Guest User

Untitled

a guest
Dec 1st, 2020
241
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.69 KB | None | 0 0
  1. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: OpenVPN 2.4.7 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
  2. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
  3. Tue Dec 1 21:32:04 2020 daemon.warn openvpn(194)[32128]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
  4. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  5. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  6. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.110.114.243:1194
  7. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Socket Buffers: R=[212992->212992] S=[212992->212992]
  8. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: UDP link local: (not bound)
  9. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: UDP link remote: [AF_INET]194.110.114.243:1194
  10. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: TLS: Initial packet from [AF_INET]194.110.114.243:1194, sid=340d5555 0ce56586
  11. Tue Dec 1 21:32:04 2020 daemon.warn openvpn(194)[32128]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  12. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
  13. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
  14. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY KU OK
  15. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Validating certificate extended key usage
  16. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  17. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY EKU OK
  18. Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY OK: depth=0, CN=pl194.nordvpn.com
  19. Tue Dec 1 21:32:05 2020 daemon.notice openvpn(194)[32128]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  20. Tue Dec 1 21:32:05 2020 daemon.notice openvpn(194)[32128]: [pl194.nordvpn.com] Peer Connection Initiated with [AF_INET]194.110.114.243:1194
  21. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: SENT CONTROL [pl194.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  22. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.3 255.255.255.0,peer-id 6,cipher AES-256-GCM'
  23. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: timers and/or timeouts modified
  24. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: explicit notify parm(s) modified
  25. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: compression parms modified
  26. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  27. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Socket Buffers: R=[212992->425984] S=[212992->425984]
  28. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: --ifconfig/up options modified
  29. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: route options modified
  30. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: route-related options modified
  31. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  32. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: peer-id set
  33. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: adjusting link_mtu to 1657
  34. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: data channel crypto options modified
  35. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Data Channel: using negotiated cipher 'AES-256-GCM'
  36. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  37. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  38. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: TUN/TAP device tun0 opened
  39. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: TUN/TAP TX queue length set to 100
  40. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/ifconfig tun0 10.8.2.3 netmask 255.255.255.0 mtu 1500 broadcast 10.8.2.255
  41. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/route add -net 194.110.114.243 netmask 255.255.255.255 gw 192.168.0.1
  42. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
  43. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
  44. Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Initialization Sequence Completed
  45. Tue Dec 1 21:33:19 2020 daemon.err openvpn(194)[32128]: event_wait : Interrupted system call (code=4)
  46. Tue Dec 1 21:33:19 2020 daemon.notice openvpn(194)[32128]: SIGTERM received, sending exit notification to peer
  47. Tue Dec 1 21:33:19 2020 user.notice vpnbypass [2445]: service monitoring interfaces: wan
  48. Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/route del -net 194.110.114.243 netmask 255.255.255.255
  49. Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  50. Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  51. Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: Closing TUN/TAP interface
  52. Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/ifconfig tun0 0.0.0.0
  53. Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: SIGTERM[soft,exit-with-notification] received, process exiting
  54. Tue Dec 1 21:33:52 2020 user.notice vpnbypass [5082]: service monitoring interfaces: wan
  55. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: OpenVPN 2.4.7 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
  56. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
  57. Tue Dec 1 21:33:52 2020 daemon.warn openvpn(193)[5200]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
  58. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  59. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  60. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.110.114.235:1194
  61. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Socket Buffers: R=[212992->212992] S=[212992->212992]
  62. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: UDP link local: (not bound)
  63. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: UDP link remote: [AF_INET]194.110.114.235:1194
  64. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: TLS: Initial packet from [AF_INET]194.110.114.235:1194, sid=d4dc8fc3 23faf47c
  65. Tue Dec 1 21:33:52 2020 daemon.warn openvpn(193)[5200]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  66. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
  67. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
  68. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY KU OK
  69. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Validating certificate extended key usage
  70. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  71. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY EKU OK
  72. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY OK: depth=0, CN=pl193.nordvpn.com
  73. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
  74. Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: [pl193.nordvpn.com] Peer Connection Initiated with [AF_INET]194.110.114.235:1194
  75. Tue Dec 1 21:33:53 2020 daemon.notice openvpn(193)[5200]: SENT CONTROL [pl193.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  76. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.8 255.255.255.0,peer-id 4,cipher AES-256-GCM'
  77. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: timers and/or timeouts modified
  78. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: explicit notify parm(s) modified
  79. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: compression parms modified
  80. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  81. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Socket Buffers: R=[212992->425984] S=[212992->425984]
  82. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: --ifconfig/up options modified
  83. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: route options modified
  84. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: route-related options modified
  85. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  86. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: peer-id set
  87. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: adjusting link_mtu to 1657
  88. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: data channel crypto options modified
  89. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Data Channel: using negotiated cipher 'AES-256-GCM'
  90. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  91. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  92. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: TUN/TAP device tun0 opened
  93. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: TUN/TAP TX queue length set to 100
  94. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/ifconfig tun0 10.8.2.8 netmask 255.255.255.0 mtu 1500 broadcast 10.8.2.255
  95. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/route add -net 194.110.114.235 netmask 255.255.255.255 gw 192.168.0.1
  96. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
  97. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
  98. Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Initialization Sequence Completed
  99.  
Advertisement
Add Comment
Please, Sign In to add comment