SHARE
TWEET

Untitled

a guest Oct 13th, 2019 69 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Sun Oct 13 23:34:50 2019 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
  2. Sun Oct 13 23:34:50 2019 Windows version 6.1 (Windows 7) 64bit
  3. Sun Oct 13 23:34:50 2019 library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
  4. Enter Management Password:
  5. Sun Oct 13 23:34:50 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  6. Sun Oct 13 23:34:50 2019 Need hold release from management interface, waiting...
  7. Sun Oct 13 23:34:50 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  8. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'state on'
  9. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'log all on'
  10. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'echo all on'
  11. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'hold off'
  12. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'hold release'
  13. Sun Oct 13 23:34:50 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  14. Sun Oct 13 23:34:51 2019 MANAGEMENT: CMD 'password [...]'
  15. Sun Oct 13 23:34:51 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  16. Sun Oct 13 23:34:51 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  17. Sun Oct 13 23:34:51 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  18. Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,RESOLVE,,,,,,
  19. Sun Oct 13 23:34:51 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]62.210.99.189:1194
  20. Sun Oct 13 23:34:51 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
  21. Sun Oct 13 23:34:51 2019 UDP link local: (not bound)
  22. Sun Oct 13 23:34:51 2019 UDP link remote: [AF_INET]62.210.99.189:1194
  23. Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,WAIT,,,,,,
  24. Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,AUTH,,,,,,
  25. Sun Oct 13 23:34:51 2019 TLS: Initial packet from [AF_INET]62.210.99.189:1194, sid=19dacc78 d10f5310
  26. Sun Oct 13 23:34:51 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  27. Sun Oct 13 23:34:51 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  28. Sun Oct 13 23:34:52 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  29. Sun Oct 13 23:34:52 2019 [server] Peer Connection Initiated with [AF_INET]62.210.99.189:1194
  30. Sun Oct 13 23:34:53 2019 MANAGEMENT: >STATE:1570995293,GET_CONFIG,,,,,,
  31. Sun Oct 13 23:34:53 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  32. Sun Oct 13 23:34:53 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 192.168.50.1,route 192.168.50.0 255.255.255.0,explicit-exit-notify 3,sndbuf 393216,rcvbuf 393216,route 192.168.50.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.50.118 192.168.50.117'
  33. Sun Oct 13 23:34:53 2019 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:4 is ignored by previous <connection> blocks
  34. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: timers and/or timeouts modified
  35. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: explicit notify parm(s) modified
  36. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  37. Sun Oct 13 23:34:53 2019 Socket Buffers: R=[8192->393216] S=[8192->393216]
  38. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --ifconfig/up options modified
  39. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: route options modified
  40. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  41. Sun Oct 13 23:34:53 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  42. Sun Oct 13 23:34:53 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  43. Sun Oct 13 23:34:53 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  44. Sun Oct 13 23:34:53 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  45. Sun Oct 13 23:34:53 2019 interactive service msg_channel=0
  46. Sun Oct 13 23:34:53 2019 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=e0:3f:49:13:4f:fa
  47. Sun Oct 13 23:34:53 2019 open_tun
  48. Sun Oct 13 23:34:53 2019 TAP-WIN32 device [Подключение по локальной сети 3] opened: \\.\Global\{D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}.tap
  49. Sun Oct 13 23:34:53 2019 TAP-Windows Driver Version 9.21
  50. Sun Oct 13 23:34:53 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.50.118/255.255.255.252 on interface {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081} [DHCP-serv: 192.168.50.117, lease-time: 31536000]
  51. Sun Oct 13 23:34:53 2019 Successful ARP Flush on interface [14] {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}
  52. Sun Oct 13 23:34:53 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  53. Sun Oct 13 23:34:53 2019 MANAGEMENT: >STATE:1570995293,ASSIGN_IP,,192.168.50.118,,,,
  54. Sun Oct 13 23:34:58 2019 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
  55. Sun Oct 13 23:34:58 2019 C:\Windows\system32\route.exe ADD 62.210.99.189 MASK 255.255.255.255 192.168.1.1
  56. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  57. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  58. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.50.117
  59. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  60. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  61. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.50.117
  62. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  63. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  64. Sun Oct 13 23:34:59 2019 MANAGEMENT: >STATE:1570995299,ADD_ROUTES,,,,,,
  65. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  66. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  67. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  68. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  69. Sun Oct 13 23:34:59 2019 ROUTE: route addition failed using CreateIpForwardEntry: Этот объект уже существует.   [status=5010 if_index=14]
  70. Sun Oct 13 23:34:59 2019 Route addition via IPAPI failed [adaptive]
  71. Sun Oct 13 23:34:59 2019 Route addition fallback to route.exe
  72. Sun Oct 13 23:34:59 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  73. Sun Oct 13 23:35:01 2019 Initialization Sequence Completed
  74. Sun Oct 13 23:35:01 2019 MANAGEMENT: >STATE:1570995301,CONNECTED,SUCCESS,192.168.50.118,62.210.99.189,1194,,
  75. Sun Oct 13 23:35:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  76. Sun Oct 13 23:35:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  77. Sun Oct 13 23:35:53 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  78. Sun Oct 13 23:35:53 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  79. Sun Oct 13 23:35:53 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  80. Sun Oct 13 23:35:53 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  81. Sun Oct 13 23:35:53 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  82. Sun Oct 13 23:36:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  83. Sun Oct 13 23:36:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  84. Sun Oct 13 23:36:52 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  85. Sun Oct 13 23:36:52 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  86. Sun Oct 13 23:36:52 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  87. Sun Oct 13 23:36:52 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  88. Sun Oct 13 23:36:52 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  89. Sun Oct 13 23:37:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  90. Sun Oct 13 23:37:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  91. Sun Oct 13 23:37:52 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  92. Sun Oct 13 23:37:52 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  93. Sun Oct 13 23:37:52 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  94. Sun Oct 13 23:37:52 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  95. Sun Oct 13 23:37:52 2019 NOTE: --mute triggered...
  96. Sun Oct 13 23:50:55 2019 85 variation(s) on previous 20 message(s) suppressed by --mute
  97. Sun Oct 13 23:50:55 2019 MANAGEMENT: CMD 'signal SIGHUP'
  98. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  99. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  100. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  101. Sun Oct 13 23:50:55 2019 ROUTE: route deletion failed using DeleteIpForwardEntry: Элемент не найден.  
  102. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI failed [adaptive]
  103. Sun Oct 13 23:50:55 2019 Route deletion fallback to route.exe
  104. Sun Oct 13 23:50:55 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  105. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 62.210.99.189 MASK 255.255.255.255 192.168.1.1
  106. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  107. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 192.168.50.117
  108. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  109. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 192.168.50.117
  110. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  111. Sun Oct 13 23:50:55 2019 Closing TUN/TAP interface
  112. Sun Oct 13 23:50:55 2019 TAP: DHCP address released
  113. Sun Oct 13 23:50:55 2019 SIGHUP[hard,] received, process restarting
  114. Sun Oct 13 23:50:55 2019 MANAGEMENT: >STATE:1570996255,RECONNECTING,SIGHUP,,,,,
  115. Sun Oct 13 23:50:55 2019 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
  116. Sun Oct 13 23:50:55 2019 Windows version 6.1 (Windows 7) 64bit
  117. Sun Oct 13 23:50:55 2019 library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.10
  118. Sun Oct 13 23:50:55 2019 Restart pause, 5 second(s)
  119. Sun Oct 13 23:51:00 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  120. Sun Oct 13 23:51:01 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  121. Sun Oct 13 23:51:01 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  122. Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,RESOLVE,,,,,,
  123. Sun Oct 13 23:51:01 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]62.210.99.189:1194
  124. Sun Oct 13 23:51:01 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
  125. Sun Oct 13 23:51:01 2019 UDP link local: (not bound)
  126. Sun Oct 13 23:51:01 2019 UDP link remote: [AF_INET]62.210.99.189:1194
  127. Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,WAIT,,,,,,
  128. Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,AUTH,,,,,,
  129. Sun Oct 13 23:51:01 2019 TLS: Initial packet from [AF_INET]62.210.99.189:1194, sid=f7b16f74 6c478141
  130. Sun Oct 13 23:51:02 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  131. Sun Oct 13 23:51:02 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  132. Sun Oct 13 23:51:02 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  133. Sun Oct 13 23:51:02 2019 [server] Peer Connection Initiated with [AF_INET]62.210.99.189:1194
  134. Sun Oct 13 23:51:03 2019 MANAGEMENT: >STATE:1570996263,GET_CONFIG,,,,,,
  135. Sun Oct 13 23:51:03 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  136. Sun Oct 13 23:51:03 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 192.168.50.1,route 192.168.50.0 255.255.255.0,explicit-exit-notify 3,sndbuf 393216,rcvbuf 393216,route 192.168.50.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.50.118 192.168.50.117'
  137. Sun Oct 13 23:51:03 2019 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:4 is ignored by previous <connection> blocks
  138. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: timers and/or timeouts modified
  139. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: explicit notify parm(s) modified
  140. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  141. Sun Oct 13 23:51:03 2019 Socket Buffers: R=[8192->393216] S=[8192->393216]
  142. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --ifconfig/up options modified
  143. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: route options modified
  144. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  145. Sun Oct 13 23:51:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  146. Sun Oct 13 23:51:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  147. Sun Oct 13 23:51:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  148. Sun Oct 13 23:51:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  149. Sun Oct 13 23:51:03 2019 interactive service msg_channel=0
  150. Sun Oct 13 23:51:03 2019 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=e0:3f:49:13:4f:fa
  151. Sun Oct 13 23:51:03 2019 open_tun
  152. Sun Oct 13 23:51:03 2019 TAP-WIN32 device [Подключение по локальной сети 3] opened: \\.\Global\{D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}.tap
  153. Sun Oct 13 23:51:03 2019 TAP-Windows Driver Version 9.21
  154. Sun Oct 13 23:51:03 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.50.118/255.255.255.252 on interface {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081} [DHCP-serv: 192.168.50.117, lease-time: 31536000]
  155. Sun Oct 13 23:51:03 2019 Successful ARP Flush on interface [14] {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}
  156. Sun Oct 13 23:51:03 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  157. Sun Oct 13 23:51:03 2019 MANAGEMENT: >STATE:1570996263,ASSIGN_IP,,192.168.50.118,,,,
  158. Sun Oct 13 23:51:08 2019 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
  159. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 62.210.99.189 MASK 255.255.255.255 192.168.1.1
  160. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  161. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  162. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.50.117
  163. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  164. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  165. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.50.117
  166. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  167. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  168. Sun Oct 13 23:51:08 2019 MANAGEMENT: >STATE:1570996268,ADD_ROUTES,,,,,,
  169. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  170. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  171. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  172. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  173. Sun Oct 13 23:51:08 2019 ROUTE: route addition failed using CreateIpForwardEntry: Этот объект уже существует.   [status=5010 if_index=14]
  174. Sun Oct 13 23:51:08 2019 Route addition via IPAPI failed [adaptive]
  175. Sun Oct 13 23:51:08 2019 Route addition fallback to route.exe
  176. Sun Oct 13 23:51:08 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  177. Sun Oct 13 23:51:08 2019 Initialization Sequence Completed
  178. Sun Oct 13 23:51:08 2019 MANAGEMENT: >STATE:1570996268,CONNECTED,SUCCESS,192.168.50.118,62.210.99.189,1194,,
  179. Sun Oct 13 23:52:02 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  180. Sun Oct 13 23:52:02 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  181. Sun Oct 13 23:52:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  182. Sun Oct 13 23:52:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  183. Sun Oct 13 23:52:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  184. Sun Oct 13 23:52:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  185. Sun Oct 13 23:52:03 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  186. Sun Oct 13 23:53:03 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  187. Sun Oct 13 23:53:03 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  188. Sun Oct 13 23:53:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  189. Sun Oct 13 23:53:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  190. Sun Oct 13 23:53:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  191. Sun Oct 13 23:53:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  192. Sun Oct 13 23:53:03 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  193. Sun Oct 13 23:54:03 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  194. Sun Oct 13 23:54:03 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  195. Sun Oct 13 23:54:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  196. Sun Oct 13 23:54:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  197. Sun Oct 13 23:54:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  198. Sun Oct 13 23:54:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  199. Sun Oct 13 23:54:03 2019 NOTE: --mute triggered...
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
Not a member of Pastebin yet?
Sign Up, it unlocks many cool features!
 
Top