Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sun Nov 08 14:40:14 2015 TCPv4_CLIENT link remote: [AF_INET]45.79.196.68:443
- Sun Nov 08 14:40:14 2015 MANAGEMENT: >STATE:1447022414,WAIT,,,
- Sun Nov 08 14:40:14 2015 MANAGEMENT: >STATE:1447022414,AUTH,,,
- Sun Nov 08 14:40:14 2015 TLS: Initial packet from [AF_INET]45.79.196.68:443, sid=6bdc6e3d 2f6133a3
- Sun Nov 08 14:40:16 2015 VERIFY OK: depth=1, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=bkend1.priv.tekkreborn.net, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:40:16 2015 VERIFY OK: nsCertType=SERVER
- Sun Nov 08 14:40:16 2015 VERIFY OK: depth=0, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=server, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:40:20 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:40:20 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:40:20 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:40:20 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:40:20 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Nov 08 14:40:20 2015 [server] Peer Connection Initiated with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:40:21 2015 MANAGEMENT: >STATE:1447022421,GET_CONFIG,,,
- Sun Nov 08 14:40:22 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Nov 08 14:40:22 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,sndbuf 393216,rcvbuf 393216,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Sun Nov 08 14:40:22 2015 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 08 14:40:22 2015 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Nov 08 14:40:22 2015 Socket Buffers: R=[393216->393216] S=[393216->393216]
- Sun Nov 08 14:40:22 2015 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 08 14:40:22 2015 OPTIONS IMPORT: route options modified
- Sun Nov 08 14:40:22 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 08 14:40:22 2015 Preserving previous TUN/TAP instance: Ethernet 2
- Sun Nov 08 14:40:22 2015 Initialization Sequence Completed
- Sun Nov 08 14:40:22 2015 MANAGEMENT: >STATE:1447022422,CONNECTED,SUCCESS,10.8.0.6,45.79.196.68
- Sun Nov 08 14:40:37 2015 Connection reset, restarting [0]
- Sun Nov 08 14:40:37 2015 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Nov 08 14:40:37 2015 MANAGEMENT: >STATE:1447022437,RECONNECTING,connection-reset,,
- Sun Nov 08 14:40:37 2015 Restart pause, 5 second(s)
- Sun Nov 08 14:40:42 2015 Socket Buffers: R=[65536->393216] S=[65536->393216]
- Sun Nov 08 14:40:42 2015 Attempting to establish TCP connection with [AF_INET]45.79.196.68:443 [nonblock]
- Sun Nov 08 14:40:42 2015 MANAGEMENT: >STATE:1447022442,TCP_CONNECT,,,
- Sun Nov 08 14:40:43 2015 TCP connection established with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:40:43 2015 TCPv4_CLIENT link local: [undef]
- Sun Nov 08 14:40:43 2015 TCPv4_CLIENT link remote: [AF_INET]45.79.196.68:443
- Sun Nov 08 14:40:43 2015 MANAGEMENT: >STATE:1447022443,WAIT,,,
- Sun Nov 08 14:40:43 2015 MANAGEMENT: >STATE:1447022443,AUTH,,,
- Sun Nov 08 14:40:43 2015 TLS: Initial packet from [AF_INET]45.79.196.68:443, sid=72b87232 7bb844e8
- Sun Nov 08 14:40:45 2015 VERIFY OK: depth=1, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=bkend1.priv.tekkreborn.net, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:40:45 2015 VERIFY OK: nsCertType=SERVER
- Sun Nov 08 14:40:45 2015 VERIFY OK: depth=0, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=server, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:40:48 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:40:48 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:40:48 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:40:48 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:40:48 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Nov 08 14:40:48 2015 [server] Peer Connection Initiated with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:40:49 2015 MANAGEMENT: >STATE:1447022449,GET_CONFIG,,,
- Sun Nov 08 14:40:50 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Nov 08 14:40:50 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,sndbuf 393216,rcvbuf 393216,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Sun Nov 08 14:40:50 2015 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 08 14:40:50 2015 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Nov 08 14:40:50 2015 Socket Buffers: R=[393216->393216] S=[393216->393216]
- Sun Nov 08 14:40:50 2015 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 08 14:40:50 2015 OPTIONS IMPORT: route options modified
- Sun Nov 08 14:40:50 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 08 14:40:50 2015 Preserving previous TUN/TAP instance: Ethernet 2
- Sun Nov 08 14:40:50 2015 Initialization Sequence Completed
- Sun Nov 08 14:40:50 2015 MANAGEMENT: >STATE:1447022450,CONNECTED,SUCCESS,10.8.0.6,45.79.196.68
- Sun Nov 08 14:41:00 2015 Connection reset, restarting [0]
- Sun Nov 08 14:41:00 2015 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Nov 08 14:41:00 2015 MANAGEMENT: >STATE:1447022460,RECONNECTING,connection-reset,,
- Sun Nov 08 14:41:00 2015 Restart pause, 5 second(s)
- Sun Nov 08 14:41:05 2015 Socket Buffers: R=[65536->393216] S=[65536->393216]
- Sun Nov 08 14:41:05 2015 Attempting to establish TCP connection with [AF_INET]45.79.196.68:443 [nonblock]
- Sun Nov 08 14:41:05 2015 MANAGEMENT: >STATE:1447022465,TCP_CONNECT,,,
- Sun Nov 08 14:41:06 2015 TCP connection established with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:41:06 2015 TCPv4_CLIENT link local: [undef]
- Sun Nov 08 14:41:06 2015 TCPv4_CLIENT link remote: [AF_INET]45.79.196.68:443
- Sun Nov 08 14:41:06 2015 MANAGEMENT: >STATE:1447022466,WAIT,,,
- Sun Nov 08 14:41:07 2015 MANAGEMENT: >STATE:1447022467,AUTH,,,
- Sun Nov 08 14:41:07 2015 TLS: Initial packet from [AF_INET]45.79.196.68:443, sid=dcb9cf94 13534c92
- Sun Nov 08 14:41:09 2015 VERIFY OK: depth=1, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=bkend1.priv.tekkreborn.net, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:41:09 2015 VERIFY OK: nsCertType=SERVER
- Sun Nov 08 14:41:09 2015 VERIFY OK: depth=0, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=server, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:41:12 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:41:12 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:41:12 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:41:12 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:41:12 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Nov 08 14:41:12 2015 [server] Peer Connection Initiated with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:41:13 2015 MANAGEMENT: >STATE:1447022473,GET_CONFIG,,,
- Sun Nov 08 14:41:14 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Nov 08 14:41:14 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,sndbuf 393216,rcvbuf 393216,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Sun Nov 08 14:41:14 2015 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 08 14:41:14 2015 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Nov 08 14:41:14 2015 Socket Buffers: R=[393216->393216] S=[393216->393216]
- Sun Nov 08 14:41:14 2015 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 08 14:41:14 2015 OPTIONS IMPORT: route options modified
- Sun Nov 08 14:41:14 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 08 14:41:14 2015 Preserving previous TUN/TAP instance: Ethernet 2
- Sun Nov 08 14:41:14 2015 Initialization Sequence Completed
- Sun Nov 08 14:41:14 2015 MANAGEMENT: >STATE:1447022474,CONNECTED,SUCCESS,10.8.0.6,45.79.196.68
- Sun Nov 08 14:41:24 2015 Connection reset, restarting [0]
- Sun Nov 08 14:41:24 2015 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Nov 08 14:41:24 2015 MANAGEMENT: >STATE:1447022484,RECONNECTING,connection-reset,,
- Sun Nov 08 14:41:24 2015 Restart pause, 5 second(s)
- Sun Nov 08 14:41:29 2015 Socket Buffers: R=[65536->393216] S=[65536->393216]
- Sun Nov 08 14:41:29 2015 Attempting to establish TCP connection with [AF_INET]45.79.196.68:443 [nonblock]
- Sun Nov 08 14:41:29 2015 MANAGEMENT: >STATE:1447022489,TCP_CONNECT,,,
- Sun Nov 08 14:41:30 2015 TCP connection established with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:41:30 2015 TCPv4_CLIENT link local: [undef]
- Sun Nov 08 14:41:30 2015 TCPv4_CLIENT link remote: [AF_INET]45.79.196.68:443
- Sun Nov 08 14:41:30 2015 MANAGEMENT: >STATE:1447022490,WAIT,,,
- Sun Nov 08 14:41:30 2015 MANAGEMENT: >STATE:1447022490,AUTH,,,
- Sun Nov 08 14:41:30 2015 TLS: Initial packet from [AF_INET]45.79.196.68:443, sid=16b16e30 247bc4ac
- Sun Nov 08 14:41:32 2015 VERIFY OK: depth=1, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=bkend1.priv.tekkreborn.net, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:41:32 2015 VERIFY OK: nsCertType=SERVER
- Sun Nov 08 14:41:32 2015 VERIFY OK: depth=0, C=US, ST=GA, L=Fayetteville, O=TekkReborn, OU=Admin, CN=server, name=EasyRSA, emailAddress=matt@tekkreborn.net
- Sun Nov 08 14:41:35 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:41:35 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:41:35 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Nov 08 14:41:35 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 08 14:41:35 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Sun Nov 08 14:41:35 2015 [server] Peer Connection Initiated with [AF_INET]45.79.196.68:443
- Sun Nov 08 14:41:36 2015 MANAGEMENT: >STATE:1447022496,GET_CONFIG,,,
- Sun Nov 08 14:41:37 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Nov 08 14:41:37 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,sndbuf 393216,rcvbuf 393216,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Sun Nov 08 14:41:37 2015 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 08 14:41:37 2015 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Nov 08 14:41:37 2015 Socket Buffers: R=[393216->393216] S=[393216->393216]
- Sun Nov 08 14:41:37 2015 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 08 14:41:37 2015 OPTIONS IMPORT: route options modified
- Sun Nov 08 14:41:37 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 08 14:41:37 2015 Preserving previous TUN/TAP instance: Ethernet 2
- Sun Nov 08 14:41:37 2015 Initialization Sequence Completed
- Sun Nov 08 14:41:37 2015 MANAGEMENT: >STATE:1447022497,CONNECTED,SUCCESS,10.8.0.6,45.79.196.68
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement