Advertisement
Guest User

Untitled

a guest
Dec 9th, 2015
88
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.18 KB | None | 0 0
  1. Wed Dec 9 18:57:48 2015 OpenVPN 2.3.8 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [MH] [IPv6] built on Oct 22 2015
  2. Wed Dec 9 18:57:48 2015 library versions: OpenSSL 1.0.2e 3 Dec 2015, LZO 2.09
  3. Wed Dec 9 18:57:48 2015 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  4. Wed Dec 9 18:57:48 2015 UDPv4 link local: [undef]
  5. Wed Dec 9 18:57:48 2015 UDPv4 link remote: [AF_INET]52.29.81.135:963
  6. Wed Dec 9 18:57:49 2015 VERIFY OK: depth=1, C=RU, ST=SP, L=St.Peterburg, O=Delf, CN=Delf CA, name=ServerRoot, emailAddress=pk.delf@gmail.com
  7. Wed Dec 9 18:57:49 2015 VERIFY OK: depth=0, C=RU, ST=SP, L=St.Peterburg, O=Delf, CN=amazonArch, name=EasyRSA, emailAddress=pk.delf@gmail.com
  8. Wed Dec 9 18:57:50 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  9. Wed Dec 9 18:57:50 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  10. Wed Dec 9 18:57:50 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  11. Wed Dec 9 18:57:50 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  12. Wed Dec 9 18:57:50 2015 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  13. Wed Dec 9 18:57:50 2015 [amazonArch] Peer Connection Initiated with [AF_INET]52.29.81.135:963
  14. Wed Dec 9 18:57:53 2015 TUN/TAP device tun0 opened
  15. Wed Dec 9 18:57:53 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  16. Wed Dec 9 18:57:53 2015 /usr/bin/ip link set dev tun0 up mtu 1500
  17. Wed Dec 9 18:57:53 2015 /usr/bin/ip addr add dev tun0 local 10.9.6.6 peer 10.9.6.5
  18. Wed Dec 9 18:57:53 2015 Initialization Sequence Completed
  19. Wed Dec 9 19:13:27 2015 [amazonArch] Inactivity timeout (--ping-restart), restarting
  20. Wed Dec 9 19:13:27 2015 SIGUSR1[soft,ping-restart] received, process restarting
  21. Wed Dec 9 19:13:29 2015 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  22. Wed Dec 9 19:13:29 2015 UDPv4 link local: [undef]
  23. Wed Dec 9 19:13:29 2015 UDPv4 link remote: [AF_INET]52.29.81.135:963
  24. Wed Dec 9 19:13:29 2015 write UDPv4: Network is unreachable (code=101)
  25. Wed Dec 9 19:13:32 2015 VERIFY OK: depth=1, C=RU, ST=SP, L=St.Peterburg, O=Delf, CN=Delf CA, name=ServerRoot, emailAddress=pk.delf@gmail.com
  26. Wed Dec 9 19:13:32 2015 VERIFY OK: depth=0, C=RU, ST=SP, L=St.Peterburg, O=Delf, CN=amazonArch, name=EasyRSA, emailAddress=pk.delf@gmail.com
  27. Wed Dec 9 19:13:33 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  28. Wed Dec 9 19:13:33 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  29. Wed Dec 9 19:13:33 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  30. Wed Dec 9 19:13:33 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  31. Wed Dec 9 19:13:33 2015 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  32. Wed Dec 9 19:13:33 2015 [amazonArch] Peer Connection Initiated with [AF_INET]52.29.81.135:963
  33. Wed Dec 9 19:13:35 2015 Preserving previous TUN/TAP instance: tun0
  34. Wed Dec 9 19:13:35 2015 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement