Advertisement
Guest User

asdasdasfgewwttew32

a guest
Mar 12th, 2017
169
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.52 KB | None | 0 0
  1. Mon Mar 13 00:17:13 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
  2. Mon Mar 13 00:17:13 2017 Windows version 6.2 (Windows 8 or greater) 64bit
  3. Mon Mar 13 00:17:13 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
  4. Mon Mar 13 00:17:13 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  5. Mon Mar 13 00:17:13 2017 Need hold release from management interface, waiting...
  6. Mon Mar 13 00:17:14 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  7. Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'state on'
  8. Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'log all on'
  9. Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'hold off'
  10. Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'hold release'
  11. Mon Mar 13 00:17:16 2017 MANAGEMENT: CMD 'username "Auth" "Nevermind5214"'
  12. Mon Mar 13 00:17:16 2017 MANAGEMENT: CMD 'password [...]'
  13. Mon Mar 13 00:17:16 2017 Initializing OpenSSL support for engine 'dynamic'
  14. Mon Mar 13 00:17:16 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  15. Mon Mar 13 00:17:16 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  16. Mon Mar 13 00:17:16 2017 MANAGEMENT: >STATE:1489360636,RESOLVE,,,,,,
  17. Mon Mar 13 00:17:16 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]185.112.156.60:443
  18. Mon Mar 13 00:17:16 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  19. Mon Mar 13 00:17:16 2017 Attempting to establish TCP connection with [AF_INET]185.112.156.60:443 [nonblock]
  20. Mon Mar 13 00:17:16 2017 MANAGEMENT: >STATE:1489360636,TCP_CONNECT,,,,,,
  21. Mon Mar 13 00:17:17 2017 TCP connection established with [AF_INET]185.112.156.60:443
  22. Mon Mar 13 00:17:17 2017 TCP_CLIENT link local: (not bound)
  23. Mon Mar 13 00:17:17 2017 TCP_CLIENT link remote: [AF_INET]185.112.156.60:443
  24. Mon Mar 13 00:17:17 2017 MANAGEMENT: >STATE:1489360637,WAIT,,,,,,
  25. Mon Mar 13 00:17:17 2017 MANAGEMENT: >STATE:1489360637,AUTH,,,,,,
  26. Mon Mar 13 00:17:17 2017 TLS: Initial packet from [AF_INET]185.112.156.60:443, sid=f899d1ac b90c0edb
  27. Mon Mar 13 00:17:17 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  28. Mon Mar 13 00:17:17 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
  29. Mon Mar 13 00:17:17 2017 Validating certificate key usage
  30. Mon Mar 13 00:17:17 2017 ++ Certificate has key usage 00a0, expects 00a0
  31. Mon Mar 13 00:17:17 2017 VERIFY KU OK
  32. Mon Mar 13 00:17:17 2017 Validating certificate extended key usage
  33. Mon Mar 13 00:17:17 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  34. Mon Mar 13 00:17:17 2017 VERIFY EKU OK
  35. Mon Mar 13 00:17:17 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
  36. Mon Mar 13 00:17:22 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  37. Mon Mar 13 00:17:22 2017 [csibvpn1] Peer Connection Initiated with [AF_INET]185.112.156.60:443
  38. Mon Mar 13 00:17:24 2017 MANAGEMENT: >STATE:1489360644,GET_CONFIG,,,,,,
  39. Mon Mar 13 00:17:24 2017 SENT CONTROL [csibvpn1]: 'PUSH_REQUEST' (status=1)
  40. Mon Mar 13 00:17:24 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 20,ping-restart 100,ifconfig 10.8.0.118 10.8.0.117'
  41. Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: timers and/or timeouts modified
  42. Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: --ifconfig/up options modified
  43. Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: route options modified
  44. Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  45. Mon Mar 13 00:17:24 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  46. Mon Mar 13 00:17:24 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  47. Mon Mar 13 00:17:24 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  48. Mon Mar 13 00:17:24 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  49. Mon Mar 13 00:17:24 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  50. Mon Mar 13 00:17:24 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  51. Mon Mar 13 00:17:24 2017 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
  52. Mon Mar 13 00:17:24 2017 interactive service msg_channel=0
  53. Mon Mar 13 00:17:24 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=74:d4:35:0f:d1:4b
  54. Mon Mar 13 00:17:24 2017 open_tun
  55. Mon Mar 13 00:17:24 2017 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5C96E1BE-1B42-4E42-92A1-373A13A5F2DB}.tap
  56. Mon Mar 13 00:17:24 2017 TAP-Windows Driver Version 9.21
  57. Mon Mar 13 00:17:24 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.118/255.255.255.252 on interface {5C96E1BE-1B42-4E42-92A1-373A13A5F2DB} [DHCP-serv: 10.8.0.117, lease-time: 31536000]
  58. Mon Mar 13 00:17:24 2017 Successful ARP Flush on interface [19] {5C96E1BE-1B42-4E42-92A1-373A13A5F2DB}
  59. Mon Mar 13 00:17:24 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  60. Mon Mar 13 00:17:24 2017 MANAGEMENT: >STATE:1489360644,ASSIGN_IP,,10.8.0.118,,,,
  61. Mon Mar 13 00:17:29 2017 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  62. Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 185.112.156.60 MASK 255.255.255.255 192.168.0.1
  63. Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  64. Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
  65. Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.117
  66. Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  67. Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
  68. Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.117
  69. Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  70. Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
  71. Mon Mar 13 00:17:29 2017 MANAGEMENT: >STATE:1489360649,ADD_ROUTES,,,,,,
  72. Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.117
  73. Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  74. Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
  75. Mon Mar 13 00:17:29 2017 Initialization Sequence Completed
  76. Mon Mar 13 00:17:29 2017 MANAGEMENT: >STATE:1489360649,CONNECTED,SUCCESS,10.8.0.118,185.112.156.60,443,192.168.0.100,15163
  77. Mon Mar 13 00:18:32 2017 TLS: soft reset sec=3530 bytes=67353042/67108864 pkts=77676/0
  78. Mon Mar 13 00:18:32 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
  79. Mon Mar 13 00:18:32 2017 Validating certificate key usage
  80. Mon Mar 13 00:18:32 2017 ++ Certificate has key usage 00a0, expects 00a0
  81. Mon Mar 13 00:18:32 2017 VERIFY KU OK
  82. Mon Mar 13 00:18:32 2017 Validating certificate extended key usage
  83. Mon Mar 13 00:18:32 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  84. Mon Mar 13 00:18:32 2017 VERIFY EKU OK
  85. Mon Mar 13 00:18:32 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
  86. Mon Mar 13 00:18:37 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  87. Mon Mar 13 00:18:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  88. Mon Mar 13 00:18:37 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  89. Mon Mar 13 00:18:37 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  90. Mon Mar 13 00:18:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  91. Mon Mar 13 00:18:37 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  92. Mon Mar 13 00:18:37 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  93. Mon Mar 13 00:20:17 2017 TLS: soft reset sec=3500 bytes=77108038/67108864 pkts=81969/0
  94. Mon Mar 13 00:20:17 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
  95. Mon Mar 13 00:20:17 2017 Validating certificate key usage
  96. Mon Mar 13 00:20:17 2017 ++ Certificate has key usage 00a0, expects 00a0
  97. Mon Mar 13 00:20:17 2017 VERIFY KU OK
  98. Mon Mar 13 00:20:17 2017 Validating certificate extended key usage
  99. Mon Mar 13 00:20:17 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  100. Mon Mar 13 00:20:17 2017 VERIFY EKU OK
  101. Mon Mar 13 00:20:17 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
  102. Mon Mar 13 00:20:22 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  103. Mon Mar 13 00:20:22 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  104. Mon Mar 13 00:20:22 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  105. Mon Mar 13 00:20:22 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  106. Mon Mar 13 00:20:22 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  107. Mon Mar 13 00:20:22 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  108. Mon Mar 13 00:20:22 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  109. Mon Mar 13 00:21:32 2017 TLS: soft reset sec=3530 bytes=73172538/67108864 pkts=75183/0
  110. Mon Mar 13 00:21:32 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
  111. Mon Mar 13 00:21:32 2017 Validating certificate key usage
  112. Mon Mar 13 00:21:32 2017 ++ Certificate has key usage 00a0, expects 00a0
  113. Mon Mar 13 00:21:32 2017 VERIFY KU OK
  114. Mon Mar 13 00:21:32 2017 Validating certificate extended key usage
  115. Mon Mar 13 00:21:32 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  116. Mon Mar 13 00:21:32 2017 VERIFY EKU OK
  117. Mon Mar 13 00:21:32 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
  118. Mon Mar 13 00:21:37 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  119. Mon Mar 13 00:21:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  120. Mon Mar 13 00:21:37 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  121. Mon Mar 13 00:21:37 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  122. Mon Mar 13 00:21:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  123. Mon Mar 13 00:21:37 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  124. Mon Mar 13 00:21:37 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  125. Mon Mar 13 00:22:48 2017 TLS: soft reset sec=3529 bytes=67594403/67108864 pkts=68308/0
  126. Mon Mar 13 00:22:57 2017 write TCP_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  127. Mon Mar 13 00:22:57 2017 write TCP_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  128. Mon Mar 13 00:22:57 2017 read TCP_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
  129. Mon Mar 13 00:22:57 2017 Connection reset, restarting [-1]
  130. Mon Mar 13 00:22:57 2017 SIGUSR1[soft,connection-reset] received, process restarting
  131. Mon Mar 13 00:22:57 2017 MANAGEMENT: >STATE:1489360977,RECONNECTING,connection-reset,,,,,
  132. Mon Mar 13 00:22:57 2017 Restart pause, 5 second(s)
  133. Mon Mar 13 00:23:02 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]185.112.156.60:443
  134. Mon Mar 13 00:23:02 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  135. Mon Mar 13 00:23:02 2017 Attempting to establish TCP connection with [AF_INET]185.112.156.60:443 [nonblock]
  136. Mon Mar 13 00:23:02 2017 MANAGEMENT: >STATE:1489360982,TCP_CONNECT,,,,,,
  137. Mon Mar 13 00:23:03 2017 TCP connection established with [AF_INET]185.112.156.60:443
  138. Mon Mar 13 00:23:03 2017 TCP_CLIENT link local: (not bound)
  139. Mon Mar 13 00:23:03 2017 TCP_CLIENT link remote: [AF_INET]185.112.156.60:443
  140. Mon Mar 13 00:23:03 2017 MANAGEMENT: >STATE:1489360983,WAIT,,,,,,
  141. Mon Mar 13 00:23:03 2017 MANAGEMENT: >STATE:1489360983,AUTH,,,,,,
  142. Mon Mar 13 00:23:03 2017 TLS: Initial packet from [AF_INET]185.112.156.60:443, sid=093e2fa2 ecaa394b
  143. Mon Mar 13 00:23:04 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
  144. Mon Mar 13 00:23:04 2017 Validating certificate key usage
  145. Mon Mar 13 00:23:04 2017 ++ Certificate has key usage 00a0, expects 00a0
  146. Mon Mar 13 00:23:04 2017 VERIFY KU OK
  147. Mon Mar 13 00:23:04 2017 Validating certificate extended key usage
  148. Mon Mar 13 00:23:04 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  149. Mon Mar 13 00:23:04 2017 VERIFY EKU OK
  150. Mon Mar 13 00:23:04 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
  151. Mon Mar 13 00:23:09 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  152. Mon Mar 13 00:23:09 2017 [csibvpn1] Peer Connection Initiated with [AF_INET]185.112.156.60:443
  153. Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
  154. Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
  155. Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
  156. Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
  157. Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
  158. Mon Mar 13 00:23:10 2017 MANAGEMENT: >STATE:1489360990,GET_CONFIG,,,,,,
  159. Mon Mar 13 00:23:10 2017 SENT CONTROL [csibvpn1]: 'PUSH_REQUEST' (status=1)
  160. Mon Mar 13 00:23:10 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 20,ping-restart 100,ifconfig 10.8.0.118 10.8.0.117'
  161. Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: timers and/or timeouts modified
  162. Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: --ifconfig/up options modified
  163. Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: route options modified
  164. Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  165. Mon Mar 13 00:23:10 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  166. Mon Mar 13 00:23:10 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  167. Mon Mar 13 00:23:10 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  168. Mon Mar 13 00:23:10 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  169. Mon Mar 13 00:23:10 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  170. Mon Mar 13 00:23:10 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  171. Mon Mar 13 00:23:10 2017 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
  172. Mon Mar 13 00:23:10 2017 Preserving previous TUN/TAP instance: Ethernet 2
  173. Mon Mar 13 00:23:10 2017 Initialization Sequence Completed
  174. Mon Mar 13 00:23:10 2017 MANAGEMENT: >STATE:1489360990,CONNECTED,SUCCESS,10.8.0.118,185.112.156.60,443,192.168.0.100,15559
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement