Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2012-02-27 03:14:33 *Tunnelblick: OS X 10.7.3; Tunnelblick 3.2.3 (build 2891.2932) Unsigned
- 2012-02-27 03:14:33 *Tunnelblick: Attempting connection with Work; Set nameserver = 1; monitoring connection
- 2012-02-27 03:14:33 *Tunnelblick: /Applications/Tunnelblick.app/Contents/Resources/openvpnstart start Work.ovpn 1337 1 0 0 0 49 -atDASNGWrdasngw
- 2012-02-27 03:14:33 *Tunnelblick: openvpnstart message: Loading tun.kext
- 2012-02-27 03:14:33 *Tunnelblick: Established communication with OpenVPN
- 2012-02-27 03:14:33 *Tunnelblick: Obtained VPN username and password from the Keychain
- 2012-02-27 03:14:33 OpenVPN 2.2.1 i386-apple-darwin10.8.0 [SSL] [LZO2] [PKCS11] [eurephia] built on Jan 8 2012
- 2012-02-27 03:14:33 MANAGEMENT: TCP Socket listening on 127.0.0.1:1337
- 2012-02-27 03:14:33 Need hold release from management interface, waiting...
- 2012-02-27 03:14:33 MANAGEMENT: Client connected from 127.0.0.1:1337
- 2012-02-27 03:14:33 MANAGEMENT: CMD 'pid'
- 2012-02-27 03:14:33 MANAGEMENT: CMD 'state on'
- 2012-02-27 03:14:33 MANAGEMENT: CMD 'state'
- 2012-02-27 03:14:33 MANAGEMENT: CMD 'hold release'
- 2012-02-27 03:14:33 MANAGEMENT: CMD 'username "Auth" "99ye@mail.ru "'
- 2012-02-27 03:14:33 MANAGEMENT: CMD 'password [...]'
- 2012-02-27 03:14:33 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2012-02-27 03:14:33 WARNING: file '99ye@mail.ru120129001233.p12' is group or others accessible
- 2012-02-27 03:14:33 Control Channel MTU parms [ L:1559 D:140 EF:40 EB:0 ET:0 EL:0 ]
- 2012-02-27 03:14:33 Socket Buffers: R=[262140->65536] S=[131070->65536]
- 2012-02-27 03:14:33 MANAGEMENT: >STATE:1330298073,RESOLVE,,,
- 2012-02-27 03:14:33 *Tunnelblick: openvpnstart: /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.2.1/openvpn --cd /Users/admin/Library/Application Support/Tunnelblick/Configurations --daemon --management 127.0.0.1 1337 --config /Users/admin/Library/Application Support/Tunnelblick/Configurations/Work.ovpn --log /Library/Application Support/Tunnelblick/Logs/-SUsers-Sadmin-SLibrary-SApplication Support-STunnelblick-SConfigurations-SWork.ovpn.1_0_0_0_49.1337.openvpn.log --management-query-passwords --management-hold --script-security 2 --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -m -w -d -atDASNGWrdasngw --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -m -w -d -atDASNGWrdasngw --up-restart
- 2012-02-27 03:14:34 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
- 2012-02-27 03:14:34 Local Options hash (VER=V4): '30065675'
- 2012-02-27 03:14:34 Expected Remote Options hash (VER=V4): '37840390'
- 2012-02-27 03:14:34 Attempting to establish TCP connection with 173.236.65.45:444 [nonblock]
- 2012-02-27 03:14:34 MANAGEMENT: >STATE:1330298074,TCP_CONNECT,,,
- 2012-02-27 03:14:35 TCP connection established with 173.236.65.45:444
- 2012-02-27 03:14:35 TCPv4_CLIENT link local: [undef]
- 2012-02-27 03:14:35 TCPv4_CLIENT link remote: 173.236.65.45:444
- 2012-02-27 03:14:35 MANAGEMENT: >STATE:1330298075,WAIT,,,
- 2012-02-27 03:14:35 MANAGEMENT: >STATE:1330298075,AUTH,,,
- 2012-02-27 03:14:35 TLS: Initial packet from 173.236.65.45:444, sid=19158d1a d1be14c0
- 2012-02-27 03:14:39 VERIFY OK: depth=1, /CN=security-underground.com/C=DE/ST=somewhere/L=somewhere/O=security-underground.com/emailAddress=support@security-underground.com
- 2012-02-27 03:14:39 VERIFY OK: nsCertType=SERVER
- 2012-02-27 03:14:39 VERIFY OK: depth=0, /C=GB/ST=Berkshire/L=Newbury/O=My_Company_Ltd/CN=US110826004211
- 2012-02-27 03:14:44 Connection reset, restarting [0]
- 2012-02-27 03:14:44 TCP/UDP: Closing socket
- 2012-02-27 03:14:44 SIGUSR1[soft,connection-reset] received, process restarting
- 2012-02-27 03:14:44 MANAGEMENT: >STATE:1330298084,RECONNECTING,connection-reset,,
- 2012-02-27 03:14:44 MANAGEMENT: CMD 'hold release'
- 2012-02-27 03:14:44 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 2012-02-27 03:14:44 Re-using SSL/TLS context
- 2012-02-27 03:14:44 Control Channel MTU parms [ L:1559 D:140 EF:40 EB:0 ET:0 EL:0 ]
- 2012-02-27 03:14:44 Socket Buffers: R=[262140->65536] S=[131070->65536]
- 2012-02-27 03:14:44 Data Channel MTU parms [ L:1559 D:1450 EF:59 EB:4 ET:0 EL:0 ]
- 2012-02-27 03:14:44 Local Options hash (VER=V4): '30065675'
- 2012-02-27 03:14:44 Expected Remote Options hash (VER=V4): '37840390'
- 2012-02-27 03:14:44 Attempting to establish TCP connection with 46.22.211.122:444 [nonblock]
- 2012-02-27 03:14:44 MANAGEMENT: >STATE:1330298084,TCP_CONNECT,,,
- 2012-02-27 03:14:45 *Tunnelblick: Obtained VPN username and password from the Keychain
- 2012-02-27 03:14:45 TCP connection established with 46.22.211.122:444
- 2012-02-27 03:14:45 TCPv4_CLIENT link local: [undef]
- 2012-02-27 03:14:45 TCPv4_CLIENT link remote: 46.22.211.122:444
- 2012-02-27 03:14:45 MANAGEMENT: >STATE:1330298085,WAIT,,,
- 2012-02-27 03:14:45 MANAGEMENT: >STATE:1330298085,AUTH,,,
- 2012-02-27 03:14:45 TLS: Initial packet from 46.22.211.122:444, sid=4882c3d1 e2482348
- 2012-02-27 03:14:45 MANAGEMENT: CMD 'username "Auth" "99ye@mail.ru "'
- 2012-02-27 03:14:45 MANAGEMENT: CMD 'password [...]'
- 2012-02-27 03:14:47 VERIFY OK: depth=1, /CN=security-underground.com/C=DE/ST=somewhere/L=somewhere/O=security-underground.com/emailAddress=support@security-underground.com
- 2012-02-27 03:14:47 VERIFY OK: nsCertType=SERVER
- 2012-02-27 03:14:47 VERIFY OK: depth=0, /C=GB/ST=Berkshire/L=Newbury/O=My_Company_Ltd/CN=US110826004211
- 2012-02-27 03:14:50 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- 2012-02-27 03:14:50 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2012-02-27 03:14:50 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- 2012-02-27 03:14:50 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2012-02-27 03:14:50 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- 2012-02-27 03:14:50 [US110826004211] Peer Connection Initiated with 46.22.211.122:444
- 2012-02-27 03:14:51 MANAGEMENT: >STATE:1330298091,GET_CONFIG,,,
- 2012-02-27 03:14:52 SENT CONTROL [US110826004211]: 'PUSH_REQUEST' (status=1)
- 2012-02-27 03:14:52 AUTH: Received AUTH_FAILED control message
- 2012-02-27 03:14:52 TCP/UDP: Closing socket
- 2012-02-27 03:14:52 SIGTERM[soft,auth-failure] received, process exiting
- 2012-02-27 03:14:52 MANAGEMENT: >STATE:1330298092,EXITING,auth-failure,,
- 2012-02-27 03:14:55 *Tunnelblick: Flushed the DNS cache
Add Comment
Please, Sign In to add comment