daily pastebin goal
23%
SHARE
TWEET

Untitled

a guest Dec 25th, 2016 104 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. openvpn '/home/screening/VPN/sgdo6.vpn-443.ovpn'
  2. Sun Dec 25 21:47:12 2016 OpenVPN 2.3.14 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Dec  7 2016
  3. Sun Dec 25 21:47:12 2016 library versions: OpenSSL 1.0.2j  26 Sep 2016, LZO 2.09
  4. Enter Auth Username: ***************
  5. Enter Auth Password: ****
  6. Sun Dec 25 21:47:18 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  7. Sun Dec 25 21:47:18 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  8. Sun Dec 25 21:47:18 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  9. Sun Dec 25 21:47:19 2016 TCP connection established with [AF_INET]139.59.238.204:443
  10. Sun Dec 25 21:47:19 2016 TCPv4_CLIENT link local: [undef]
  11. Sun Dec 25 21:47:19 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  12. Sun Dec 25 21:47:19 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=329d5145 40c8ce7f
  13. Sun Dec 25 21:47:19 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  14. Sun Dec 25 21:47:20 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  15. Sun Dec 25 21:47:20 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  16. Sun Dec 25 21:47:20 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  17. Sun Dec 25 21:47:20 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  18. Sun Dec 25 21:47:20 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  19. Sun Dec 25 21:47:20 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  20. Sun Dec 25 21:47:20 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  21. Sun Dec 25 21:47:20 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  22. Sun Dec 25 21:47:20 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  23. Sun Dec 25 21:47:20 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  24. Sun Dec 25 21:47:22 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  25. Sun Dec 25 21:47:22 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  26. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: timers and/or timeouts modified
  27. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: --ifconfig/up options modified
  28. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: route options modified
  29. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  30. Sun Dec 25 21:47:22 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=wlp3s0 HWADDR=74:c6:3b:92:87:5b
  31. Sun Dec 25 21:47:22 2016 TUN/TAP device tun1 opened
  32. Sun Dec 25 21:47:22 2016 TUN/TAP TX queue length set to 100
  33. Sun Dec 25 21:47:22 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  34. Sun Dec 25 21:47:22 2016 /usr/bin/ip link set dev tun1 up mtu 1500
  35. Sun Dec 25 21:47:22 2016 /usr/bin/ip addr add dev tun1 local 10.8.0.22 peer 10.8.0.21
  36. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 139.59.238.204/32 via 192.168.1.1
  37. RTNETLINK answers: File exists
  38. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  39. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 0.0.0.0/1 via 10.8.0.21
  40. RTNETLINK answers: File exists
  41. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  42. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 128.0.0.0/1 via 10.8.0.21
  43. RTNETLINK answers: File exists
  44. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  45. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 10.8.0.1/32 via 10.8.0.21
  46. RTNETLINK answers: File exists
  47. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  48. Sun Dec 25 21:47:22 2016 Initialization Sequence Completed
  49. Sun Dec 25 21:47:27 2016 Connection reset, restarting [0]
  50. Sun Dec 25 21:47:27 2016 SIGUSR1[soft,connection-reset] received, process restarting
  51. Sun Dec 25 21:47:27 2016 Restart pause, 5 second(s)
  52. Sun Dec 25 21:47:32 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  53. Sun Dec 25 21:47:32 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  54. Sun Dec 25 21:47:32 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  55. Sun Dec 25 21:47:33 2016 TCP connection established with [AF_INET]139.59.238.204:443
  56. Sun Dec 25 21:47:33 2016 TCPv4_CLIENT link local: [undef]
  57. Sun Dec 25 21:47:33 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  58. Sun Dec 25 21:47:33 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=808557d4 8d8a632d
  59. Sun Dec 25 21:47:33 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  60. Sun Dec 25 21:47:33 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  61. Sun Dec 25 21:47:34 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  62. Sun Dec 25 21:47:34 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  63. Sun Dec 25 21:47:34 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  64. Sun Dec 25 21:47:34 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  65. Sun Dec 25 21:47:34 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  66. Sun Dec 25 21:47:34 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  67. Sun Dec 25 21:47:34 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  68. Sun Dec 25 21:47:34 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  69. Sun Dec 25 21:47:36 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  70. Sun Dec 25 21:47:36 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  71. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: timers and/or timeouts modified
  72. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: --ifconfig/up options modified
  73. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: route options modified
  74. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  75. Sun Dec 25 21:47:36 2016 Preserving previous TUN/TAP instance: tun1
  76. Sun Dec 25 21:47:36 2016 Initialization Sequence Completed
  77. Sun Dec 25 21:47:41 2016 Connection reset, restarting [0]
  78. Sun Dec 25 21:47:41 2016 SIGUSR1[soft,connection-reset] received, process restarting
  79. Sun Dec 25 21:47:41 2016 Restart pause, 5 second(s)
  80. Sun Dec 25 21:47:46 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  81. Sun Dec 25 21:47:46 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  82. Sun Dec 25 21:47:46 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  83. Sun Dec 25 21:47:47 2016 TCP connection established with [AF_INET]139.59.238.204:443
  84. Sun Dec 25 21:47:47 2016 TCPv4_CLIENT link local: [undef]
  85. Sun Dec 25 21:47:47 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  86. Sun Dec 25 21:47:47 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=d574a43c bc8edebe
  87. Sun Dec 25 21:47:47 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  88. Sun Dec 25 21:47:47 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  89. Sun Dec 25 21:47:47 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  90. Sun Dec 25 21:47:47 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  91. Sun Dec 25 21:47:47 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  92. Sun Dec 25 21:47:47 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  93. Sun Dec 25 21:47:47 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  94. Sun Dec 25 21:47:47 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  95. Sun Dec 25 21:47:47 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  96. Sun Dec 25 21:47:47 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  97. Sun Dec 25 21:47:50 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  98. Sun Dec 25 21:47:50 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  99. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: timers and/or timeouts modified
  100. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: --ifconfig/up options modified
  101. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: route options modified
  102. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  103. Sun Dec 25 21:47:50 2016 Preserving previous TUN/TAP instance: tun1
  104. Sun Dec 25 21:47:50 2016 Initialization Sequence Completed
  105. Sun Dec 25 21:47:54 2016 Connection reset, restarting [0]
  106. Sun Dec 25 21:47:54 2016 SIGUSR1[soft,connection-reset] received, process restarting
  107. Sun Dec 25 21:47:54 2016 Restart pause, 5 second(s)
  108. Sun Dec 25 21:47:59 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  109. Sun Dec 25 21:47:59 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  110. Sun Dec 25 21:47:59 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  111. Sun Dec 25 21:48:00 2016 TCP connection established with [AF_INET]139.59.238.204:443
  112. Sun Dec 25 21:48:00 2016 TCPv4_CLIENT link local: [undef]
  113. Sun Dec 25 21:48:00 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  114. Sun Dec 25 21:48:00 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=2c09b9a8 1d5ef3c9
  115. Sun Dec 25 21:48:01 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  116. Sun Dec 25 21:48:01 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  117. Sun Dec 25 21:48:01 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  118. Sun Dec 25 21:48:01 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  119. Sun Dec 25 21:48:01 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  120. Sun Dec 25 21:48:01 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  121. Sun Dec 25 21:48:01 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  122. Sun Dec 25 21:48:01 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  123. Sun Dec 25 21:48:01 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  124. Sun Dec 25 21:48:01 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  125. Sun Dec 25 21:48:03 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  126. Sun Dec 25 21:48:04 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  127. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: timers and/or timeouts modified
  128. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: --ifconfig/up options modified
  129. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: route options modified
  130. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  131. Sun Dec 25 21:48:04 2016 Preserving previous TUN/TAP instance: tun1
  132. Sun Dec 25 21:48:04 2016 Initialization Sequence Completed
  133. Sun Dec 25 21:48:08 2016 Connection reset, restarting [0]
  134. Sun Dec 25 21:48:08 2016 SIGUSR1[soft,connection-reset] received, process restarting
  135. Sun Dec 25 21:48:08 2016 Restart pause, 5 second(s)
  136. Sun Dec 25 21:48:13 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  137. Sun Dec 25 21:48:13 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  138. Sun Dec 25 21:48:13 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  139. Sun Dec 25 21:48:14 2016 TCP connection established with [AF_INET]139.59.238.204:443
  140. Sun Dec 25 21:48:14 2016 TCPv4_CLIENT link local: [undef]
  141. Sun Dec 25 21:48:14 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  142. Sun Dec 25 21:48:14 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=7b1b5590 fc89dad2
  143. Sun Dec 25 21:48:14 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  144. Sun Dec 25 21:48:14 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  145. Sun Dec 25 21:48:15 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  146. Sun Dec 25 21:48:15 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  147. Sun Dec 25 21:48:15 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  148. Sun Dec 25 21:48:15 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  149. Sun Dec 25 21:48:15 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  150. Sun Dec 25 21:48:15 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  151. Sun Dec 25 21:48:15 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  152. Sun Dec 25 21:48:15 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  153. Sun Dec 25 21:48:17 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  154. Sun Dec 25 21:48:17 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  155. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: timers and/or timeouts modified
  156. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: --ifconfig/up options modified
  157. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: route options modified
  158. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  159. Sun Dec 25 21:48:17 2016 Preserving previous TUN/TAP instance: tun1
  160. Sun Dec 25 21:48:17 2016 Initialization Sequence Completed
  161. Sun Dec 25 21:48:21 2016 Connection reset, restarting [0]
  162. Sun Dec 25 21:48:21 2016 SIGUSR1[soft,connection-reset] received, process restarting
  163. Sun Dec 25 21:48:21 2016 Restart pause, 5 second(s)
  164. Sun Dec 25 21:48:26 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  165. Sun Dec 25 21:48:26 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  166. Sun Dec 25 21:48:26 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  167. Sun Dec 25 21:48:27 2016 TCP connection established with [AF_INET]139.59.238.204:443
  168. Sun Dec 25 21:48:27 2016 TCPv4_CLIENT link local: [undef]
  169. Sun Dec 25 21:48:27 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  170. Sun Dec 25 21:48:27 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=04f0df48 13d9af01
  171. Sun Dec 25 21:48:28 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  172. Sun Dec 25 21:48:28 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  173. Sun Dec 25 21:48:28 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  174. Sun Dec 25 21:48:28 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  175. Sun Dec 25 21:48:28 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  176. Sun Dec 25 21:48:28 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  177. Sun Dec 25 21:48:28 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  178. Sun Dec 25 21:48:28 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  179. Sun Dec 25 21:48:28 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  180. Sun Dec 25 21:48:28 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  181. Sun Dec 25 21:48:30 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  182. Sun Dec 25 21:48:30 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  183. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: timers and/or timeouts modified
  184. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: --ifconfig/up options modified
  185. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: route options modified
  186. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  187. Sun Dec 25 21:48:30 2016 Preserving previous TUN/TAP instance: tun1
  188. Sun Dec 25 21:48:30 2016 Initialization Sequence Completed
  189. Sun Dec 25 21:48:35 2016 Connection reset, restarting [0]
  190. Sun Dec 25 21:48:35 2016 SIGUSR1[soft,connection-reset] received, process restarting
  191. Sun Dec 25 21:48:35 2016 Restart pause, 5 second(s)
  192. Sun Dec 25 21:48:40 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  193. Sun Dec 25 21:48:40 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  194. Sun Dec 25 21:48:40 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  195. Sun Dec 25 21:48:41 2016 TCP connection established with [AF_INET]139.59.238.204:443
  196. Sun Dec 25 21:48:41 2016 TCPv4_CLIENT link local: [undef]
  197. Sun Dec 25 21:48:41 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  198. Sun Dec 25 21:48:41 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=b562cb29 2464c985
  199. Sun Dec 25 21:48:41 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  200. Sun Dec 25 21:48:41 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  201. Sun Dec 25 21:48:42 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  202. Sun Dec 25 21:48:42 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  203. Sun Dec 25 21:48:42 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  204. Sun Dec 25 21:48:42 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  205. Sun Dec 25 21:48:42 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  206. Sun Dec 25 21:48:42 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  207. Sun Dec 25 21:48:42 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  208. Sun Dec 25 21:48:42 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  209. Sun Dec 25 21:48:44 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  210. Sun Dec 25 21:48:44 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  211. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: timers and/or timeouts modified
  212. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: --ifconfig/up options modified
  213. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: route options modified
  214. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  215. Sun Dec 25 21:48:44 2016 Preserving previous TUN/TAP instance: tun1
  216. Sun Dec 25 21:48:44 2016 Initialization Sequence Completed
  217. Sun Dec 25 21:48:49 2016 Connection reset, restarting [0]
  218. Sun Dec 25 21:48:49 2016 SIGUSR1[soft,connection-reset] received, process restarting
  219. Sun Dec 25 21:48:49 2016 Restart pause, 5 second(s)
  220. Sun Dec 25 21:48:54 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  221. Sun Dec 25 21:48:54 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  222. Sun Dec 25 21:48:54 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  223. Sun Dec 25 21:48:55 2016 TCP connection established with [AF_INET]139.59.238.204:443
  224. Sun Dec 25 21:48:55 2016 TCPv4_CLIENT link local: [undef]
  225. Sun Dec 25 21:48:55 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  226. Sun Dec 25 21:48:55 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=92354711 feb768dd
  227. Sun Dec 25 21:48:55 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  228. Sun Dec 25 21:48:55 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  229. Sun Dec 25 21:48:55 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  230. Sun Dec 25 21:48:55 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  231. Sun Dec 25 21:48:55 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  232. Sun Dec 25 21:48:55 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  233. Sun Dec 25 21:48:55 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  234. Sun Dec 25 21:48:55 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  235. Sun Dec 25 21:48:55 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  236. Sun Dec 25 21:48:55 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  237. Sun Dec 25 21:48:57 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  238. Sun Dec 25 21:48:57 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  239. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: timers and/or timeouts modified
  240. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: --ifconfig/up options modified
  241. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: route options modified
  242. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  243. Sun Dec 25 21:48:57 2016 Preserving previous TUN/TAP instance: tun1
  244. Sun Dec 25 21:48:57 2016 Initialization Sequence Completed
  245. Sun Dec 25 21:49:02 2016 Connection reset, restarting [0]
  246. Sun Dec 25 21:49:02 2016 SIGUSR1[soft,connection-reset] received, process restarting
  247. Sun Dec 25 21:49:02 2016 Restart pause, 5 second(s)
  248. Sun Dec 25 21:49:07 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  249. Sun Dec 25 21:49:07 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  250. Sun Dec 25 21:49:07 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  251. Sun Dec 25 21:49:08 2016 TCP connection established with [AF_INET]139.59.238.204:443
  252. Sun Dec 25 21:49:08 2016 TCPv4_CLIENT link local: [undef]
  253. Sun Dec 25 21:49:08 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  254. Sun Dec 25 21:49:08 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=9550cc4c 2a493360
  255. Sun Dec 25 21:49:08 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  256. Sun Dec 25 21:49:08 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  257. Sun Dec 25 21:49:09 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  258. Sun Dec 25 21:49:09 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  259. Sun Dec 25 21:49:09 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  260. Sun Dec 25 21:49:09 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  261. Sun Dec 25 21:49:09 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  262. Sun Dec 25 21:49:09 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  263. Sun Dec 25 21:49:09 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  264. Sun Dec 25 21:49:09 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  265. Sun Dec 25 21:49:11 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  266. Sun Dec 25 21:49:11 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  267. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: timers and/or timeouts modified
  268. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: --ifconfig/up options modified
  269. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: route options modified
  270. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  271. Sun Dec 25 21:49:11 2016 Preserving previous TUN/TAP instance: tun1
  272. Sun Dec 25 21:49:11 2016 Initialization Sequence Completed
  273. Sun Dec 25 21:49:16 2016 Connection reset, restarting [0]
  274. Sun Dec 25 21:49:16 2016 SIGUSR1[soft,connection-reset] received, process restarting
  275. Sun Dec 25 21:49:16 2016 Restart pause, 5 second(s)
  276. Sun Dec 25 21:49:21 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  277. Sun Dec 25 21:49:21 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  278. Sun Dec 25 21:49:21 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  279. Sun Dec 25 21:49:22 2016 TCP connection established with [AF_INET]139.59.238.204:443
  280. Sun Dec 25 21:49:22 2016 TCPv4_CLIENT link local: [undef]
  281. Sun Dec 25 21:49:22 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  282. Sun Dec 25 21:49:22 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=c070fe9a 12c9e478
  283. Sun Dec 25 21:49:22 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  284. Sun Dec 25 21:49:22 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  285. Sun Dec 25 21:49:22 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  286. Sun Dec 25 21:49:22 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  287. Sun Dec 25 21:49:22 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  288. Sun Dec 25 21:49:22 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  289. Sun Dec 25 21:49:22 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  290. Sun Dec 25 21:49:22 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  291. Sun Dec 25 21:49:22 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  292. Sun Dec 25 21:49:22 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  293. Sun Dec 25 21:49:24 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  294. Sun Dec 25 21:49:25 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  295. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: timers and/or timeouts modified
  296. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: --ifconfig/up options modified
  297. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: route options modified
  298. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  299. Sun Dec 25 21:49:25 2016 Preserving previous TUN/TAP instance: tun1
  300. Sun Dec 25 21:49:25 2016 Initialization Sequence Completed
  301. Sun Dec 25 21:49:29 2016 Connection reset, restarting [0]
  302. Sun Dec 25 21:49:29 2016 SIGUSR1[soft,connection-reset] received, process restarting
  303. Sun Dec 25 21:49:29 2016 Restart pause, 5 second(s)
  304. Sun Dec 25 21:49:34 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  305. Sun Dec 25 21:49:34 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  306. Sun Dec 25 21:49:34 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  307. Sun Dec 25 21:49:35 2016 TCP connection established with [AF_INET]139.59.238.204:443
  308. Sun Dec 25 21:49:35 2016 TCPv4_CLIENT link local: [undef]
  309. Sun Dec 25 21:49:35 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  310. Sun Dec 25 21:49:35 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=7a0ea802 29219d55
  311. Sun Dec 25 21:49:36 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  312. Sun Dec 25 21:49:36 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  313. Sun Dec 25 21:49:36 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  314. Sun Dec 25 21:49:36 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  315. Sun Dec 25 21:49:36 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  316. Sun Dec 25 21:49:36 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  317. Sun Dec 25 21:49:36 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  318. Sun Dec 25 21:49:36 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  319. Sun Dec 25 21:49:36 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  320. Sun Dec 25 21:49:36 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  321. Sun Dec 25 21:49:38 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  322. Sun Dec 25 21:49:38 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  323. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: timers and/or timeouts modified
  324. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: --ifconfig/up options modified
  325. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: route options modified
  326. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  327. Sun Dec 25 21:49:38 2016 Preserving previous TUN/TAP instance: tun1
  328. Sun Dec 25 21:49:38 2016 Initialization Sequence Completed
  329. Sun Dec 25 21:49:43 2016 Connection reset, restarting [0]
  330. Sun Dec 25 21:49:43 2016 SIGUSR1[soft,connection-reset] received, process restarting
  331. Sun Dec 25 21:49:43 2016 Restart pause, 5 second(s)
  332. Sun Dec 25 21:49:48 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  333. Sun Dec 25 21:49:48 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  334. Sun Dec 25 21:49:48 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  335. Sun Dec 25 21:49:49 2016 TCP connection established with [AF_INET]139.59.238.204:443
  336. Sun Dec 25 21:49:49 2016 TCPv4_CLIENT link local: [undef]
  337. Sun Dec 25 21:49:49 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  338. Sun Dec 25 21:49:49 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=060bdd62 dcb37315
  339. Sun Dec 25 21:49:49 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  340. Sun Dec 25 21:49:49 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  341. Sun Dec 25 21:49:50 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  342. Sun Dec 25 21:49:50 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  343. Sun Dec 25 21:49:50 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  344. Sun Dec 25 21:49:50 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  345. Sun Dec 25 21:49:50 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  346. Sun Dec 25 21:49:50 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  347. Sun Dec 25 21:49:50 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  348. Sun Dec 25 21:49:50 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  349. Sun Dec 25 21:49:52 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  350. Sun Dec 25 21:49:52 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  351. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: timers and/or timeouts modified
  352. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: --ifconfig/up options modified
  353. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: route options modified
  354. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  355. Sun Dec 25 21:49:52 2016 Preserving previous TUN/TAP instance: tun1
  356. Sun Dec 25 21:49:52 2016 Initialization Sequence Completed
  357. Sun Dec 25 21:49:56 2016 Connection reset, restarting [0]
  358. Sun Dec 25 21:49:56 2016 SIGUSR1[soft,connection-reset] received, process restarting
  359. Sun Dec 25 21:49:56 2016 Restart pause, 5 second(s)
  360. Sun Dec 25 21:50:01 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  361. Sun Dec 25 21:50:01 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  362. Sun Dec 25 21:50:01 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  363. Sun Dec 25 21:50:02 2016 TCP connection established with [AF_INET]139.59.238.204:443
  364. Sun Dec 25 21:50:02 2016 TCPv4_CLIENT link local: [undef]
  365. Sun Dec 25 21:50:02 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  366. Sun Dec 25 21:50:02 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=69f9686a 01cc05e3
  367. Sun Dec 25 21:50:03 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  368. Sun Dec 25 21:50:03 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  369. Sun Dec 25 21:50:03 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  370. Sun Dec 25 21:50:03 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  371. Sun Dec 25 21:50:03 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  372. Sun Dec 25 21:50:03 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  373. Sun Dec 25 21:50:03 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  374. Sun Dec 25 21:50:03 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  375. Sun Dec 25 21:50:03 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  376. Sun Dec 25 21:50:03 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  377. Sun Dec 25 21:50:06 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  378. Sun Dec 25 21:50:06 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  379. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: timers and/or timeouts modified
  380. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: --ifconfig/up options modified
  381. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: route options modified
  382. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  383. Sun Dec 25 21:50:06 2016 Preserving previous TUN/TAP instance: tun1
  384. Sun Dec 25 21:50:06 2016 Initialization Sequence Completed
  385. Sun Dec 25 21:50:10 2016 Connection reset, restarting [0]
  386. Sun Dec 25 21:50:10 2016 SIGUSR1[soft,connection-reset] received, process restarting
  387. Sun Dec 25 21:50:10 2016 Restart pause, 5 second(s)
  388. Sun Dec 25 21:50:15 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  389. Sun Dec 25 21:50:15 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  390. Sun Dec 25 21:50:15 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  391. Sun Dec 25 21:50:16 2016 TCP connection established with [AF_INET]139.59.238.204:443
  392. Sun Dec 25 21:50:16 2016 TCPv4_CLIENT link local: [undef]
  393. Sun Dec 25 21:50:16 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  394. Sun Dec 25 21:50:16 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=2b3db0f1 fcaf2ae2
  395. Sun Dec 25 21:50:16 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  396. Sun Dec 25 21:50:16 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  397. Sun Dec 25 21:50:17 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  398. Sun Dec 25 21:50:17 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  399. Sun Dec 25 21:50:17 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  400. Sun Dec 25 21:50:17 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  401. Sun Dec 25 21:50:17 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  402. Sun Dec 25 21:50:17 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  403. Sun Dec 25 21:50:17 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  404. Sun Dec 25 21:50:17 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  405. Sun Dec 25 21:50:19 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  406. Sun Dec 25 21:50:19 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  407. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: timers and/or timeouts modified
  408. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: --ifconfig/up options modified
  409. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: route options modified
  410. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  411. Sun Dec 25 21:50:19 2016 Preserving previous TUN/TAP instance: tun1
  412. Sun Dec 25 21:50:19 2016 Initialization Sequence Completed
  413. Sun Dec 25 21:50:23 2016 Connection reset, restarting [0]
  414. Sun Dec 25 21:50:23 2016 SIGUSR1[soft,connection-reset] received, process restarting
  415. Sun Dec 25 21:50:23 2016 Restart pause, 5 second(s)
  416. Sun Dec 25 21:50:28 2016 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
  417. Sun Dec 25 21:50:28 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  418. Sun Dec 25 21:50:28 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  419. Sun Dec 25 21:50:29 2016 TCP connection established with [AF_INET]139.59.238.204:443
  420. Sun Dec 25 21:50:29 2016 TCPv4_CLIENT link local: [undef]
  421. Sun Dec 25 21:50:29 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  422. Sun Dec 25 21:50:29 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=4cbe9153 232cff87
  423. Sun Dec 25 21:50:30 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  424. Sun Dec 25 21:50:30 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  425. Sun Dec 25 21:50:30 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  426. Sun Dec 25 21:50:30 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  427. Sun Dec 25 21:50:30 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  428. Sun Dec 25 21:50:30 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  429. Sun Dec 25 21:50:30 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit).  This allows attacks like SWEET32.  Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  430. Sun Dec 25 21:50:30 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  431. Sun Dec 25 21:50:30 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  432. Sun Dec 25 21:50:30 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  433. Sun Dec 25 21:50:32 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  434. Sun Dec 25 21:50:33 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  435. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: timers and/or timeouts modified
  436. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: --ifconfig/up options modified
  437. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: route options modified
  438. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  439. Sun Dec 25 21:50:33 2016 Preserving previous TUN/TAP instance: tun1
  440. Sun Dec 25 21:50:33 2016 Initialization Sequence Completed
  441. Sun Dec 25 21:50:37 2016 Connection reset, restarting [0]
  442. Sun Dec 25 21:50:37 2016 SIGUSR1[soft,connection-reset] received, process restarting
  443. Sun Dec 25 21:50:37 2016 Restart pause, 5 second(s)
  444. ^CSun Dec 25 21:50:37 2016 Assertion failed at misc.c:785 (es)
  445. Sun Dec 25 21:50:37 2016 Exiting due to fatal error
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top