Advertisement
Guest User

Untitled

a guest
Oct 10th, 2019
127
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Thu Oct 10 19:41:26 2019 OpenVPN 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019
  2. Thu Oct 10 19:41:26 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  3. Thu Oct 10 19:41:26 2019 library versions: OpenSSL 1.1.0j  20 Nov 2018, LZO 2.10
  4. Thu Oct 10 19:41:26 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  5. Thu Oct 10 19:41:26 2019 Need hold release from management interface, waiting...
  6. Thu Oct 10 19:41:27 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  7. Thu Oct 10 19:41:27 2019 MANAGEMENT: CMD 'state on'
  8. Thu Oct 10 19:41:27 2019 MANAGEMENT: CMD 'log all on'
  9. Thu Oct 10 19:41:27 2019 MANAGEMENT: CMD 'echo all on'
  10. Thu Oct 10 19:41:27 2019 MANAGEMENT: CMD 'bytecount 5'
  11. Thu Oct 10 19:41:27 2019 MANAGEMENT: CMD 'hold off'
  12. Thu Oct 10 19:41:27 2019 MANAGEMENT: CMD 'hold release'
  13. Thu Oct 10 19:41:27 2019 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  14. Thu Oct 10 19:41:27 2019 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  15. Thu Oct 10 19:41:27 2019 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  16. Thu Oct 10 19:41:27 2019 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  17. Thu Oct 10 19:41:27 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]
  18. Thu Oct 10 19:41:27 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  19. Thu Oct 10 19:41:27 2019 UDP link local: (not bound)
  20. Thu Oct 10 19:41:27 2019 UDP link remote: [AF_INET]
  21. Thu Oct 10 19:41:27 2019 MANAGEMENT: >STATE:1570725687,WAIT,,,,,,
  22. Thu Oct 10 19:41:27 2019 MANAGEMENT: >STATE:1570725687,AUTH,,,,,,
  23. Thu Oct 10 19:41:27 2019 TLS: Initial packet from [AF_INET], sid=8594aea3 af1b7f21
  24. Thu Oct 10 19:41:27 2019 VERIFY OK: depth=1, CN=cn_vw11iRBvTCNRxVHv
  25. Thu Oct 10 19:41:27 2019 VERIFY KU OK
  26. Thu Oct 10 19:41:27 2019 Validating certificate extended key usage
  27. Thu Oct 10 19:41:27 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  28. Thu Oct 10 19:41:27 2019 VERIFY EKU OK
  29. Thu Oct 10 19:41:27 2019 VERIFY X509NAME OK: CN=server
  30. Thu Oct 10 19:41:27 2019 VERIFY OK: depth=0, CN=server
  31. Thu Oct 10 19:41:27 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES128-GCM-SHA256, 256 bit EC, curve: prime256v1
  32. Thu Oct 10 19:41:27 2019 [server_QL8BCiGbca80bwxs] Peer Connection Initiated with [AF_INET]
  33. Thu Oct 10 19:41:28 2019 MANAGEMENT: >STATE:1570725688,GET_CONFIG,,,,,,
  34. Thu Oct 10 19:41:28 2019 SENT CONTROL [server_QL8BCiGbca80bwxs]: 'PUSH_REQUEST' (status=1)
  35. Thu Oct 10 19:41:28 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.0.76 255.255.255.255,route 192.168.0.117 255.255.255.255,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-128-GCM'
  36. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: timers and/or timeouts modified
  37. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: --ifconfig/up options modified
  38. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: route options modified
  39. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: route-related options modified
  40. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: peer-id set
  41. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: adjusting link_mtu to 1625
  42. Thu Oct 10 19:41:28 2019 OPTIONS IMPORT: data channel crypto options modified
  43. Thu Oct 10 19:41:28 2019 Outgoing Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
  44. Thu Oct 10 19:41:28 2019 Incoming Data Channel: Cipher 'AES-128-GCM' initialized with 128 bit key
  45. Thu Oct 10 19:41:28 2019 interactive service msg_channel=848
  46. Thu Oct 10 19:41:28 2019 ROUTE_GATEWAY 192.168.100.1/255.255.255.0 I=12 HWADDR=d4:3b:04:e4:cc:c1
  47. Thu Oct 10 19:41:28 2019 open_tun
  48. Thu Oct 10 19:41:28 2019 TAP-WIN32 device [Ethernet 4] opened: \\.\Global\{7FDB9CBA-1DD9-46DC-8385-06E963397B9E}.tap
  49. Thu Oct 10 19:41:28 2019 TAP-Windows Driver Version 9.23
  50. Thu Oct 10 19:41:28 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
  51. Thu Oct 10 19:41:28 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {7FDB9CBA-1DD9-46DC-8385-06E963397B9E} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
  52. Thu Oct 10 19:41:28 2019 Successful ARP Flush on interface [11] {7FDB9CBA-1DD9-46DC-8385-06E963397B9E}
  53. Thu Oct 10 19:41:28 2019 MANAGEMENT: >STATE:1570725688,ASSIGN_IP,,10.8.0.2,,,,
  54. Thu Oct 10 19:41:28 2019 Blocking outside dns using service succeeded.
  55. Thu Oct 10 19:41:33 2019 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up
  56. Thu Oct 10 19:41:33 2019 MANAGEMENT: >STATE:1570725693,ADD_ROUTES,,,,,,
  57. Thu Oct 10 19:41:33 2019 C:\Windows\system32\route.exe ADD 192.168.0.76 MASK 255.255.255.255 10.8.0.1
  58. Thu Oct 10 19:41:33 2019 Route addition via service succeeded
  59. Thu Oct 10 19:41:33 2019 C:\Windows\system32\route.exe ADD 192.168.0.117 MASK 255.255.255.255 10.8.0.1
  60. Thu Oct 10 19:41:33 2019 Route addition via service succeeded
  61. Thu Oct 10 19:41:33 2019 Initialization Sequence Completed
  62. Thu Oct 10 19:41:33 2019 MANAGEMENT: >STATE:1570725693,CONNECTED,SUCCESS,10.8.0.2,
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement