Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- openvpn '/home/screening/VPN/sgdo6.vpn-443.ovpn'
- Sun Dec 25 21:47:12 2016 OpenVPN 2.3.14 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Dec 7 2016
- Sun Dec 25 21:47:12 2016 library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
- Enter Auth Username: ***************
- Enter Auth Password: ****
- Sun Dec 25 21:47:18 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:47:18 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:47:18 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:47:19 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:19 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:47:19 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:19 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=329d5145 40c8ce7f
- Sun Dec 25 21:47:19 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Dec 25 21:47:20 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:47:20 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:47:20 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:47:20 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:47:20 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:47:20 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:47:20 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:47:20 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:47:20 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:47:20 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:22 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:47:22 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:47:22 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=wlp3s0 HWADDR=74:c6:3b:92:87:5b
- Sun Dec 25 21:47:22 2016 TUN/TAP device tun1 opened
- Sun Dec 25 21:47:22 2016 TUN/TAP TX queue length set to 100
- Sun Dec 25 21:47:22 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sun Dec 25 21:47:22 2016 /usr/bin/ip link set dev tun1 up mtu 1500
- Sun Dec 25 21:47:22 2016 /usr/bin/ip addr add dev tun1 local 10.8.0.22 peer 10.8.0.21
- Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 139.59.238.204/32 via 192.168.1.1
- RTNETLINK answers: File exists
- Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
- Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 0.0.0.0/1 via 10.8.0.21
- RTNETLINK answers: File exists
- Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
- Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 128.0.0.0/1 via 10.8.0.21
- RTNETLINK answers: File exists
- Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
- Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 10.8.0.1/32 via 10.8.0.21
- RTNETLINK answers: File exists
- Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
- Sun Dec 25 21:47:22 2016 Initialization Sequence Completed
- Sun Dec 25 21:47:27 2016 Connection reset, restarting [0]
- Sun Dec 25 21:47:27 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:47:27 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:47:32 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:47:32 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:47:32 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:47:33 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:33 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:47:33 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:33 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=808557d4 8d8a632d
- Sun Dec 25 21:47:33 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:47:33 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:47:34 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:47:34 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:47:34 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:47:34 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:47:34 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:47:34 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:47:34 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:47:34 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:36 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:47:36 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:47:36 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:47:36 2016 Initialization Sequence Completed
- Sun Dec 25 21:47:41 2016 Connection reset, restarting [0]
- Sun Dec 25 21:47:41 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:47:41 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:47:46 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:47:46 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:47:46 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:47:47 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:47 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:47:47 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:47 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=d574a43c bc8edebe
- Sun Dec 25 21:47:47 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:47:47 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:47:47 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:47:47 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:47:47 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:47:47 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:47:47 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:47:47 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:47:47 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:47:47 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:47:50 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:47:50 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:47:50 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:47:50 2016 Initialization Sequence Completed
- Sun Dec 25 21:47:54 2016 Connection reset, restarting [0]
- Sun Dec 25 21:47:54 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:47:54 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:47:59 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:47:59 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:47:59 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:48:00 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:00 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:48:00 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:00 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=2c09b9a8 1d5ef3c9
- Sun Dec 25 21:48:01 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:01 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:01 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:01 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:01 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:01 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:01 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:01 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:01 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:48:01 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:03 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:48:04 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:48:04 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:48:04 2016 Initialization Sequence Completed
- Sun Dec 25 21:48:08 2016 Connection reset, restarting [0]
- Sun Dec 25 21:48:08 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:48:08 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:48:13 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:48:13 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:48:13 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:48:14 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:14 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:48:14 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:14 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=7b1b5590 fc89dad2
- Sun Dec 25 21:48:14 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:14 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:15 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:15 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:15 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:15 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:15 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:15 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:15 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:48:15 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:17 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:48:17 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:48:17 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:48:17 2016 Initialization Sequence Completed
- Sun Dec 25 21:48:21 2016 Connection reset, restarting [0]
- Sun Dec 25 21:48:21 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:48:21 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:48:26 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:48:26 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:48:26 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:48:27 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:27 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:48:27 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:27 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=04f0df48 13d9af01
- Sun Dec 25 21:48:28 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:28 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:28 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:28 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:28 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:28 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:28 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:28 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:28 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:48:28 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:30 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:48:30 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:48:30 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:48:30 2016 Initialization Sequence Completed
- Sun Dec 25 21:48:35 2016 Connection reset, restarting [0]
- Sun Dec 25 21:48:35 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:48:35 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:48:40 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:48:40 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:48:40 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:48:41 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:41 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:48:41 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:41 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=b562cb29 2464c985
- Sun Dec 25 21:48:41 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:41 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:42 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:42 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:42 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:42 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:42 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:42 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:42 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:48:42 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:44 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:48:44 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:48:44 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:48:44 2016 Initialization Sequence Completed
- Sun Dec 25 21:48:49 2016 Connection reset, restarting [0]
- Sun Dec 25 21:48:49 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:48:49 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:48:54 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:48:54 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:48:54 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:48:55 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:55 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:48:55 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:55 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=92354711 feb768dd
