Advertisement
Emulatorman

openvpn log

Apr 28th, 2012
42
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.25 KB | None | 0 0
  1. openvpn /etc/openvpn/client.conf
  2. Sat Apr 28 19:59:36 2012 OpenVPN 2.2.2 x86_64-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [eurephia] built on Jan 3 2012
  3. Sat Apr 28 19:59:36 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4. Sat Apr 28 19:59:36 2012 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
  5. Sat Apr 28 19:59:36 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  6. Sat Apr 28 19:59:36 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  7. Sat Apr 28 19:59:36 2012 LZO compression initialized
  8. Sat Apr 28 19:59:36 2012 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
  9. Sat Apr 28 19:59:36 2012 Socket Buffers: R=[212992->131072] S=[212992->131072]
  10. Sat Apr 28 19:59:36 2012 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
  11. Sat Apr 28 19:59:36 2012 Local Options hash (VER=V4): '504e774e'
  12. Sat Apr 28 19:59:36 2012 Expected Remote Options hash (VER=V4): '14168603'
  13. Sat Apr 28 19:59:36 2012 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  14. Sat Apr 28 19:59:36 2012 UDPv4 link local: [undef]
  15. Sat Apr 28 19:59:36 2012 UDPv4 link remote: 85.57.97.245:1194
  16. Sat Apr 28 19:59:37 2012 TLS: Initial packet from 85.57.97.245:1194, sid=5120693e af6f350c
  17. Sat Apr 28 19:59:39 2012 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
  18. Sat Apr 28 19:59:39 2012 VERIFY OK: nsCertType=SERVER
  19. Sat Apr 28 19:59:39 2012 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=server/name=changeme/emailAddress=mail@host.domain
  20. Sat Apr 28 19:59:45 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  21. Sat Apr 28 19:59:45 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  22. Sat Apr 28 19:59:45 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  23. Sat Apr 28 19:59:45 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  24. Sat Apr 28 19:59:45 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  25. Sat Apr 28 19:59:45 2012 [server] Peer Connection Initiated with 85.57.97.245:1194
  26. Sat Apr 28 19:59:48 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  27. Sat Apr 28 19:59:48 2012 PUSH: Received control message: 'PUSH_REPLY,route 10.0.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.0.0.14 10.0.0.13'
  28. Sat Apr 28 19:59:48 2012 OPTIONS IMPORT: timers and/or timeouts modified
  29. Sat Apr 28 19:59:48 2012 OPTIONS IMPORT: --ifconfig/up options modified
  30. Sat Apr 28 19:59:48 2012 OPTIONS IMPORT: route options modified
  31. Sat Apr 28 19:59:48 2012 ROUTE default_gateway=192.168.0.1
  32. Sat Apr 28 19:59:48 2012 TUN/TAP device tun0 opened
  33. Sat Apr 28 19:59:48 2012 TUN/TAP TX queue length set to 100
  34. Sat Apr 28 19:59:48 2012 /usr/sbin/ip link set dev tun0 up mtu 1500
  35. Sat Apr 28 19:59:48 2012 /usr/sbin/ip addr add dev tun0 local 10.0.0.14 peer 10.0.0.13
  36. Sat Apr 28 19:59:48 2012 /usr/sbin/ip route add 10.0.0.1/32 via 10.0.0.13
  37. Sat Apr 28 19:59:48 2012 GID set to nobody
  38. Sat Apr 28 19:59:48 2012 UID set to nobody
  39. Sat Apr 28 19:59:48 2012 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement