRWWRWRWRSun Feb 19 20:12:22 2012 us=661665 VERIFY OK: depth=1, /C=CH/ST=SG/L=Rapperswil/O=Compass_Security_AG/OU=Test_Certification_Authority_V4.0/CN=testca4.csnc.ch/emailAddress=ivan.buetler@csnc.ch
  279. Sun Feb 19 20:12:22 2012 us=672251 VERIFY OK: nsCertType=SERVER
  280. Sun Feb 19 20:12:22 2012 us=672382 VERIFY OK: depth=0, /C=CH/ST=SG/O=Compass_Security_AG/OU=ELAB/CN=elab.csnc.ch/emailAddress=elab@csnc.ch
  281. RWWRWRWRRWWRWRWRWWWWRRRRWWWWRRRRWRRSun Feb 19 20:12:24 2012 us=537991 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  282. Sun Feb 19 20:12:24 2012 us=538156 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  283. Sun Feb 19 20:12:24 2012 us=538491 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  284. Sun Feb 19 20:12:24 2012 us=538608 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  285. WWSun Feb 19 20:12:24 2012 us=538926 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  286. Sun Feb 19 20:12:24 2012 us=539108 [elab.csnc.ch] Peer Connection Initiated with [AF_INET]212.254.246.102:443
  287. Sun Feb 19 20:12:26 2012 us=924012 SENT CONTROL [elab.csnc.ch]: 'PUSH_REQUEST' (status=1)
  288. WRRSun Feb 19 20:12:27 2012 us=38614 AUTH: Received AUTH_FAILED control message
  289. Sun Feb 19 20:12:27 2012 us=39385 TCP/UDP: Closing socket
  290. Sun Feb 19 20:12:27 2012 us=39547 SIGTERM[soft,auth-failure] received, process exiting
Add Comment
Please, Sign In to add comment