- Sun Dec 25 21:48:55 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:55 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:48:55 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:55 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:55 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:55 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:48:55 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:48:55 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:48:55 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:48:55 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:48:57 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:48:57 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:48:57 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:48:57 2016 Initialization Sequence Completed
- Sun Dec 25 21:49:02 2016 Connection reset, restarting [0]
- Sun Dec 25 21:49:02 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:49:02 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:49:07 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:49:07 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:49:07 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:49:08 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:08 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:49:08 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:08 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=9550cc4c 2a493360
- Sun Dec 25 21:49:08 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:08 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:09 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:09 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:09 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:09 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:09 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:09 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:09 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:49:09 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:11 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:49:11 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:49:11 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:49:11 2016 Initialization Sequence Completed
- Sun Dec 25 21:49:16 2016 Connection reset, restarting [0]
- Sun Dec 25 21:49:16 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:49:16 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:49:21 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:49:21 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:49:21 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:49:22 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:22 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:49:22 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:22 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=c070fe9a 12c9e478
- Sun Dec 25 21:49:22 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:22 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:22 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:22 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:22 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:22 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:22 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:22 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:22 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:49:22 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:24 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:49:25 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:49:25 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:49:25 2016 Initialization Sequence Completed
- Sun Dec 25 21:49:29 2016 Connection reset, restarting [0]
- Sun Dec 25 21:49:29 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:49:29 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:49:34 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:49:34 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:49:34 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:49:35 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:35 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:49:35 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:35 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=7a0ea802 29219d55
- Sun Dec 25 21:49:36 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:36 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:36 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:36 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:36 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:36 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:36 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:36 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:36 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:49:36 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:38 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:49:38 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:49:38 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:49:38 2016 Initialization Sequence Completed
- Sun Dec 25 21:49:43 2016 Connection reset, restarting [0]
- Sun Dec 25 21:49:43 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:49:43 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:49:48 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:49:48 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:49:48 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:49:49 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:49 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:49:49 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:49 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=060bdd62 dcb37315
- Sun Dec 25 21:49:49 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:49 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:49:50 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:50 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:50 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:50 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:49:50 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:49:50 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:49:50 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:49:50 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:49:52 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:49:52 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:49:52 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:49:52 2016 Initialization Sequence Completed
- Sun Dec 25 21:49:56 2016 Connection reset, restarting [0]
- Sun Dec 25 21:49:56 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:49:56 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:50:01 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:50:01 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:50:01 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:50:02 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:02 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:50:02 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:02 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=69f9686a 01cc05e3
- Sun Dec 25 21:50:03 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:50:03 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:50:03 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:50:03 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:50:03 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:50:03 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:50:03 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:50:03 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:50:03 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:50:03 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:06 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:50:06 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:50:06 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:50:06 2016 Initialization Sequence Completed
- Sun Dec 25 21:50:10 2016 Connection reset, restarting [0]
- Sun Dec 25 21:50:10 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:50:10 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:50:15 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:50:15 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:50:15 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:50:16 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:16 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:50:16 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:16 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=2b3db0f1 fcaf2ae2
- Sun Dec 25 21:50:16 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:50:16 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:50:17 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:50:17 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:50:17 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:50:17 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:50:17 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:50:17 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:50:17 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:50:17 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:19 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:50:19 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:50:19 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:50:19 2016 Initialization Sequence Completed
- Sun Dec 25 21:50:23 2016 Connection reset, restarting [0]
- Sun Dec 25 21:50:23 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:50:23 2016 Restart pause, 5 second(s)
- Sun Dec 25 21:50:28 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Dec 25 21:50:28 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
- Sun Dec 25 21:50:28 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
- Sun Dec 25 21:50:29 2016 TCP connection established with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:29 2016 TCPv4_CLIENT link local: [undef]
- Sun Dec 25 21:50:29 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:29 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=4cbe9153 232cff87
- Sun Dec 25 21:50:30 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:50:30 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
- Sun Dec 25 21:50:30 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:50:30 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:50:30 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:50:30 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Sun Dec 25 21:50:30 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
- Sun Dec 25 21:50:30 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Dec 25 21:50:30 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Dec 25 21:50:30 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
- Sun Dec 25 21:50:32 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Sun Dec 25 21:50:33 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
- Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: route options modified
- Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Dec 25 21:50:33 2016 Preserving previous TUN/TAP instance: tun1
- Sun Dec 25 21:50:33 2016 Initialization Sequence Completed
- Sun Dec 25 21:50:37 2016 Connection reset, restarting [0]
- Sun Dec 25 21:50:37 2016 SIGUSR1[soft,connection-reset] received, process restarting
- Sun Dec 25 21:50:37 2016 Restart pause, 5 second(s)
- ^CSun Dec 25 21:50:37 2016 Assertion failed at misc.c:785 (es)
- Sun Dec 25 21:50:37 2016 Exiting due to fatal error
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement