Guest User

Untitled

a guest
Jun 14th, 2018
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.12 KB | None | 0 0
  1. Enter Auth Username:mwalker
  2. Enter Auth Password:
  3. Fri Feb 3 11:53:44 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4. Fri Feb 3 11:53:44 2012 WARNING: file 'client-mwalker-key.pem' is group or others accessible
  5. Fri Feb 3 11:53:44 2012 LZO compression initialized
  6. Fri Feb 3 11:53:44 2012 Control Channel MTU parms [ L:1542 D:138 EF:38 EB:0 ET:0 EL:0 ]
  7. Fri Feb 3 11:53:44 2012 Socket Buffers: R=[114688->131072] S=[114688->131072]
  8. Fri Feb 3 11:53:44 2012 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
  9. Fri Feb 3 11:53:44 2012 Local Options hash (VER=V4): '41690919'
  10. Fri Feb 3 11:53:44 2012 Expected Remote Options hash (VER=V4): '530fdded'
  11. Fri Feb 3 11:53:44 2012 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay
  12. Fri Feb 3 11:53:44 2012 UDPv4 link local: [undef]
  13. Fri Feb 3 11:53:44 2012 UDPv4 link remote: [AF_INET]74.113.230.194:1194
  14. Fri Feb 3 11:53:44 2012 TLS: Initial packet from [AF_INET]74.113.230.194:1194, sid=c8f6d3a0 31e2a5ee
  15. Fri Feb 3 11:53:44 2012 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  16. Fri Feb 3 11:53:44 2012 VERIFY OK: depth=1, /O=velleros/OU=com/emailAddress=security@velleros.lan/L=morrisville/ST=NC/C=US/CN=ca.velleros.lan
  17. Fri Feb 3 11:53:44 2012 VERIFY OK: nsCertType=SERVER
  18. Fri Feb 3 11:53:44 2012 VERIFY OK: depth=0, /C=US/ST=NC/O=velleros/OU=com/L=morrisville/CN=vpn2.velleros.com/emailAddress=security@velleros.lan
  19. Fri Feb 3 11:53:46 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  20. Fri Feb 3 11:53:46 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  21. Fri Feb 3 11:53:46 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  22. Fri Feb 3 11:53:46 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  23. Fri Feb 3 11:53:46 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  24. Fri Feb 3 11:53:46 2012 [vpn2.velleros.com] Peer Connection Initiated with [AF_INET]74.113.230.194:1194
  25. Fri Feb 3 11:53:48 2012 SENT CONTROL [vpn2.velleros.com]: 'PUSH_REQUEST' (status=1)
  26. Fri Feb 3 11:53:48 2012 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 192.168.16.3,dhcp-option DOMAIN velleros.com,dhcp-option WINS 127.0.0.1,route 192.168.16.0 255.255.255.0,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.26 10.8.0.25'
  27. Fri Feb 3 11:53:48 2012 OPTIONS IMPORT: timers and/or timeouts modified
  28. Fri Feb 3 11:53:48 2012 OPTIONS IMPORT: --ifconfig/up options modified
  29. Fri Feb 3 11:53:48 2012 OPTIONS IMPORT: route options modified
  30. Fri Feb 3 11:53:48 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  31. Fri Feb 3 11:53:48 2012 ROUTE default_gateway=172.17.1.1
  32. Fri Feb 3 11:53:48 2012 Note: Cannot ioctl TUNSETIFF tun: Operation not permitted (errno=1)
  33. Fri Feb 3 11:53:48 2012 Note: Attempting fallback to kernel 2.2 TUN/TAP interface
  34. Fri Feb 3 11:53:48 2012 Cannot allocate TUN/TAP dev dynamically
  35. Fri Feb 3 11:53:48 2012 Exiting
  36. mw@Ubuntu Compaq:~/velleros$ c
Add Comment
Please, Sign In to add comment