Advertisement
Guest User

Untitled

a guest
Jul 17th, 2019
95
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.57 KB | None | 0 0
  1. Thu Jul 18 00:15:17 2019 Unrecognized option or missing or extra parameter(s) in client.ovpn:14: block-outside-dns (2.4.4)
  2. Thu Jul 18 00:15:17 2019 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019
  3. Thu Jul 18 00:15:17 2019 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.08
  4. Thu Jul 18 00:15:17 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  5. Thu Jul 18 00:15:17 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  6. Thu Jul 18 00:15:17 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]178.46.161.246:1723
  7. Thu Jul 18 00:15:17 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
  8. Thu Jul 18 00:15:17 2019 UDP link local: (not bound)
  9. Thu Jul 18 00:15:17 2019 UDP link remote: [AF_INET]178.46.161.246:1723
  10. Thu Jul 18 00:15:17 2019 TLS: Initial packet from [AF_INET]178.46.161.246:1723, sid=6ccb3f74 63ad1ae3
  11. Thu Jul 18 00:15:17 2019 VERIFY OK: depth=1, CN=ChangeMe
  12. Thu Jul 18 00:15:17 2019 VERIFY KU OK
  13. Thu Jul 18 00:15:17 2019 Validating certificate extended key usage
  14. Thu Jul 18 00:15:17 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  15. Thu Jul 18 00:15:17 2019 VERIFY EKU OK
  16. Thu Jul 18 00:15:17 2019 VERIFY OK: depth=0, CN=server
  17. Thu Jul 18 00:15:17 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  18. Thu Jul 18 00:15:17 2019 [server] Peer Connection Initiated with [AF_INET]178.46.161.246:1723
  19. Thu Jul 18 00:15:18 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  20. Thu Jul 18 00:15:18 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 192.168.0.1,dhcp-option DNS 8.8.8.8,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  21. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: timers and/or timeouts modified
  22. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: --ifconfig/up options modified
  23. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: route options modified
  24. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: route-related options modified
  25. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  26. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: peer-id set
  27. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: adjusting link_mtu to 1624
  28. Thu Jul 18 00:15:18 2019 OPTIONS IMPORT: data channel crypto options modified
  29. Thu Jul 18 00:15:18 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  30. Thu Jul 18 00:15:18 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  31. Thu Jul 18 00:15:18 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  32. Thu Jul 18 00:15:18 2019 ROUTE_GATEWAY 10.0.0.1/255.255.255.0 IFACE=enp1s0 HWADDR=40:b0:34:6e:9f:67
  33. Thu Jul 18 00:15:18 2019 TUN/TAP device tun1 opened
  34. Thu Jul 18 00:15:18 2019 TUN/TAP TX queue length set to 100
  35. Thu Jul 18 00:15:18 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  36. Thu Jul 18 00:15:18 2019 /sbin/ip link set dev tun1 up mtu 1500
  37. Thu Jul 18 00:15:18 2019 /sbin/ip addr add dev tun1 10.8.0.2/24 broadcast 10.8.0.255
  38. Thu Jul 18 00:15:18 2019 /sbin/ip route add 178.46.161.246/32 via 10.0.0.1
  39. Thu Jul 18 00:15:18 2019 /sbin/ip route add 0.0.0.0/1 via 10.8.0.1
  40. Thu Jul 18 00:15:18 2019 /sbin/ip route add 128.0.0.0/1 via 10.8.0.1
  41. Thu Jul 18 00:15:18 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  42. Thu Jul 18 00:15:18 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement