Advertisement
Guest User

log file for openVPN

a guest
Jul 24th, 2019
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.30 KB | None | 0 0
  1. Wed Jul 24 14:47:04 2019 NOTE: --user option is not implemented on Windows
  2. Wed Jul 24 14:47:04 2019 NOTE: --group option is not implemented on Windows
  3. Wed Jul 24 14:47:04 2019 OpenVPN 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019
  4. Wed Jul 24 14:47:04 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  5. Wed Jul 24 14:47:04 2019 library versions: OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10
  6. Enter Management Password:
  7. Wed Jul 24 14:47:04 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  8. Wed Jul 24 14:47:04 2019 Need hold release from management interface, waiting...
  9. Wed Jul 24 14:47:04 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  10. Wed Jul 24 14:47:04 2019 MANAGEMENT: CMD 'state on'
  11. Wed Jul 24 14:47:04 2019 MANAGEMENT: CMD 'log all on'
  12. Wed Jul 24 14:47:04 2019 MANAGEMENT: CMD 'echo all on'
  13. Wed Jul 24 14:47:05 2019 MANAGEMENT: CMD 'bytecount 5'
  14. Wed Jul 24 14:47:05 2019 MANAGEMENT: CMD 'hold off'
  15. Wed Jul 24 14:47:05 2019 MANAGEMENT: CMD 'hold release'
  16. Wed Jul 24 14:47:05 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  17. Wed Jul 24 14:47:05 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  18. Wed Jul 24 14:47:05 2019 TCP/UDP: Preserving recently used remote address: [AF_INET](IP Address Withheld):1194
  19. Wed Jul 24 14:47:05 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  20. Wed Jul 24 14:47:05 2019 UDP link local: (not bound)
  21. Wed Jul 24 14:47:05 2019 UDP link remote: [AF_INET](IP Address Withheld):1194
  22. Wed Jul 24 14:47:05 2019 MANAGEMENT: >STATE:1563943625,WAIT,,,,,,
  23. Wed Jul 24 14:47:05 2019 MANAGEMENT: >STATE:1563943625,AUTH,,,,,,
  24. Wed Jul 24 14:47:05 2019 TLS: Initial packet from [AF_INET](IP Address Withheld):1194, sid=f2935b51 7e84a517
  25. Wed Jul 24 14:47:05 2019 VERIFY OK: depth=1, CN=server
  26. Wed Jul 24 14:47:05 2019 VERIFY KU OK
  27. Wed Jul 24 14:47:05 2019 Validating certificate extended key usage
  28. Wed Jul 24 14:47:05 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  29. Wed Jul 24 14:47:05 2019 VERIFY EKU OK
  30. Wed Jul 24 14:47:05 2019 VERIFY OK: depth=0, CN=server
  31. Wed Jul 24 14:47:06 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  32. Wed Jul 24 14:47:06 2019 [server] Peer Connection Initiated with [AF_INET](IP Address Withheld):1194
  33. Wed Jul 24 14:47:07 2019 MANAGEMENT: >STATE:1563943627,GET_CONFIG,,,,,,
  34. Wed Jul 24 14:47:07 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  35. Wed Jul 24 14:47:08 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 208.67.222.222,dhcp-option DNS 208.67.220.220,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5,peer-id 1,cipher AES-256-GCM'
  36. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: timers and/or timeouts modified
  37. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: --ifconfig/up options modified
  38. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: route options modified
  39. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  40. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: peer-id set
  41. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: adjusting link_mtu to 1624
  42. Wed Jul 24 14:47:08 2019 OPTIONS IMPORT: data channel crypto options modified
  43. Wed Jul 24 14:47:08 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  44. Wed Jul 24 14:47:08 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  45. Wed Jul 24 14:47:08 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  46. Wed Jul 24 14:47:08 2019 interactive service msg_channel=620
  47. Wed Jul 24 14:47:08 2019 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=13 HWADDR=9a:cb:2e:3a:4b:a4
  48. Wed Jul 24 14:47:08 2019 open_tun
  49. Wed Jul 24 14:47:08 2019 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{C94BB9A4-7A28-4CC7-A01B-99B70754B338}.tap
  50. Wed Jul 24 14:47:08 2019 TAP-Windows Driver Version 9.23
  51. Wed Jul 24 14:47:08 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {C94BB9A4-7A28-4CC7-A01B-99B70754B338} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
  52. Wed Jul 24 14:47:08 2019 Successful ARP Flush on interface [18] {C94BB9A4-7A28-4CC7-A01B-99B70754B338}
  53. Wed Jul 24 14:47:08 2019 MANAGEMENT: >STATE:1563943628,ASSIGN_IP,,10.8.0.6,,,,
  54. Wed Jul 24 14:47:13 2019 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  55. Wed Jul 24 14:47:13 2019 C:\WINDOWS\system32\route.exe ADD (IP Address Withheld) MASK 255.255.255.255 192.168.42.129
  56. Wed Jul 24 14:47:13 2019 Route addition via service succeeded
  57. Wed Jul 24 14:47:13 2019 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5
  58. Wed Jul 24 14:47:13 2019 Route addition via service succeeded
  59. Wed Jul 24 14:47:13 2019 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5
  60. Wed Jul 24 14:47:13 2019 Route addition via service succeeded
  61. Wed Jul 24 14:47:13 2019 MANAGEMENT: >STATE:1563943633,ADD_ROUTES,,,,,,
  62. Wed Jul 24 14:47:13 2019 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.5
  63. Wed Jul 24 14:47:13 2019 Route addition via service succeeded
  64. Wed Jul 24 14:47:13 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  65. Wed Jul 24 14:47:13 2019 Initialization Sequence Completed
  66. Wed Jul 24 14:47:13 2019 MANAGEMENT: >STATE:1563943633,CONNECTED,SUCCESS,10.8.0.6,(IP Address Withheld),1194,,
  67. Wed Jul 24 14:48:20 2019 C:\WINDOWS\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.5
  68. Wed Jul 24 14:48:20 2019 Route deletion via service succeeded
  69. Wed Jul 24 14:48:20 2019 C:\WINDOWS\system32\route.exe DELETE (IP Address Withheld) MASK 255.255.255.255 192.168.42.129
  70. Wed Jul 24 14:48:20 2019 Route deletion via service succeeded
  71. Wed Jul 24 14:48:20 2019 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.5
  72. Wed Jul 24 14:48:20 2019 Route deletion via service succeeded
  73. Wed Jul 24 14:48:20 2019 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.5
  74. Wed Jul 24 14:48:20 2019 Route deletion via service succeeded
  75. Wed Jul 24 14:48:20 2019 Closing TUN/TAP interface
  76. Wed Jul 24 14:48:20 2019 TAP: DHCP address released
  77. Wed Jul 24 14:48:20 2019 SIGTERM[hard,] received, process exiting
  78. Wed Jul 24 14:48:20 2019 MANAGEMENT: >STATE:1563943700,EXITING,SIGTERM,,,,,
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement