Advertisement
Guest User

Example 2 of broken windows openvpn connection

a guest
Mar 19th, 2019
120
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.26 KB | None | 0 0
  1. Tue Mar 19 18:16:13 2019 OpenVPN 2.4.6 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 24 2018
  2. Tue Mar 19 18:16:13 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  3. Tue Mar 19 18:16:13 2019 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  4. Tue Mar 19 18:16:13 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:56246
  5. Tue Mar 19 18:16:13 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.149.130:1195
  6. Tue Mar 19 18:16:13 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  7. Tue Mar 19 18:16:13 2019 Attempting to establish TCP connection with [AF_INET]37.120.149.130:1195 [nonblock]
  8. Tue Mar 19 18:16:14 2019 TCP connection established with [AF_INET]37.120.149.130:1195
  9. Tue Mar 19 18:16:14 2019 TCP_CLIENT link local: (not bound)
  10. Tue Mar 19 18:16:14 2019 TCP_CLIENT link remote: [AF_INET]37.120.149.130:1195
  11. Tue Mar 19 18:16:14 2019 TLS: Initial packet from [AF_INET]37.120.149.130:1195, sid=b8512a6d 805888be
  12. Tue Mar 19 18:16:14 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  13. Tue Mar 19 18:16:15 2019 VERIFY OK: depth=1, CN=ChangeMe
  14. Tue Mar 19 18:16:15 2019 VERIFY KU OK
  15. Tue Mar 19 18:16:15 2019 Validating certificate extended key usage
  16. Tue Mar 19 18:16:15 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  17. Tue Mar 19 18:16:15 2019 VERIFY EKU OK
  18. Tue Mar 19 18:16:15 2019 VERIFY OK: depth=0, CN=server
  19. Tue Mar 19 18:16:16 2019 Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  20. Tue Mar 19 18:16:16 2019 [server] Peer Connection Initiated with [AF_INET]37.120.149.130:1195
  21. Tue Mar 19 18:16:17 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  22. Tue Mar 19 18:16:18 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.8.1.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.1.3 255.255.255.0'
  23. Tue Mar 19 18:16:18 2019 OPTIONS IMPORT: timers and/or timeouts modified
  24. Tue Mar 19 18:16:18 2019 OPTIONS IMPORT: --ifconfig/up options modified
  25. Tue Mar 19 18:16:18 2019 OPTIONS IMPORT: route options modified
  26. Tue Mar 19 18:16:18 2019 OPTIONS IMPORT: route-related options modified
  27. Tue Mar 19 18:16:18 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  28. Tue Mar 19 18:16:18 2019 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  29. Tue Mar 19 18:16:18 2019 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  30. Tue Mar 19 18:16:18 2019 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  31. Tue Mar 19 18:16:18 2019 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication
  32. Tue Mar 19 18:16:18 2019 interactive service msg_channel=0
  33. Tue Mar 19 18:16:18 2019 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=13 HWADDR=c4:9d:ed:19:c2:3d
  34. Tue Mar 19 18:16:18 2019 open_tun
  35. Tue Mar 19 18:16:18 2019 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{FB2F1F54-A837-493F-A5DD-D745646F19A0}.tap
  36. Tue Mar 19 18:16:18 2019 TAP-Windows Driver Version 9.21
  37. Tue Mar 19 18:16:18 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.1.0/10.8.1.3/255.255.255.0 [SUCCEEDED]
  38. Tue Mar 19 18:16:18 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.1.3/255.255.255.0 on interface {FB2F1F54-A837-493F-A5DD-D745646F19A0} [DHCP-serv: 10.8.1.254, lease-time: 31536000]
  39. Tue Mar 19 18:16:18 2019 Successful ARP Flush on interface [16] {FB2F1F54-A837-493F-A5DD-D745646F19A0}
  40. Tue Mar 19 18:16:18 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  41. Tue Mar 19 18:16:18 2019 Block_DNS: WFP engine opened
  42. Tue Mar 19 18:16:18 2019 Block_DNS: Using existing sublayer
  43. Tue Mar 19 18:16:18 2019 Block_DNS: Added permit filters for exe_path
  44. Tue Mar 19 18:16:18 2019 Block_DNS: Added block filters for all interfaces
  45. Tue Mar 19 18:16:18 2019 Block_DNS: Added permit filters for TAP interface
  46. Tue Mar 19 18:16:24 2019 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
  47. Tue Mar 19 18:16:24 2019 C:\WINDOWS\system32\route.exe ADD 37.120.149.130 MASK 255.255.255.255 192.168.2.1
  48. Tue Mar 19 18:16:24 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=50 and dwForwardType=4
  49. Tue Mar 19 18:16:24 2019 Route addition via IPAPI succeeded [adaptive]
  50. Tue Mar 19 18:16:24 2019 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.1.1
  51. Tue Mar 19 18:16:24 2019 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=16]
  52. Tue Mar 19 18:16:24 2019 Route addition via IPAPI failed [adaptive]
  53. Tue Mar 19 18:16:24 2019 Route addition fallback to route.exe
  54. Tue Mar 19 18:16:24 2019 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  55. Tue Mar 19 18:16:24 2019 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.1.1
  56. Tue Mar 19 18:16:24 2019 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=16]
  57. Tue Mar 19 18:16:24 2019 Route addition via IPAPI failed [adaptive]
  58. Tue Mar 19 18:16:24 2019 Route addition fallback to route.exe
  59. Tue Mar 19 18:16:24 2019 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  60. Tue Mar 19 18:16:24 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement