Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- -- Logs begin at Wed 2017-11-01 23:10:51 EDT, end at Mon 2017-11-20 17:30:01 EST. --
- Nov 18 11:10:09 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:10:09 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 UDP link local: (not bound)
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY KU OK
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 Validating certificate extended key usage
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY EKU OK
- Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:10:11 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:11 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:10:11 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:11 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:10:12 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:12 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:10:12 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:12 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:29:50 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:29:50 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 UDP link local: (not bound)
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY KU OK
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 Validating certificate extended key usage
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY EKU OK
- Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:29:52 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:52 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:29:52 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:52 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:29:53 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:53 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:29:53 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:53 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:32:04 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:32:04 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 UDP link local: (not bound)
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY KU OK
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 Validating certificate extended key usage
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY EKU OK
- Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:32:05 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:05 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:32:05 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:05 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:32:07 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:07 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:32:07 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:07 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:40:22 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:40:22 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 UDP link local: (not bound)
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY KU OK
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 Validating certificate extended key usage
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY EKU OK
- Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:40:25 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:25 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:40:25 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:25 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:40:26 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:26 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:40:26 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:26 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:41:44 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:41:44 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 UDP link local: (not bound)
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY KU OK
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 Validating certificate extended key usage
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY EKU OK
- Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:41:46 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:46 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:41:46 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:46 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:41:47 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:47 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:41:47 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:47 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:49:19 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:49:19 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 UDP link local: (not bound)
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY KU OK
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 Validating certificate extended key usage
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY EKU OK
- Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:49:20 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:20 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:49:20 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:20 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:49:21 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:21 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:49:21 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:21 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:50:00 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:50:00 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 UDP link local: (not bound)
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY KU OK
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 Validating certificate extended key usage
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY EKU OK
- Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:50:01 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:01 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:50:01 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:01 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:50:02 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:02 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:50:02 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:02 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:53:21 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:53:21 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 UDP link local: (not bound)
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY KU OK
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 Validating certificate extended key usage
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY EKU OK
- Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:53:23 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:23 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:53:23 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:23 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:53:24 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:24 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:53:24 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:24 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:53:50 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:53:50 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 UDP link local: (not bound)
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY KU OK
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 Validating certificate extended key usage
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY EKU OK
- Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:53:52 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:52 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:53:52 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:52 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:53:53 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:53 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:53:53 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:53 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:56:25 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:56:25 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 UDP link local: (not bound)
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY KU OK
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 Validating certificate extended key usage
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY EKU OK
- Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:56:26 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:26 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:56:26 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:26 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:56:27 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:27 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:56:27 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:27 2017 SIGTERM[soft,auth-failure] received, process exiting
- Nov 18 11:59:29 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Nov 18 11:59:29 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 UDP link local: (not bound)
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 UDP link remote: [AF_INET]8.43.84.129:1194
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY KU OK
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 Validating certificate extended key usage
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY EKU OK
- Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
- Nov 18 11:59:31 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:31 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
- Nov 18 11:59:31 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:31 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
- Nov 18 11:59:32 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:32 2017 AUTH: Received control message: AUTH_FAILED
- Nov 18 11:59:32 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:32 2017 SIGTERM[soft,auth-failure] received, process exiting
- [yaarit@localhost src]$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement