Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Mon Mar 13 00:17:13 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
- Mon Mar 13 00:17:13 2017 Windows version 6.2 (Windows 8 or greater) 64bit
- Mon Mar 13 00:17:13 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
- Mon Mar 13 00:17:13 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Mon Mar 13 00:17:13 2017 Need hold release from management interface, waiting...
- Mon Mar 13 00:17:14 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'state on'
- Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'log all on'
- Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'hold off'
- Mon Mar 13 00:17:14 2017 MANAGEMENT: CMD 'hold release'
- Mon Mar 13 00:17:16 2017 MANAGEMENT: CMD 'username "Auth" "Nevermind5214"'
- Mon Mar 13 00:17:16 2017 MANAGEMENT: CMD 'password [...]'
- Mon Mar 13 00:17:16 2017 Initializing OpenSSL support for engine 'dynamic'
- Mon Mar 13 00:17:16 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:17:16 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:17:16 2017 MANAGEMENT: >STATE:1489360636,RESOLVE,,,,,,
- Mon Mar 13 00:17:16 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]185.112.156.60:443
- Mon Mar 13 00:17:16 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon Mar 13 00:17:16 2017 Attempting to establish TCP connection with [AF_INET]185.112.156.60:443 [nonblock]
- Mon Mar 13 00:17:16 2017 MANAGEMENT: >STATE:1489360636,TCP_CONNECT,,,,,,
- Mon Mar 13 00:17:17 2017 TCP connection established with [AF_INET]185.112.156.60:443
- Mon Mar 13 00:17:17 2017 TCP_CLIENT link local: (not bound)
- Mon Mar 13 00:17:17 2017 TCP_CLIENT link remote: [AF_INET]185.112.156.60:443
- Mon Mar 13 00:17:17 2017 MANAGEMENT: >STATE:1489360637,WAIT,,,,,,
- Mon Mar 13 00:17:17 2017 MANAGEMENT: >STATE:1489360637,AUTH,,,,,,
- Mon Mar 13 00:17:17 2017 TLS: Initial packet from [AF_INET]185.112.156.60:443, sid=f899d1ac b90c0edb
- Mon Mar 13 00:17:17 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Mon Mar 13 00:17:17 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:17:17 2017 Validating certificate key usage
- Mon Mar 13 00:17:17 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon Mar 13 00:17:17 2017 VERIFY KU OK
- Mon Mar 13 00:17:17 2017 Validating certificate extended key usage
- Mon Mar 13 00:17:17 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Mar 13 00:17:17 2017 VERIFY EKU OK
- Mon Mar 13 00:17:17 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:17:22 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Mar 13 00:17:22 2017 [csibvpn1] Peer Connection Initiated with [AF_INET]185.112.156.60:443
- Mon Mar 13 00:17:24 2017 MANAGEMENT: >STATE:1489360644,GET_CONFIG,,,,,,
- Mon Mar 13 00:17:24 2017 SENT CONTROL [csibvpn1]: 'PUSH_REQUEST' (status=1)
- Mon Mar 13 00:17:24 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 20,ping-restart 100,ifconfig 10.8.0.118 10.8.0.117'
- Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: route options modified
- Mon Mar 13 00:17:24 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Mar 13 00:17:24 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:17:24 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:17:24 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:17:24 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:17:24 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:17:24 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:17:24 2017 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
- Mon Mar 13 00:17:24 2017 interactive service msg_channel=0
- Mon Mar 13 00:17:24 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=11 HWADDR=74:d4:35:0f:d1:4b
- Mon Mar 13 00:17:24 2017 open_tun
- Mon Mar 13 00:17:24 2017 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5C96E1BE-1B42-4E42-92A1-373A13A5F2DB}.tap
- Mon Mar 13 00:17:24 2017 TAP-Windows Driver Version 9.21
- Mon Mar 13 00:17:24 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.118/255.255.255.252 on interface {5C96E1BE-1B42-4E42-92A1-373A13A5F2DB} [DHCP-serv: 10.8.0.117, lease-time: 31536000]
- Mon Mar 13 00:17:24 2017 Successful ARP Flush on interface [19] {5C96E1BE-1B42-4E42-92A1-373A13A5F2DB}
- Mon Mar 13 00:17:24 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon Mar 13 00:17:24 2017 MANAGEMENT: >STATE:1489360644,ASSIGN_IP,,10.8.0.118,,,,
- Mon Mar 13 00:17:29 2017 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 185.112.156.60 MASK 255.255.255.255 192.168.0.1
- Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
- Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.117
- Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
- Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.117
- Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
- Mon Mar 13 00:17:29 2017 MANAGEMENT: >STATE:1489360649,ADD_ROUTES,,,,,,
- Mon Mar 13 00:17:29 2017 C:\WINDOWS\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.117
- Mon Mar 13 00:17:29 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon Mar 13 00:17:29 2017 Route addition via IPAPI succeeded [adaptive]
- Mon Mar 13 00:17:29 2017 Initialization Sequence Completed
- Mon Mar 13 00:17:29 2017 MANAGEMENT: >STATE:1489360649,CONNECTED,SUCCESS,10.8.0.118,185.112.156.60,443,192.168.0.100,15163
- Mon Mar 13 00:18:32 2017 TLS: soft reset sec=3530 bytes=67353042/67108864 pkts=77676/0
- Mon Mar 13 00:18:32 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:18:32 2017 Validating certificate key usage
- Mon Mar 13 00:18:32 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon Mar 13 00:18:32 2017 VERIFY KU OK
- Mon Mar 13 00:18:32 2017 Validating certificate extended key usage
- Mon Mar 13 00:18:32 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Mar 13 00:18:32 2017 VERIFY EKU OK
- Mon Mar 13 00:18:32 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:18:37 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:18:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:18:37 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:18:37 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:18:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:18:37 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:18:37 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Mar 13 00:20:17 2017 TLS: soft reset sec=3500 bytes=77108038/67108864 pkts=81969/0
- Mon Mar 13 00:20:17 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:20:17 2017 Validating certificate key usage
- Mon Mar 13 00:20:17 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon Mar 13 00:20:17 2017 VERIFY KU OK
- Mon Mar 13 00:20:17 2017 Validating certificate extended key usage
- Mon Mar 13 00:20:17 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Mar 13 00:20:17 2017 VERIFY EKU OK
- Mon Mar 13 00:20:17 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:20:22 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:20:22 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:20:22 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:20:22 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:20:22 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:20:22 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:20:22 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Mar 13 00:21:32 2017 TLS: soft reset sec=3530 bytes=73172538/67108864 pkts=75183/0
- Mon Mar 13 00:21:32 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:21:32 2017 Validating certificate key usage
- Mon Mar 13 00:21:32 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon Mar 13 00:21:32 2017 VERIFY KU OK
- Mon Mar 13 00:21:32 2017 Validating certificate extended key usage
- Mon Mar 13 00:21:32 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Mar 13 00:21:32 2017 VERIFY EKU OK
- Mon Mar 13 00:21:32 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:21:37 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:21:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:21:37 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:21:37 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:21:37 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:21:37 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:21:37 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Mar 13 00:22:48 2017 TLS: soft reset sec=3529 bytes=67594403/67108864 pkts=68308/0
- Mon Mar 13 00:22:57 2017 write TCP_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Mon Mar 13 00:22:57 2017 write TCP_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Mon Mar 13 00:22:57 2017 read TCP_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
- Mon Mar 13 00:22:57 2017 Connection reset, restarting [-1]
- Mon Mar 13 00:22:57 2017 SIGUSR1[soft,connection-reset] received, process restarting
- Mon Mar 13 00:22:57 2017 MANAGEMENT: >STATE:1489360977,RECONNECTING,connection-reset,,,,,
- Mon Mar 13 00:22:57 2017 Restart pause, 5 second(s)
- Mon Mar 13 00:23:02 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]185.112.156.60:443
- Mon Mar 13 00:23:02 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon Mar 13 00:23:02 2017 Attempting to establish TCP connection with [AF_INET]185.112.156.60:443 [nonblock]
- Mon Mar 13 00:23:02 2017 MANAGEMENT: >STATE:1489360982,TCP_CONNECT,,,,,,
- Mon Mar 13 00:23:03 2017 TCP connection established with [AF_INET]185.112.156.60:443
- Mon Mar 13 00:23:03 2017 TCP_CLIENT link local: (not bound)
- Mon Mar 13 00:23:03 2017 TCP_CLIENT link remote: [AF_INET]185.112.156.60:443
- Mon Mar 13 00:23:03 2017 MANAGEMENT: >STATE:1489360983,WAIT,,,,,,
- Mon Mar 13 00:23:03 2017 MANAGEMENT: >STATE:1489360983,AUTH,,,,,,
- Mon Mar 13 00:23:03 2017 TLS: Initial packet from [AF_INET]185.112.156.60:443, sid=093e2fa2 ecaa394b
- Mon Mar 13 00:23:04 2017 VERIFY OK: depth=1, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:23:04 2017 Validating certificate key usage
- Mon Mar 13 00:23:04 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon Mar 13 00:23:04 2017 VERIFY KU OK
- Mon Mar 13 00:23:04 2017 Validating certificate extended key usage
- Mon Mar 13 00:23:04 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Mar 13 00:23:04 2017 VERIFY EKU OK
- Mon Mar 13 00:23:04 2017 VERIFY OK: depth=0, C=HU, ST=HU, L=csibvpn, O=csibvpn, OU=csibvpn, CN=csibvpn1, name=csibvpn, emailAddress=info@csibvpn.hu
- Mon Mar 13 00:23:09 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Mon Mar 13 00:23:09 2017 [csibvpn1] Peer Connection Initiated with [AF_INET]185.112.156.60:443
- Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
- Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
- Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
- Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
- Mon Mar 13 00:23:09 2017 Key [AF_INET]185.112.156.60:443 [0] not initialized (yet), dropping packet.
- Mon Mar 13 00:23:10 2017 MANAGEMENT: >STATE:1489360990,GET_CONFIG,,,,,,
- Mon Mar 13 00:23:10 2017 SENT CONTROL [csibvpn1]: 'PUSH_REQUEST' (status=1)
- Mon Mar 13 00:23:10 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 20,ping-restart 100,ifconfig 10.8.0.118 10.8.0.117'
- Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: route options modified
- Mon Mar 13 00:23:10 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Mar 13 00:23:10 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:23:10 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:23:10 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:23:10 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Mon Mar 13 00:23:10 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Mon Mar 13 00:23:10 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Mon Mar 13 00:23:10 2017 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
- Mon Mar 13 00:23:10 2017 Preserving previous TUN/TAP instance: Ethernet 2
- Mon Mar 13 00:23:10 2017 Initialization Sequence Completed
- Mon Mar 13 00:23:10 2017 MANAGEMENT: >STATE:1489360990,CONNECTED,SUCCESS,10.8.0.118,185.112.156.60,443,192.168.0.100,15559
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement