Advertisement
Guest User

Untitled

a guest
Apr 7th, 2020
298
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.77 KB | None | 0 0
  1. [root@ovpn ~]# tail -f /var/log/openvpn.log
  2. Wed Apr 8 10:40:27 2020 94.*.*.*:57465 TLS: Initial packet from [AF_INET]94.*.*.*:57465, sid=b3cfa253 7ff16f06
  3. Wed Apr 8 10:40:27 2020 94.*.*.*:57465 WARNING: Failed to stat CRL file, not (re)loading CRL.
  4. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 VERIFY OK: depth=1, CN=Easy-RSA CA
  5. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 VERIFY OK: depth=0, CN=notebook
  6. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_VER=2.4.8
  7. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_PLAT=win
  8. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_PROTO=2
  9. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_NCP=2
  10. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_LZ4=1
  11. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_LZ4v2=1
  12. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_LZO=1
  13. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_COMP_STUB=1
  14. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_COMP_STUBv2=1
  15. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_TCPNL=1
  16. Wed Apr 8 10:40:29 2020 94.*.*.*:57465 peer info: IV_GUI_VER=OpenVPN_GUI_11
  17. Wed Apr 8 10:40:30 2020 94.*.*.*:57465 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  18. Wed Apr 8 10:40:30 2020 94.*.*.*:57465 [notebook] Peer Connection Initiated with [AF_INET]94.*.*.*:57465
  19. Wed Apr 8 10:40:30 2020 notebook/94.*.*.*:57465 MULTI_sva: pool returned IPv4=15.10.2.14, IPv6=(Not enabled)
  20. Wed Apr 8 10:40:30 2020 notebook/94.*.*.*:57465 MULTI: Learn: 15.10.2.14 -> notebook/94.*.*.*:57465
  21. Wed Apr 8 10:40:30 2020 notebook/94.*.*.*:57465 MULTI: primary virtual IP for notebook/94.*.*.*:57465: 15.10.2.14
  22. Wed Apr 8 10:40:31 2020 notebook/94.*.*.*:57465 PUSH: Received control message: 'PUSH_REQUEST'
  23. Wed Apr 8 10:40:31 2020 notebook/94.*.*.*:57465 SENT CONTROL [notebook]: 'PUSH_REPLY,route 15.10.2.0 255.255.255.0,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 15.10.2.1,dhcp-option DNS 77.88.8.8,dhcp-option DNS 8.8.4.4,route 15.10.2.1,topology net30,ping 20,ping-restart 60,ifconfig 15.10.2.14 15.10.2.13,peer-id 2,cipher AES-256-GCM' (status=1)
  24. Wed Apr 8 10:40:31 2020 notebook/94.*.*.*:57465 Data Channel: using negotiated cipher 'AES-256-GCM'
  25. Wed Apr 8 10:40:31 2020 notebook/94.*.*.*:57465 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  26. Wed Apr 8 10:40:31 2020 notebook/94.*.*.*:57465 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  27. Wed Apr 8 10:40:34 2020 109.*.*.*:59241 TLS: Initial packet from [AF_INET]109.*.*.*:59241, sid=c72b5fea 847c58f2
  28. Wed Apr 8 10:40:34 2020 109.*.*.*:59241 WARNING: Failed to stat CRL file, not (re)loading CRL.
  29. Wed Apr 8 10:40:36 2020 109.*.*.*:59241 VERIFY OK: depth=1, CN=Easy-RSA CA
  30. Wed Apr 8 10:40:36 2020 109.*.*.*:59241 VERIFY OK: depth=0, CN=term
  31. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_VER=2.4.8
  32. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_PLAT=win
  33. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_PROTO=2
  34. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_NCP=2
  35. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_LZ4=1
  36. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_LZ4v2=1
  37. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_LZO=1
  38. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_COMP_STUB=1
  39. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_COMP_STUBv2=1
  40. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_TCPNL=1
  41. Wed Apr 8 10:40:37 2020 109.*.*.*:59241 peer info: IV_GUI_VER=OpenVPN_GUI_11
  42. Wed Apr 8 10:40:38 2020 109.*.*.*:59241 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  43. Wed Apr 8 10:40:38 2020 109.*.*.*:59241 [term] Peer Connection Initiated with [AF_INET]109.*.*.*:59241
  44. Wed Apr 8 10:40:38 2020 term/109.*.*.*:59241 MULTI_sva: pool returned IPv4=15.10.2.18, IPv6=(Not enabled)
  45. Wed Apr 8 10:40:38 2020 term/109.*.*.*:59241 MULTI: Learn: 15.10.2.18 -> term/109.*.*.*:59241
  46. Wed Apr 8 10:40:38 2020 term/109.*.*.*:59241 MULTI: primary virtual IP for term/109.*.*.*:59241: 15.10.2.18
  47. Wed Apr 8 10:40:39 2020 term/109.*.*.*:59241 PUSH: Received control message: 'PUSH_REQUEST'
  48. Wed Apr 8 10:40:39 2020 term/109.*.*.*:59241 SENT CONTROL [term]: 'PUSH_REPLY,route 15.10.2.0 255.255.255.0,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 15.10.2.1,dhcp-option DNS 77.88.8.8,dhcp-option DNS 8.8.4.4,route 15.10.2.1,topology net30,ping 20,ping-restart 60,ifconfig 15.10.2.18 15.10.2.17,peer-id 3,cipher AES-256-GCM' (status=1)
  49. Wed Apr 8 10:40:39 2020 term/109.*.*.*:59241 Data Channel: using negotiated cipher 'AES-256-GCM'
  50. Wed Apr 8 10:40:39 2020 term/109.*.*.*:59241 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  51. Wed Apr 8 10:40:39 2020 term/109.*.*.*:59241 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement