Advertisement
Guest User

Untitled

a guest
Nov 20th, 2017
80
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 34.19 KB | None | 0 0
  1. -- Logs begin at Wed 2017-11-01 23:10:51 EDT, end at Mon 2017-11-20 17:30:01 EST. --
  2. Nov 18 11:10:09 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  3. Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  4. Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  5. Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  6. Nov 18 11:10:09 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  7. Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  8. Nov 18 11:10:09 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:09 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  9. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  10. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 UDP link local: (not bound)
  11. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  12. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  13. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  14. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  15. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY KU OK
  16. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 Validating certificate extended key usage
  17. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  18. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY EKU OK
  19. Nov 18 11:10:10 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:10 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  20. Nov 18 11:10:11 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:11 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  21. Nov 18 11:10:11 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:11 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  22. Nov 18 11:10:12 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:12 2017 AUTH: Received control message: AUTH_FAILED
  23. Nov 18 11:10:12 localhost.localdomain openvpn[17427]: Sat Nov 18 11:10:12 2017 SIGTERM[soft,auth-failure] received, process exiting
  24. Nov 18 11:29:50 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  25. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  26. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  27. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  28. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  29. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  30. Nov 18 11:29:50 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  31. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  32. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 UDP link local: (not bound)
  33. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  34. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  35. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  36. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  37. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY KU OK
  38. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 Validating certificate extended key usage
  39. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  40. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY EKU OK
  41. Nov 18 11:29:50 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:50 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  42. Nov 18 11:29:52 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:52 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  43. Nov 18 11:29:52 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:52 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  44. Nov 18 11:29:53 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:53 2017 AUTH: Received control message: AUTH_FAILED
  45. Nov 18 11:29:53 localhost.localdomain openvpn[21515]: Sat Nov 18 11:29:53 2017 SIGTERM[soft,auth-failure] received, process exiting
  46. Nov 18 11:32:04 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  47. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  48. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  49. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  50. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  51. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  52. Nov 18 11:32:04 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  53. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  54. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 UDP link local: (not bound)
  55. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  56. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  57. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  58. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  59. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY KU OK
  60. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 Validating certificate extended key usage
  61. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  62. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY EKU OK
  63. Nov 18 11:32:04 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:04 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  64. Nov 18 11:32:05 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:05 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  65. Nov 18 11:32:05 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:05 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  66. Nov 18 11:32:07 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:07 2017 AUTH: Received control message: AUTH_FAILED
  67. Nov 18 11:32:07 localhost.localdomain openvpn[22200]: Sat Nov 18 11:32:07 2017 SIGTERM[soft,auth-failure] received, process exiting
  68. Nov 18 11:40:22 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  69. Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  70. Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  71. Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  72. Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  73. Nov 18 11:40:22 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:22 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  74. Nov 18 11:40:22 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  75. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  76. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 UDP link local: (not bound)
  77. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  78. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  79. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  80. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  81. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY KU OK
  82. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 Validating certificate extended key usage
  83. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  84. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY EKU OK
  85. Nov 18 11:40:23 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:23 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  86. Nov 18 11:40:25 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:25 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  87. Nov 18 11:40:25 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:25 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  88. Nov 18 11:40:26 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:26 2017 AUTH: Received control message: AUTH_FAILED
  89. Nov 18 11:40:26 localhost.localdomain openvpn[24143]: Sat Nov 18 11:40:26 2017 SIGTERM[soft,auth-failure] received, process exiting
  90. Nov 18 11:41:44 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  91. Nov 18 11:41:44 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  92. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  93. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  94. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  95. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  96. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  97. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  98. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 UDP link local: (not bound)
  99. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  100. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  101. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  102. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  103. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY KU OK
  104. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 Validating certificate extended key usage
  105. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  106. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY EKU OK
  107. Nov 18 11:41:44 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:44 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  108. Nov 18 11:41:46 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:46 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  109. Nov 18 11:41:46 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:46 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  110. Nov 18 11:41:47 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:47 2017 AUTH: Received control message: AUTH_FAILED
  111. Nov 18 11:41:47 localhost.localdomain openvpn[24460]: Sat Nov 18 11:41:47 2017 SIGTERM[soft,auth-failure] received, process exiting
  112. Nov 18 11:49:19 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  113. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  114. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  115. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  116. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  117. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  118. Nov 18 11:49:19 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  119. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  120. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 UDP link local: (not bound)
  121. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  122. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  123. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  124. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  125. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY KU OK
  126. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 Validating certificate extended key usage
  127. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  128. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY EKU OK
  129. Nov 18 11:49:19 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:19 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  130. Nov 18 11:49:20 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:20 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  131. Nov 18 11:49:20 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:20 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  132. Nov 18 11:49:21 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:21 2017 AUTH: Received control message: AUTH_FAILED
  133. Nov 18 11:49:21 localhost.localdomain openvpn[25946]: Sat Nov 18 11:49:21 2017 SIGTERM[soft,auth-failure] received, process exiting
  134. Nov 18 11:50:00 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  135. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  136. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  137. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  138. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  139. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  140. Nov 18 11:50:00 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  141. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  142. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 UDP link local: (not bound)
  143. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  144. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  145. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  146. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  147. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY KU OK
  148. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 Validating certificate extended key usage
  149. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  150. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY EKU OK
  151. Nov 18 11:50:00 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:00 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  152. Nov 18 11:50:01 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:01 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  153. Nov 18 11:50:01 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:01 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  154. Nov 18 11:50:02 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:02 2017 AUTH: Received control message: AUTH_FAILED
  155. Nov 18 11:50:02 localhost.localdomain openvpn[26163]: Sat Nov 18 11:50:02 2017 SIGTERM[soft,auth-failure] received, process exiting
  156. Nov 18 11:53:21 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  157. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  158. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  159. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  160. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  161. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  162. Nov 18 11:53:21 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  163. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  164. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 UDP link local: (not bound)
  165. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  166. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  167. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  168. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  169. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY KU OK
  170. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 Validating certificate extended key usage
  171. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  172. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY EKU OK
  173. Nov 18 11:53:21 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:21 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  174. Nov 18 11:53:23 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:23 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  175. Nov 18 11:53:23 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:23 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  176. Nov 18 11:53:24 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:24 2017 AUTH: Received control message: AUTH_FAILED
  177. Nov 18 11:53:24 localhost.localdomain openvpn[26869]: Sat Nov 18 11:53:24 2017 SIGTERM[soft,auth-failure] received, process exiting
  178. Nov 18 11:53:50 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  179. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  180. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  181. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  182. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  183. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  184. Nov 18 11:53:50 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  185. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  186. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 UDP link local: (not bound)
  187. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  188. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  189. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  190. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  191. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY KU OK
  192. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 Validating certificate extended key usage
  193. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  194. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY EKU OK
  195. Nov 18 11:53:50 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:50 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  196. Nov 18 11:53:52 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:52 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  197. Nov 18 11:53:52 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:52 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  198. Nov 18 11:53:53 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:53 2017 AUTH: Received control message: AUTH_FAILED
  199. Nov 18 11:53:53 localhost.localdomain openvpn[27028]: Sat Nov 18 11:53:53 2017 SIGTERM[soft,auth-failure] received, process exiting
  200. Nov 18 11:56:25 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  201. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  202. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  203. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  204. Nov 18 11:56:25 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  205. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  206. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  207. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  208. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 UDP link local: (not bound)
  209. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  210. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  211. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  212. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  213. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY KU OK
  214. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 Validating certificate extended key usage
  215. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  216. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY EKU OK
  217. Nov 18 11:56:25 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:25 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  218. Nov 18 11:56:26 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:26 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  219. Nov 18 11:56:26 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:26 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  220. Nov 18 11:56:27 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:27 2017 AUTH: Received control message: AUTH_FAILED
  221. Nov 18 11:56:27 localhost.localdomain openvpn[27592]: Sat Nov 18 11:56:27 2017 SIGTERM[soft,auth-failure] received, process exiting
  222. Nov 18 11:59:29 localhost.localdomain systemd[1]: Starting OpenVPN Robust And Highly Flexible Tunneling Application On sepia...
  223. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 WARNING: file 'sepia/tlsauth' is group or others accessible
  224. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 OpenVPN 2.4.4 x86_64-redhat-linux-gnu [Fedora EPEL patched] [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 26 2017
  225. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 library versions: OpenSSL 1.0.2k-fips 26 Jan 2017, LZO 2.06
  226. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  227. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  228. Nov 18 11:59:29 localhost.localdomain systemd[1]: Started OpenVPN Robust And Highly Flexible Tunneling Application On sepia.
  229. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]8.43.84.129:1194
  230. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 UDP link local: (not bound)
  231. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 UDP link remote: [AF_INET]8.43.84.129:1194
  232. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  233. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  234. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY OK: depth=1, O=Redhat, CN=openvpnca-sepia
  235. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY KU OK
  236. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 Validating certificate extended key usage
  237. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  238. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY EKU OK
  239. Nov 18 11:59:29 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:29 2017 VERIFY OK: depth=0, O=Redhat, CN=openvpn-sepia
  240. Nov 18 11:59:31 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:31 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2432 bit RSA
  241. Nov 18 11:59:31 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:31 2017 [openvpn-sepia] Peer Connection Initiated with [AF_INET]8.43.84.129:1194
  242. Nov 18 11:59:32 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:32 2017 AUTH: Received control message: AUTH_FAILED
  243. Nov 18 11:59:32 localhost.localdomain openvpn[28311]: Sat Nov 18 11:59:32 2017 SIGTERM[soft,auth-failure] received, process exiting
  244. [yaarit@localhost src]$
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement