Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- openvpn /etc/openvpn/client.conf
- Sat Apr 28 19:59:36 2012 OpenVPN 2.2.2 x86_64-unknown-linux-gnu [SSL] [LZO2] [EPOLL] [eurephia] built on Jan 3 2012
- Sat Apr 28 19:59:36 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Sat Apr 28 19:59:36 2012 Control Channel Authentication: using '/etc/openvpn/ta.key' as a OpenVPN static key file
- Sat Apr 28 19:59:36 2012 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Apr 28 19:59:36 2012 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Apr 28 19:59:36 2012 LZO compression initialized
- Sat Apr 28 19:59:36 2012 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
- Sat Apr 28 19:59:36 2012 Socket Buffers: R=[212992->131072] S=[212992->131072]
- Sat Apr 28 19:59:36 2012 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Sat Apr 28 19:59:36 2012 Local Options hash (VER=V4): '504e774e'
- Sat Apr 28 19:59:36 2012 Expected Remote Options hash (VER=V4): '14168603'
- Sat Apr 28 19:59:36 2012 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Sat Apr 28 19:59:36 2012 UDPv4 link local: [undef]
- Sat Apr 28 19:59:36 2012 UDPv4 link remote: 85.57.97.245:1194
- Sat Apr 28 19:59:37 2012 TLS: Initial packet from 85.57.97.245:1194, sid=5120693e af6f350c
- Sat Apr 28 19:59:39 2012 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=changeme/name=changeme/emailAddress=mail@host.domain
- Sat Apr 28 19:59:39 2012 VERIFY OK: nsCertType=SERVER
- Sat Apr 28 19:59:39 2012 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/OU=changeme/CN=server/name=changeme/emailAddress=mail@host.domain
- Sat Apr 28 19:59:45 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sat Apr 28 19:59:45 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Apr 28 19:59:45 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sat Apr 28 19:59:45 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sat Apr 28 19:59:45 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sat Apr 28 19:59:45 2012 [server] Peer Connection Initiated with 85.57.97.245:1194
- Sat Apr 28 19:59:48 2012 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sat Apr 28 19:59:48 2012 PUSH: Received control message: 'PUSH_REPLY,route 10.0.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.0.0.14 10.0.0.13'
- Sat Apr 28 19:59:48 2012 OPTIONS IMPORT: timers and/or timeouts modified
- Sat Apr 28 19:59:48 2012 OPTIONS IMPORT: --ifconfig/up options modified
- Sat Apr 28 19:59:48 2012 OPTIONS IMPORT: route options modified
- Sat Apr 28 19:59:48 2012 ROUTE default_gateway=192.168.0.1
- Sat Apr 28 19:59:48 2012 TUN/TAP device tun0 opened
- Sat Apr 28 19:59:48 2012 TUN/TAP TX queue length set to 100
- Sat Apr 28 19:59:48 2012 /usr/sbin/ip link set dev tun0 up mtu 1500
- Sat Apr 28 19:59:48 2012 /usr/sbin/ip addr add dev tun0 local 10.0.0.14 peer 10.0.0.13
- Sat Apr 28 19:59:48 2012 /usr/sbin/ip route add 10.0.0.1/32 via 10.0.0.13
- Sat Apr 28 19:59:48 2012 GID set to nobody
- Sat Apr 28 19:59:48 2012 UID set to nobody
- Sat Apr 28 19:59:48 2012 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement