Guest User

Untitled

a guest
Jun 28th, 2018
90
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.38 KB | None | 0 0
  1. 2012-02-27 03:14:33 *Tunnelblick: OS X 10.7.3; Tunnelblick 3.2.3 (build 2891.2932) Unsigned
  2. 2012-02-27 03:14:33 *Tunnelblick: Attempting connection with Work; Set nameserver = 1; monitoring connection
  3. 2012-02-27 03:14:33 *Tunnelblick: /Applications/Tunnelblick.app/Contents/Resources/openvpnstart start Work.ovpn 1337 1 0 0 0 49 -atDASNGWrdasngw
  4. 2012-02-27 03:14:33 *Tunnelblick: openvpnstart message: Loading tun.kext
  5. 2012-02-27 03:14:33 *Tunnelblick: Established communication with OpenVPN
  6. 2012-02-27 03:14:33 *Tunnelblick: Obtained VPN username and password from the Keychain
  7. 2012-02-27 03:14:33 OpenVPN 2.2.1 i386-apple-darwin10.8.0 [SSL] [LZO2] [PKCS11] [eurephia] built on Jan 8 2012
  8. 2012-02-27 03:14:33 MANAGEMENT: TCP Socket listening on 127.0.0.1:1337
  9. 2012-02-27 03:14:33 Need hold release from management interface, waiting...
  10. 2012-02-27 03:14:33 MANAGEMENT: Client connected from 127.0.0.1:1337
  11. 2012-02-27 03:14:33 MANAGEMENT: CMD 'pid'
  12. 2012-02-27 03:14:33 MANAGEMENT: CMD 'state on'
  13. 2012-02-27 03:14:33 MANAGEMENT: CMD 'state'
  14. 2012-02-27 03:14:33 MANAGEMENT: CMD 'hold release'
  15. 2012-02-27 03:14:33 MANAGEMENT: CMD 'username "Auth" "99ye@mail.ru "'
  16. 2012-02-27 03:14:33 MANAGEMENT: CMD 'password [...]'
  17. 2012-02-27 03:14:33 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  18. 2012-02-27 03:14:33 WARNING: file '99ye@mail.ru120129001233.p12' is group or others accessible
  19. 2012-02-27 03:14:33 Control Channel MTU parms [ L:1559 D:140 EF:40 EB:0 ET:0 EL:0 ]
  20. 2012-02-27 03:14:33 Socket Buffers: R=[262140->65536] S=[131070->65536]
  21. 2012-02-27 03:14:33 MANAGEMENT: >STATE:1330298073,RESOLVE,,,
  22. 2012-02-27 03:14:33 *Tunnelblick: openvpnstart: /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.2.1/openvpn --cd /Users/admin/Library/Application Support/Tunnelblick/Configurations --daemon --management 127.0.0.1 1337 --config /Users/admin/Library/Application Support/Tunnelblick/Configurations/Work.ovpn --log /Library/Application Support/Tunnelblick/Logs/-SUsers-Sadmin-SLibrary-SApplication Support-STunnelblick-SConfigurations-SWork.ovpn.1_0_0_0_49.1337.openvpn.log --management-query-passwords --management-hold --script-security 2 --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -m -w -d -atDASNGWrdasngw --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -m -w -d -atDASNGWrdasngw --up-restart
  23. 2012-02-27 03:14:34 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
  24. 2012-02-27 03:14:34 Local Options hash (VER=V4): '30065675'
  25. 2012-02-27 03:14:34 Expected Remote Options hash (VER=V4): '37840390'
  26. 2012-02-27 03:14:34 Attempting to establish TCP connection with 173.236.65.45:444 [nonblock]
  27. 2012-02-27 03:14:34 MANAGEMENT: >STATE:1330298074,TCP_CONNECT,,,
  28. 2012-02-27 03:14:35 TCP connection established with 173.236.65.45:444
  29. 2012-02-27 03:14:35 TCPv4_CLIENT link local: [undef]
  30. 2012-02-27 03:14:35 TCPv4_CLIENT link remote: 173.236.65.45:444
  31. 2012-02-27 03:14:35 MANAGEMENT: >STATE:1330298075,WAIT,,,
  32. 2012-02-27 03:14:35 MANAGEMENT: >STATE:1330298075,AUTH,,,
  33. 2012-02-27 03:14:35 TLS: Initial packet from 173.236.65.45:444, sid=19158d1a d1be14c0
  34. 2012-02-27 03:14:39 VERIFY OK: depth=1, /CN=security-underground.com/C=DE/ST=somewhere/L=somewhere/O=security-underground.com/emailAddress=support@security-underground.com
  35. 2012-02-27 03:14:39 VERIFY OK: nsCertType=SERVER
  36. 2012-02-27 03:14:39 VERIFY OK: depth=0, /C=GB/ST=Berkshire/L=Newbury/O=My_Company_Ltd/CN=US110826004211
  37. 2012-02-27 03:14:44 Connection reset, restarting [0]
  38. 2012-02-27 03:14:44 TCP/UDP: Closing socket
  39. 2012-02-27 03:14:44 SIGUSR1[soft,connection-reset] received, process restarting
  40. 2012-02-27 03:14:44 MANAGEMENT: >STATE:1330298084,RECONNECTING,connection-reset,,
  41. 2012-02-27 03:14:44 MANAGEMENT: CMD 'hold release'
  42. 2012-02-27 03:14:44 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  43. 2012-02-27 03:14:44 Re-using SSL/TLS context
  44. 2012-02-27 03:14:44 Control Channel MTU parms [ L:1559 D:140 EF:40 EB:0 ET:0 EL:0 ]
  45. 2012-02-27 03:14:44 Socket Buffers: R=[262140->65536] S=[131070->65536]
  46. 2012-02-27 03:14:44 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
  47. 2012-02-27 03:14:44 Local Options hash (VER=V4): '30065675'
  48. 2012-02-27 03:14:44 Expected Remote Options hash (VER=V4): '37840390'
  49. 2012-02-27 03:14:44 Attempting to establish TCP connection with 46.22.211.122:444 [nonblock]
  50. 2012-02-27 03:14:44 MANAGEMENT: >STATE:1330298084,TCP_CONNECT,,,
  51. 2012-02-27 03:14:45 *Tunnelblick: Obtained VPN username and password from the Keychain
  52. 2012-02-27 03:14:45 TCP connection established with 46.22.211.122:444
  53. 2012-02-27 03:14:45 TCPv4_CLIENT link local: [undef]
  54. 2012-02-27 03:14:45 TCPv4_CLIENT link remote: 46.22.211.122:444
  55. 2012-02-27 03:14:45 MANAGEMENT: >STATE:1330298085,WAIT,,,
  56. 2012-02-27 03:14:45 MANAGEMENT: >STATE:1330298085,AUTH,,,
  57. 2012-02-27 03:14:45 TLS: Initial packet from 46.22.211.122:444, sid=4882c3d1 e2482348
  58. 2012-02-27 03:14:45 MANAGEMENT: CMD 'username "Auth" "99ye@mail.ru "'
  59. 2012-02-27 03:14:45 MANAGEMENT: CMD 'password [...]'
  60. 2012-02-27 03:14:47 VERIFY OK: depth=1, /CN=security-underground.com/C=DE/ST=somewhere/L=somewhere/O=security-underground.com/emailAddress=support@security-underground.com
  61. 2012-02-27 03:14:47 VERIFY OK: nsCertType=SERVER
  62. 2012-02-27 03:14:47 VERIFY OK: depth=0, /C=GB/ST=Berkshire/L=Newbury/O=My_Company_Ltd/CN=US110826004211
  63. 2012-02-27 03:14:50 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  64. 2012-02-27 03:14:50 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  65. 2012-02-27 03:14:50 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  66. 2012-02-27 03:14:50 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  67. 2012-02-27 03:14:50 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  68. 2012-02-27 03:14:50 [US110826004211] Peer Connection Initiated with 46.22.211.122:444
  69. 2012-02-27 03:14:51 MANAGEMENT: >STATE:1330298091,GET_CONFIG,,,
  70. 2012-02-27 03:14:52 SENT CONTROL [US110826004211]: 'PUSH_REQUEST' (status=1)
  71. 2012-02-27 03:14:52 AUTH: Received AUTH_FAILED control message
  72. 2012-02-27 03:14:52 TCP/UDP: Closing socket
  73. 2012-02-27 03:14:52 SIGTERM[soft,auth-failure] received, process exiting
  74. 2012-02-27 03:14:52 MANAGEMENT: >STATE:1330298092,EXITING,auth-failure,,
  75. 2012-02-27 03:14:55 *Tunnelblick: Flushed the DNS cache
Add Comment
Please, Sign In to add comment