Advertisement
Guest User

OpenVPN log

a guest
Apr 28th, 2018
70
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.49 KB | None | 0 0
  1. Sat Apr 28 22:57:00 2018 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2018
  2. Sat Apr 28 22:57:00 2018 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  3. Sat Apr 28 22:57:00 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  4. Sat Apr 28 22:57:03 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  5. Sat Apr 28 22:57:03 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]{Server IP}:1194
  6. Sat Apr 28 22:57:03 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
  7. Sat Apr 28 22:57:03 2018 UDP link local: (not bound)
  8. Sat Apr 28 22:57:03 2018 UDP link remote: [AF_INET]{Server IP}:1194
  9. Sat Apr 28 22:57:03 2018 TLS: Initial packet from [AF_INET]{Server IP}:1194, sid=03827789 88708f23
  10. Sat Apr 28 22:57:03 2018 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
  11. Sat Apr 28 22:57:03 2018 VERIFY OK: nsCertType=SERVER
  12. Sat Apr 28 22:57:03 2018 VERIFY KU OK
  13. Sat Apr 28 22:57:03 2018 Validating certificate extended key usage
  14. Sat Apr 28 22:57:03 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  15. Sat Apr 28 22:57:03 2018 VERIFY EKU OK
  16. Sat Apr 28 22:57:03 2018 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
  17. Sat Apr 28 22:57:04 2018 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  18. Sat Apr 28 22:57:04 2018 [changeme] Peer Connection Initiated with [AF_INET]{Server IP}:1194
  19. Sat Apr 28 22:57:05 2018 SENT CONTROL [changeme]: 'PUSH_REQUEST' (status=1)
  20. Sat Apr 28 22:57:05 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
  21. Sat Apr 28 22:57:05 2018 OPTIONS IMPORT: timers and/or timeouts modified
  22. Sat Apr 28 22:57:05 2018 OPTIONS IMPORT: --ifconfig/up options modified
  23. Sat Apr 28 22:57:05 2018 OPTIONS IMPORT: route options modified
  24. Sat Apr 28 22:57:05 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  25. Sat Apr 28 22:57:05 2018 Outgoing Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
  26. Sat Apr 28 22:57:05 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  27. Sat Apr 28 22:57:05 2018 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  28. Sat Apr 28 22:57:05 2018 Incoming Data Channel: Cipher 'BF-CBC' initialized with 128 bit key
  29. Sat Apr 28 22:57:05 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  30. Sat Apr 28 22:57:05 2018 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
  31. Sat Apr 28 22:57:05 2018 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
  32. Sat Apr 28 22:57:05 2018 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 IFACE=enp5s0 HWADDR=4c:cc:6a:0d:2f:3e
  33. Sat Apr 28 22:57:05 2018 TUN/TAP device tun0 opened
  34. Sat Apr 28 22:57:05 2018 TUN/TAP TX queue length set to 100
  35. Sat Apr 28 22:57:05 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  36. Sat Apr 28 22:57:05 2018 /usr/bin/ip link set dev tun0 up mtu 1500
  37. Sat Apr 28 22:57:05 2018 /usr/bin/ip addr add dev tun0 local 10.8.0.6 peer 10.8.0.5
  38. Sat Apr 28 22:57:05 2018 /usr/bin/ip route add {Server IP}/32 via 192.168.2.1
  39. Sat Apr 28 22:57:05 2018 /usr/bin/ip route add 0.0.0.0/1 via 10.8.0.5
  40. Sat Apr 28 22:57:05 2018 /usr/bin/ip route add 128.0.0.0/1 via 10.8.0.5
  41. Sat Apr 28 22:57:05 2018 /usr/bin/ip route add 10.8.0.1/32 via 10.8.0.5
  42. Sat Apr 28 22:57:05 2018 Initialization Sequence Completed
  43. # Then I pressed CTRL+C
  44. Sat Apr 28 22:57:25 2018 event_wait : Interrupted system call (code=4)
  45. Sat Apr 28 22:57:25 2018 /usr/bin/ip route del 10.8.0.1/32
  46. Sat Apr 28 22:57:25 2018 /usr/bin/ip route del {Server IP}/32
  47. Sat Apr 28 22:57:25 2018 /usr/bin/ip route del 0.0.0.0/1
  48. Sat Apr 28 22:57:25 2018 /usr/bin/ip route del 128.0.0.0/1
  49. Sat Apr 28 22:57:25 2018 Closing TUN/TAP interface
  50. Sat Apr 28 22:57:25 2018 /usr/bin/ip addr del dev tun0 local 10.8.0.6 peer 10.8.0.5
  51. Sat Apr 28 22:57:25 2018 SIGINT[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement