Advertisement
S1AnGeR

test

May 23rd, 2017
604
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 8.89 KB | None | 0 0
  1. Tue May 23 12:29:32 2017 NOTE: --win-sys env is default from OpenVPN v2.3.   This entry will now be ignored.  Please remove this entry from your configuration file.
  2. Tue May 23 12:29:32 2017 us=470800 Current Parameter Settings:
  3. Tue May 23 12:29:32 2017 us=470800   config = 'Russia, Moscow S12.ovpn'
  4. Tue May 23 12:29:32 2017 us=470800   mode = 0
  5. Tue May 23 12:29:32 2017 us=470800   show_ciphers = DISABLED
  6. Tue May 23 12:29:32 2017 us=470800   show_digests = DISABLED
  7. Tue May 23 12:29:32 2017 us=470800   show_engines = DISABLED
  8. Tue May 23 12:29:32 2017 us=470800   genkey = DISABLED
  9. Tue May 23 12:29:32 2017 us=470800   key_pass_file = '[UNDEF]'
  10. Tue May 23 12:29:32 2017 us=470800   show_tls_ciphers = DISABLED
  11. Tue May 23 12:29:32 2017 us=470800   connect_retry_max = 0
  12. Tue May 23 12:29:32 2017 us=470800 Connection profiles [0]:
  13. Tue May 23 12:29:32 2017 us=470800   proto = tcp-client
  14. Tue May 23 12:29:32 2017 us=470800   local = '[UNDEF]'
  15. Tue May 23 12:29:32 2017 us=470800   local_port = '[UNDEF]'
  16. Tue May 23 12:29:32 2017 us=470800   remote = '185.125.216.61'
  17. Tue May 23 12:29:32 2017 us=470800   remote_port = '443'
  18. Tue May 23 12:29:32 2017 us=470800   remote_float = DISABLED
  19. Tue May 23 12:29:32 2017 us=470800   bind_defined = DISABLED
  20. Tue May 23 12:29:32 2017 us=470800   bind_local = DISABLED
  21. Tue May 23 12:29:32 2017 us=470800   bind_ipv6_only = DISABLED
  22. Tue May 23 12:29:32 2017 us=470800 NOTE: --mute triggered...
  23. Tue May 23 12:29:32 2017 us=470800 273 variation(s) on previous 20 message(s) suppressed by --mute
  24. Tue May 23 12:29:32 2017 us=470800 OpenVPN 2.4.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 11 2017
  25. Tue May 23 12:29:32 2017 us=470800 Windows version 6.2 (Windows 8 or greater) 64bit
  26. Tue May 23 12:29:32 2017 us=470800 library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.10
  27. Enter Management Password:
  28. Tue May 23 12:29:32 2017 us=471803 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25347
  29. Tue May 23 12:29:32 2017 us=471803 Need hold release from management interface, waiting...
  30. Tue May 23 12:29:32 2017 us=956846 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25347
  31. Tue May 23 12:29:33 2017 us=58093 MANAGEMENT: CMD 'state on'
  32. Tue May 23 12:29:33 2017 us=58093 MANAGEMENT: CMD 'log all on'
  33. Tue May 23 12:29:33 2017 us=103255 MANAGEMENT: CMD 'echo all on'
  34. Tue May 23 12:29:33 2017 us=104258 MANAGEMENT: CMD 'hold off'
  35. Tue May 23 12:29:33 2017 us=107266 MANAGEMENT: CMD 'hold release'
  36. Tue May 23 12:29:34 2017 us=907242 MANAGEMENT: CMD 'proxy HTTP 10.0.32.227 9090'
  37. Tue May 23 12:29:35 2017 us=907779 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
  38. Tue May 23 12:29:35 2017 us=985513 LZO compression initializing
  39. Tue May 23 12:29:35 2017 us=985513 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  40. Tue May 23 12:29:35 2017 us=985513 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
  41. Tue May 23 12:29:35 2017 us=985513 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  42. Tue May 23 12:29:35 2017 us=985513 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  43. Tue May 23 12:29:35 2017 us=985513 TCP/UDP: Preserving recently used remote address: [AF_INET]10.0.32.227:9090
  44. Tue May 23 12:29:35 2017 us=985513 Socket Buffers: R=[65536->262144] S=[65536->262144]
  45. Tue May 23 12:29:35 2017 us=985513 Attempting to establish TCP connection with [AF_INET]10.0.32.227:9090 [nonblock]
  46. Tue May 23 12:29:35 2017 us=985513 MANAGEMENT: >STATE:1495531775,TCP_CONNECT,,,,,,
  47. Tue May 23 12:29:36 2017 us=986076 TCP connection established with [AF_INET]10.0.32.227:9090
  48. Tue May 23 12:29:36 2017 us=986076 Send to HTTP proxy: 'CONNECT 185.125.216.61:443 HTTP/1.0'
  49. Tue May 23 12:29:36 2017 us=986076 Send to HTTP proxy: 'Host: 185.125.216.61'
  50. Tue May 23 12:29:37 2017 us=15687 HTTP proxy returned: 'HTTP/1.0 200 Connection established'
  51. Tue May 23 12:29:39 2017 us=15778 TCP_CLIENT link local: (not bound)
  52. Tue May 23 12:29:39 2017 us=15778 TCP_CLIENT link remote: [AF_INET]10.0.32.227:9090
  53. Tue May 23 12:29:39 2017 us=15778 MANAGEMENT: >STATE:1495531779,WAIT,,,,,,
  54. Tue May 23 12:29:39 2017 us=46107 MANAGEMENT: >STATE:1495531779,AUTH,,,,,,
  55. Tue May 23 12:29:39 2017 us=46107 TLS: Initial packet from [AF_INET]10.0.32.227:9090, sid=df6eb8de 87f3a676
  56. Tue May 23 12:29:39 2017 us=146201 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  57. Tue May 23 12:29:39 2017 us=146701 VERIFY OK: nsCertType=SERVER
  58. Tue May 23 12:29:39 2017 us=146701 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  59. Tue May 23 12:29:39 2017 us=275255 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
  60. Tue May 23 12:29:39 2017 us=275255 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  61. Tue May 23 12:29:39 2017 us=275255 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  62. Tue May 23 12:29:39 2017 us=275255 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  63. Tue May 23 12:29:39 2017 us=275255 [server] Peer Connection Initiated with [AF_INET]10.0.32.227:9090
  64. Tue May 23 12:29:40 2017 us=513419 MANAGEMENT: >STATE:1495531780,GET_CONFIG,,,,,,
  65. Tue May 23 12:29:40 2017 us=513419 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  66. Tue May 23 12:29:40 2017 us=604249 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.106.128.1,ping 8,ping-restart 30,ifconfig 10.106.161.252 255.224.0.0,peer-id 0,cipher AES-256-GCM'
  67. Tue May 23 12:29:40 2017 us=604249 OPTIONS IMPORT: timers and/or timeouts modified
  68. Tue May 23 12:29:40 2017 us=604249 OPTIONS IMPORT: --ifconfig/up options modified
  69. Tue May 23 12:29:40 2017 us=604249 OPTIONS IMPORT: route-related options modified
  70. Tue May 23 12:29:40 2017 us=604249 OPTIONS IMPORT: peer-id set
  71. Tue May 23 12:29:40 2017 us=604249 OPTIONS IMPORT: adjusting link_mtu to 1659
  72. Tue May 23 12:29:40 2017 us=604249 OPTIONS IMPORT: data channel crypto options modified
  73. Tue May 23 12:29:40 2017 us=604249 Data Channel MTU parms [ L:1587 D:1450 EF:55 EB:412 ET:32 EL:3 ]
  74. Tue May 23 12:29:40 2017 us=604249 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  75. Tue May 23 12:29:40 2017 us=604729 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  76. Tue May 23 12:29:40 2017 us=604729 interactive service msg_channel=0
  77. Tue May 23 12:29:40 2017 us=606740 ROUTE_GATEWAY 10.0.32.1/255.255.224.0 I=5 HWADDR=40:8d:5c:b5:61:24
  78. Tue May 23 12:29:40 2017 us=612774 open_tun
  79. Tue May 23 12:29:40 2017 us=613753 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB}.tap
  80. Tue May 23 12:29:40 2017 us=614254 TAP-Windows Driver Version 9.21
  81. Tue May 23 12:29:40 2017 us=614254 TAP-Windows MTU=1500
  82. Tue May 23 12:29:40 2017 us=614756 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.106.161.252/255.224.0.0 on interface {BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB} [DHCP-serv: 10.96.0.0, lease-time: 31536000]
  83. Tue May 23 12:29:40 2017 us=614756 DHCP option string: 06040808 0808
  84. Tue May 23 12:29:40 2017 us=615257 Successful ARP Flush on interface [16] {BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB}
  85. Tue May 23 12:29:40 2017 us=616259 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  86. Tue May 23 12:29:40 2017 us=616259 MANAGEMENT: >STATE:1495531780,ASSIGN_IP,,10.106.161.252,,,,
  87. Tue May 23 12:29:43 2017 us=63668 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
  88. Tue May 23 12:29:43 2017 us=63668 C:\Windows\system32\route.exe ADD 10.0.32.227 MASK 255.255.255.255 10.0.32.1 IF 5
  89. Tue May 23 12:29:43 2017 us=63668 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  90. Tue May 23 12:29:43 2017 us=91246 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.106.128.1
  91. Tue May 23 12:29:43 2017 us=91246 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  92. Tue May 23 12:29:43 2017 us=133836 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.106.128.1
  93. Tue May 23 12:29:43 2017 us=134337 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  94. Tue May 23 12:29:43 2017 us=167942 Initialization Sequence Completed
  95. Tue May 23 12:29:43 2017 us=168429 MANAGEMENT: >STATE:1495531783,CONNECTED,SUCCESS,10.106.161.252,10.0.32.227,9090,10.0.34.157,11821
  96. Tue May 23 12:29:46 2017 us=129853 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  97. Tue May 23 12:29:52 2017 us=131109 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  98. Tue May 23 12:29:54 2017 us=133542 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  99. Tue May 23 12:29:54 2017 us=133542 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement