Advertisement
Guest User

Untitled

a guest
Dec 25th, 2016
202
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 44.20 KB | None | 0 0
  1. openvpn '/home/screening/VPN/sgdo6.vpn-443.ovpn'
  2. Sun Dec 25 21:47:12 2016 OpenVPN 2.3.14 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Dec 7 2016
  3. Sun Dec 25 21:47:12 2016 library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
  4. Enter Auth Username: ***************
  5. Enter Auth Password: ****
  6. Sun Dec 25 21:47:18 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  7. Sun Dec 25 21:47:18 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  8. Sun Dec 25 21:47:18 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  9. Sun Dec 25 21:47:19 2016 TCP connection established with [AF_INET]139.59.238.204:443
  10. Sun Dec 25 21:47:19 2016 TCPv4_CLIENT link local: [undef]
  11. Sun Dec 25 21:47:19 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  12. Sun Dec 25 21:47:19 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=329d5145 40c8ce7f
  13. Sun Dec 25 21:47:19 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  14. Sun Dec 25 21:47:20 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  15. Sun Dec 25 21:47:20 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  16. Sun Dec 25 21:47:20 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  17. Sun Dec 25 21:47:20 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  18. Sun Dec 25 21:47:20 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  19. Sun Dec 25 21:47:20 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  20. Sun Dec 25 21:47:20 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  21. Sun Dec 25 21:47:20 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  22. Sun Dec 25 21:47:20 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  23. Sun Dec 25 21:47:20 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  24. Sun Dec 25 21:47:22 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  25. Sun Dec 25 21:47:22 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  26. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: timers and/or timeouts modified
  27. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: --ifconfig/up options modified
  28. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: route options modified
  29. Sun Dec 25 21:47:22 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  30. Sun Dec 25 21:47:22 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 IFACE=wlp3s0 HWADDR=74:c6:3b:92:87:5b
  31. Sun Dec 25 21:47:22 2016 TUN/TAP device tun1 opened
  32. Sun Dec 25 21:47:22 2016 TUN/TAP TX queue length set to 100
  33. Sun Dec 25 21:47:22 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  34. Sun Dec 25 21:47:22 2016 /usr/bin/ip link set dev tun1 up mtu 1500
  35. Sun Dec 25 21:47:22 2016 /usr/bin/ip addr add dev tun1 local 10.8.0.22 peer 10.8.0.21
  36. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 139.59.238.204/32 via 192.168.1.1
  37. RTNETLINK answers: File exists
  38. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  39. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 0.0.0.0/1 via 10.8.0.21
  40. RTNETLINK answers: File exists
  41. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  42. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 128.0.0.0/1 via 10.8.0.21
  43. RTNETLINK answers: File exists
  44. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  45. Sun Dec 25 21:47:22 2016 /usr/bin/ip route add 10.8.0.1/32 via 10.8.0.21
  46. RTNETLINK answers: File exists
  47. Sun Dec 25 21:47:22 2016 ERROR: Linux route add command failed: external program exited with error status: 2
  48. Sun Dec 25 21:47:22 2016 Initialization Sequence Completed
  49. Sun Dec 25 21:47:27 2016 Connection reset, restarting [0]
  50. Sun Dec 25 21:47:27 2016 SIGUSR1[soft,connection-reset] received, process restarting
  51. Sun Dec 25 21:47:27 2016 Restart pause, 5 second(s)
  52. Sun Dec 25 21:47:32 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  53. Sun Dec 25 21:47:32 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  54. Sun Dec 25 21:47:32 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  55. Sun Dec 25 21:47:33 2016 TCP connection established with [AF_INET]139.59.238.204:443
  56. Sun Dec 25 21:47:33 2016 TCPv4_CLIENT link local: [undef]
  57. Sun Dec 25 21:47:33 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  58. Sun Dec 25 21:47:33 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=808557d4 8d8a632d
  59. Sun Dec 25 21:47:33 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  60. Sun Dec 25 21:47:33 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  61. Sun Dec 25 21:47:34 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  62. Sun Dec 25 21:47:34 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  63. Sun Dec 25 21:47:34 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  64. Sun Dec 25 21:47:34 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  65. Sun Dec 25 21:47:34 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  66. Sun Dec 25 21:47:34 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  67. Sun Dec 25 21:47:34 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  68. Sun Dec 25 21:47:34 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  69. Sun Dec 25 21:47:36 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  70. Sun Dec 25 21:47:36 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  71. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: timers and/or timeouts modified
  72. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: --ifconfig/up options modified
  73. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: route options modified
  74. Sun Dec 25 21:47:36 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  75. Sun Dec 25 21:47:36 2016 Preserving previous TUN/TAP instance: tun1
  76. Sun Dec 25 21:47:36 2016 Initialization Sequence Completed
  77. Sun Dec 25 21:47:41 2016 Connection reset, restarting [0]
  78. Sun Dec 25 21:47:41 2016 SIGUSR1[soft,connection-reset] received, process restarting
  79. Sun Dec 25 21:47:41 2016 Restart pause, 5 second(s)
  80. Sun Dec 25 21:47:46 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  81. Sun Dec 25 21:47:46 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  82. Sun Dec 25 21:47:46 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  83. Sun Dec 25 21:47:47 2016 TCP connection established with [AF_INET]139.59.238.204:443
  84. Sun Dec 25 21:47:47 2016 TCPv4_CLIENT link local: [undef]
  85. Sun Dec 25 21:47:47 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  86. Sun Dec 25 21:47:47 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=d574a43c bc8edebe
  87. Sun Dec 25 21:47:47 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  88. Sun Dec 25 21:47:47 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  89. Sun Dec 25 21:47:47 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  90. Sun Dec 25 21:47:47 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  91. Sun Dec 25 21:47:47 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  92. Sun Dec 25 21:47:47 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  93. Sun Dec 25 21:47:47 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  94. Sun Dec 25 21:47:47 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  95. Sun Dec 25 21:47:47 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  96. Sun Dec 25 21:47:47 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  97. Sun Dec 25 21:47:50 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  98. Sun Dec 25 21:47:50 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  99. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: timers and/or timeouts modified
  100. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: --ifconfig/up options modified
  101. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: route options modified
  102. Sun Dec 25 21:47:50 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  103. Sun Dec 25 21:47:50 2016 Preserving previous TUN/TAP instance: tun1
  104. Sun Dec 25 21:47:50 2016 Initialization Sequence Completed
  105. Sun Dec 25 21:47:54 2016 Connection reset, restarting [0]
  106. Sun Dec 25 21:47:54 2016 SIGUSR1[soft,connection-reset] received, process restarting
  107. Sun Dec 25 21:47:54 2016 Restart pause, 5 second(s)
  108. Sun Dec 25 21:47:59 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  109. Sun Dec 25 21:47:59 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  110. Sun Dec 25 21:47:59 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  111. Sun Dec 25 21:48:00 2016 TCP connection established with [AF_INET]139.59.238.204:443
  112. Sun Dec 25 21:48:00 2016 TCPv4_CLIENT link local: [undef]
  113. Sun Dec 25 21:48:00 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  114. Sun Dec 25 21:48:00 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=2c09b9a8 1d5ef3c9
  115. Sun Dec 25 21:48:01 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  116. Sun Dec 25 21:48:01 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  117. Sun Dec 25 21:48:01 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  118. Sun Dec 25 21:48:01 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  119. Sun Dec 25 21:48:01 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  120. Sun Dec 25 21:48:01 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  121. Sun Dec 25 21:48:01 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  122. Sun Dec 25 21:48:01 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  123. Sun Dec 25 21:48:01 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  124. Sun Dec 25 21:48:01 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  125. Sun Dec 25 21:48:03 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  126. Sun Dec 25 21:48:04 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  127. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: timers and/or timeouts modified
  128. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: --ifconfig/up options modified
  129. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: route options modified
  130. Sun Dec 25 21:48:04 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  131. Sun Dec 25 21:48:04 2016 Preserving previous TUN/TAP instance: tun1
  132. Sun Dec 25 21:48:04 2016 Initialization Sequence Completed
  133. Sun Dec 25 21:48:08 2016 Connection reset, restarting [0]
  134. Sun Dec 25 21:48:08 2016 SIGUSR1[soft,connection-reset] received, process restarting
  135. Sun Dec 25 21:48:08 2016 Restart pause, 5 second(s)
  136. Sun Dec 25 21:48:13 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  137. Sun Dec 25 21:48:13 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  138. Sun Dec 25 21:48:13 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  139. Sun Dec 25 21:48:14 2016 TCP connection established with [AF_INET]139.59.238.204:443
  140. Sun Dec 25 21:48:14 2016 TCPv4_CLIENT link local: [undef]
  141. Sun Dec 25 21:48:14 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  142. Sun Dec 25 21:48:14 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=7b1b5590 fc89dad2
  143. Sun Dec 25 21:48:14 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  144. Sun Dec 25 21:48:14 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  145. Sun Dec 25 21:48:15 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  146. Sun Dec 25 21:48:15 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  147. Sun Dec 25 21:48:15 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  148. Sun Dec 25 21:48:15 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  149. Sun Dec 25 21:48:15 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  150. Sun Dec 25 21:48:15 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  151. Sun Dec 25 21:48:15 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  152. Sun Dec 25 21:48:15 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  153. Sun Dec 25 21:48:17 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  154. Sun Dec 25 21:48:17 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  155. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: timers and/or timeouts modified
  156. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: --ifconfig/up options modified
  157. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: route options modified
  158. Sun Dec 25 21:48:17 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  159. Sun Dec 25 21:48:17 2016 Preserving previous TUN/TAP instance: tun1
  160. Sun Dec 25 21:48:17 2016 Initialization Sequence Completed
  161. Sun Dec 25 21:48:21 2016 Connection reset, restarting [0]
  162. Sun Dec 25 21:48:21 2016 SIGUSR1[soft,connection-reset] received, process restarting
  163. Sun Dec 25 21:48:21 2016 Restart pause, 5 second(s)
  164. Sun Dec 25 21:48:26 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  165. Sun Dec 25 21:48:26 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  166. Sun Dec 25 21:48:26 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  167. Sun Dec 25 21:48:27 2016 TCP connection established with [AF_INET]139.59.238.204:443
  168. Sun Dec 25 21:48:27 2016 TCPv4_CLIENT link local: [undef]
  169. Sun Dec 25 21:48:27 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  170. Sun Dec 25 21:48:27 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=04f0df48 13d9af01
  171. Sun Dec 25 21:48:28 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  172. Sun Dec 25 21:48:28 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  173. Sun Dec 25 21:48:28 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  174. Sun Dec 25 21:48:28 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  175. Sun Dec 25 21:48:28 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  176. Sun Dec 25 21:48:28 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  177. Sun Dec 25 21:48:28 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  178. Sun Dec 25 21:48:28 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  179. Sun Dec 25 21:48:28 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  180. Sun Dec 25 21:48:28 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  181. Sun Dec 25 21:48:30 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  182. Sun Dec 25 21:48:30 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  183. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: timers and/or timeouts modified
  184. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: --ifconfig/up options modified
  185. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: route options modified
  186. Sun Dec 25 21:48:30 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  187. Sun Dec 25 21:48:30 2016 Preserving previous TUN/TAP instance: tun1
  188. Sun Dec 25 21:48:30 2016 Initialization Sequence Completed
  189. Sun Dec 25 21:48:35 2016 Connection reset, restarting [0]
  190. Sun Dec 25 21:48:35 2016 SIGUSR1[soft,connection-reset] received, process restarting
  191. Sun Dec 25 21:48:35 2016 Restart pause, 5 second(s)
  192. Sun Dec 25 21:48:40 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  193. Sun Dec 25 21:48:40 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  194. Sun Dec 25 21:48:40 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  195. Sun Dec 25 21:48:41 2016 TCP connection established with [AF_INET]139.59.238.204:443
  196. Sun Dec 25 21:48:41 2016 TCPv4_CLIENT link local: [undef]
  197. Sun Dec 25 21:48:41 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  198. Sun Dec 25 21:48:41 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=b562cb29 2464c985
  199. Sun Dec 25 21:48:41 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  200. Sun Dec 25 21:48:41 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  201. Sun Dec 25 21:48:42 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  202. Sun Dec 25 21:48:42 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  203. Sun Dec 25 21:48:42 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  204. Sun Dec 25 21:48:42 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  205. Sun Dec 25 21:48:42 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  206. Sun Dec 25 21:48:42 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  207. Sun Dec 25 21:48:42 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  208. Sun Dec 25 21:48:42 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  209. Sun Dec 25 21:48:44 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  210. Sun Dec 25 21:48:44 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  211. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: timers and/or timeouts modified
  212. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: --ifconfig/up options modified
  213. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: route options modified
  214. Sun Dec 25 21:48:44 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  215. Sun Dec 25 21:48:44 2016 Preserving previous TUN/TAP instance: tun1
  216. Sun Dec 25 21:48:44 2016 Initialization Sequence Completed
  217. Sun Dec 25 21:48:49 2016 Connection reset, restarting [0]
  218. Sun Dec 25 21:48:49 2016 SIGUSR1[soft,connection-reset] received, process restarting
  219. Sun Dec 25 21:48:49 2016 Restart pause, 5 second(s)
  220. Sun Dec 25 21:48:54 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  221. Sun Dec 25 21:48:54 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  222. Sun Dec 25 21:48:54 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  223. Sun Dec 25 21:48:55 2016 TCP connection established with [AF_INET]139.59.238.204:443
  224. Sun Dec 25 21:48:55 2016 TCPv4_CLIENT link local: [undef]
  225. Sun Dec 25 21:48:55 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  226. Sun Dec 25 21:48:55 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=92354711 feb768dd
  227. Sun Dec 25 21:48:55 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  228. Sun Dec 25 21:48:55 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  229. Sun Dec 25 21:48:55 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  230. Sun Dec 25 21:48:55 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  231. Sun Dec 25 21:48:55 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  232. Sun Dec 25 21:48:55 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  233. Sun Dec 25 21:48:55 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  234. Sun Dec 25 21:48:55 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  235. Sun Dec 25 21:48:55 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  236. Sun Dec 25 21:48:55 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  237. Sun Dec 25 21:48:57 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  238. Sun Dec 25 21:48:57 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  239. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: timers and/or timeouts modified
  240. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: --ifconfig/up options modified
  241. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: route options modified
  242. Sun Dec 25 21:48:57 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  243. Sun Dec 25 21:48:57 2016 Preserving previous TUN/TAP instance: tun1
  244. Sun Dec 25 21:48:57 2016 Initialization Sequence Completed
  245. Sun Dec 25 21:49:02 2016 Connection reset, restarting [0]
  246. Sun Dec 25 21:49:02 2016 SIGUSR1[soft,connection-reset] received, process restarting
  247. Sun Dec 25 21:49:02 2016 Restart pause, 5 second(s)
  248. Sun Dec 25 21:49:07 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  249. Sun Dec 25 21:49:07 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  250. Sun Dec 25 21:49:07 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  251. Sun Dec 25 21:49:08 2016 TCP connection established with [AF_INET]139.59.238.204:443
  252. Sun Dec 25 21:49:08 2016 TCPv4_CLIENT link local: [undef]
  253. Sun Dec 25 21:49:08 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  254. Sun Dec 25 21:49:08 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=9550cc4c 2a493360
  255. Sun Dec 25 21:49:08 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  256. Sun Dec 25 21:49:08 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  257. Sun Dec 25 21:49:09 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  258. Sun Dec 25 21:49:09 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  259. Sun Dec 25 21:49:09 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  260. Sun Dec 25 21:49:09 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  261. Sun Dec 25 21:49:09 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  262. Sun Dec 25 21:49:09 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  263. Sun Dec 25 21:49:09 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  264. Sun Dec 25 21:49:09 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  265. Sun Dec 25 21:49:11 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  266. Sun Dec 25 21:49:11 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  267. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: timers and/or timeouts modified
  268. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: --ifconfig/up options modified
  269. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: route options modified
  270. Sun Dec 25 21:49:11 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  271. Sun Dec 25 21:49:11 2016 Preserving previous TUN/TAP instance: tun1
  272. Sun Dec 25 21:49:11 2016 Initialization Sequence Completed
  273. Sun Dec 25 21:49:16 2016 Connection reset, restarting [0]
  274. Sun Dec 25 21:49:16 2016 SIGUSR1[soft,connection-reset] received, process restarting
  275. Sun Dec 25 21:49:16 2016 Restart pause, 5 second(s)
  276. Sun Dec 25 21:49:21 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  277. Sun Dec 25 21:49:21 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  278. Sun Dec 25 21:49:21 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  279. Sun Dec 25 21:49:22 2016 TCP connection established with [AF_INET]139.59.238.204:443
  280. Sun Dec 25 21:49:22 2016 TCPv4_CLIENT link local: [undef]
  281. Sun Dec 25 21:49:22 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  282. Sun Dec 25 21:49:22 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=c070fe9a 12c9e478
  283. Sun Dec 25 21:49:22 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  284. Sun Dec 25 21:49:22 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  285. Sun Dec 25 21:49:22 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  286. Sun Dec 25 21:49:22 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  287. Sun Dec 25 21:49:22 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  288. Sun Dec 25 21:49:22 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  289. Sun Dec 25 21:49:22 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  290. Sun Dec 25 21:49:22 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  291. Sun Dec 25 21:49:22 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  292. Sun Dec 25 21:49:22 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  293. Sun Dec 25 21:49:24 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  294. Sun Dec 25 21:49:25 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  295. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: timers and/or timeouts modified
  296. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: --ifconfig/up options modified
  297. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: route options modified
  298. Sun Dec 25 21:49:25 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  299. Sun Dec 25 21:49:25 2016 Preserving previous TUN/TAP instance: tun1
  300. Sun Dec 25 21:49:25 2016 Initialization Sequence Completed
  301. Sun Dec 25 21:49:29 2016 Connection reset, restarting [0]
  302. Sun Dec 25 21:49:29 2016 SIGUSR1[soft,connection-reset] received, process restarting
  303. Sun Dec 25 21:49:29 2016 Restart pause, 5 second(s)
  304. Sun Dec 25 21:49:34 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  305. Sun Dec 25 21:49:34 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  306. Sun Dec 25 21:49:34 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  307. Sun Dec 25 21:49:35 2016 TCP connection established with [AF_INET]139.59.238.204:443
  308. Sun Dec 25 21:49:35 2016 TCPv4_CLIENT link local: [undef]
  309. Sun Dec 25 21:49:35 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  310. Sun Dec 25 21:49:35 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=7a0ea802 29219d55
  311. Sun Dec 25 21:49:36 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  312. Sun Dec 25 21:49:36 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  313. Sun Dec 25 21:49:36 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  314. Sun Dec 25 21:49:36 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  315. Sun Dec 25 21:49:36 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  316. Sun Dec 25 21:49:36 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  317. Sun Dec 25 21:49:36 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  318. Sun Dec 25 21:49:36 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  319. Sun Dec 25 21:49:36 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  320. Sun Dec 25 21:49:36 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  321. Sun Dec 25 21:49:38 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  322. Sun Dec 25 21:49:38 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  323. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: timers and/or timeouts modified
  324. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: --ifconfig/up options modified
  325. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: route options modified
  326. Sun Dec 25 21:49:38 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  327. Sun Dec 25 21:49:38 2016 Preserving previous TUN/TAP instance: tun1
  328. Sun Dec 25 21:49:38 2016 Initialization Sequence Completed
  329. Sun Dec 25 21:49:43 2016 Connection reset, restarting [0]
  330. Sun Dec 25 21:49:43 2016 SIGUSR1[soft,connection-reset] received, process restarting
  331. Sun Dec 25 21:49:43 2016 Restart pause, 5 second(s)
  332. Sun Dec 25 21:49:48 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  333. Sun Dec 25 21:49:48 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  334. Sun Dec 25 21:49:48 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  335. Sun Dec 25 21:49:49 2016 TCP connection established with [AF_INET]139.59.238.204:443
  336. Sun Dec 25 21:49:49 2016 TCPv4_CLIENT link local: [undef]
  337. Sun Dec 25 21:49:49 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  338. Sun Dec 25 21:49:49 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=060bdd62 dcb37315
  339. Sun Dec 25 21:49:49 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  340. Sun Dec 25 21:49:49 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  341. Sun Dec 25 21:49:50 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  342. Sun Dec 25 21:49:50 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  343. Sun Dec 25 21:49:50 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  344. Sun Dec 25 21:49:50 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  345. Sun Dec 25 21:49:50 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  346. Sun Dec 25 21:49:50 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  347. Sun Dec 25 21:49:50 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  348. Sun Dec 25 21:49:50 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  349. Sun Dec 25 21:49:52 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  350. Sun Dec 25 21:49:52 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  351. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: timers and/or timeouts modified
  352. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: --ifconfig/up options modified
  353. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: route options modified
  354. Sun Dec 25 21:49:52 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  355. Sun Dec 25 21:49:52 2016 Preserving previous TUN/TAP instance: tun1
  356. Sun Dec 25 21:49:52 2016 Initialization Sequence Completed
  357. Sun Dec 25 21:49:56 2016 Connection reset, restarting [0]
  358. Sun Dec 25 21:49:56 2016 SIGUSR1[soft,connection-reset] received, process restarting
  359. Sun Dec 25 21:49:56 2016 Restart pause, 5 second(s)
  360. Sun Dec 25 21:50:01 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  361. Sun Dec 25 21:50:01 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  362. Sun Dec 25 21:50:01 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  363. Sun Dec 25 21:50:02 2016 TCP connection established with [AF_INET]139.59.238.204:443
  364. Sun Dec 25 21:50:02 2016 TCPv4_CLIENT link local: [undef]
  365. Sun Dec 25 21:50:02 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  366. Sun Dec 25 21:50:02 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=69f9686a 01cc05e3
  367. Sun Dec 25 21:50:03 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  368. Sun Dec 25 21:50:03 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  369. Sun Dec 25 21:50:03 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  370. Sun Dec 25 21:50:03 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  371. Sun Dec 25 21:50:03 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  372. Sun Dec 25 21:50:03 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  373. Sun Dec 25 21:50:03 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  374. Sun Dec 25 21:50:03 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  375. Sun Dec 25 21:50:03 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  376. Sun Dec 25 21:50:03 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  377. Sun Dec 25 21:50:06 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  378. Sun Dec 25 21:50:06 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  379. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: timers and/or timeouts modified
  380. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: --ifconfig/up options modified
  381. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: route options modified
  382. Sun Dec 25 21:50:06 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  383. Sun Dec 25 21:50:06 2016 Preserving previous TUN/TAP instance: tun1
  384. Sun Dec 25 21:50:06 2016 Initialization Sequence Completed
  385. Sun Dec 25 21:50:10 2016 Connection reset, restarting [0]
  386. Sun Dec 25 21:50:10 2016 SIGUSR1[soft,connection-reset] received, process restarting
  387. Sun Dec 25 21:50:10 2016 Restart pause, 5 second(s)
  388. Sun Dec 25 21:50:15 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  389. Sun Dec 25 21:50:15 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  390. Sun Dec 25 21:50:15 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  391. Sun Dec 25 21:50:16 2016 TCP connection established with [AF_INET]139.59.238.204:443
  392. Sun Dec 25 21:50:16 2016 TCPv4_CLIENT link local: [undef]
  393. Sun Dec 25 21:50:16 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  394. Sun Dec 25 21:50:16 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=2b3db0f1 fcaf2ae2
  395. Sun Dec 25 21:50:16 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  396. Sun Dec 25 21:50:16 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  397. Sun Dec 25 21:50:17 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  398. Sun Dec 25 21:50:17 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  399. Sun Dec 25 21:50:17 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  400. Sun Dec 25 21:50:17 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  401. Sun Dec 25 21:50:17 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  402. Sun Dec 25 21:50:17 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  403. Sun Dec 25 21:50:17 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  404. Sun Dec 25 21:50:17 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  405. Sun Dec 25 21:50:19 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  406. Sun Dec 25 21:50:19 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  407. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: timers and/or timeouts modified
  408. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: --ifconfig/up options modified
  409. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: route options modified
  410. Sun Dec 25 21:50:19 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  411. Sun Dec 25 21:50:19 2016 Preserving previous TUN/TAP instance: tun1
  412. Sun Dec 25 21:50:19 2016 Initialization Sequence Completed
  413. Sun Dec 25 21:50:23 2016 Connection reset, restarting [0]
  414. Sun Dec 25 21:50:23 2016 SIGUSR1[soft,connection-reset] received, process restarting
  415. Sun Dec 25 21:50:23 2016 Restart pause, 5 second(s)
  416. Sun Dec 25 21:50:28 2016 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  417. Sun Dec 25 21:50:28 2016 Socket Buffers: R=[87380->87380] S=[16384->16384]
  418. Sun Dec 25 21:50:28 2016 Attempting to establish TCP connection with [AF_INET]139.59.238.204:443 [nonblock]
  419. Sun Dec 25 21:50:29 2016 TCP connection established with [AF_INET]139.59.238.204:443
  420. Sun Dec 25 21:50:29 2016 TCPv4_CLIENT link local: [undef]
  421. Sun Dec 25 21:50:29 2016 TCPv4_CLIENT link remote: [AF_INET]139.59.238.204:443
  422. Sun Dec 25 21:50:29 2016 TLS: Initial packet from [AF_INET]139.59.238.204:443, sid=4cbe9153 232cff87
  423. Sun Dec 25 21:50:30 2016 VERIFY OK: depth=1, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  424. Sun Dec 25 21:50:30 2016 VERIFY OK: depth=0, C=US, ST=openvpn, L=openvpn, O=openvpn, OU=openvpn, CN=openvpn, name=openvpn, emailAddress=openvpn
  425. Sun Dec 25 21:50:30 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  426. Sun Dec 25 21:50:30 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  427. Sun Dec 25 21:50:30 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  428. Sun Dec 25 21:50:30 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  429. Sun Dec 25 21:50:30 2016 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
  430. Sun Dec 25 21:50:30 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  431. Sun Dec 25 21:50:30 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  432. Sun Dec 25 21:50:30 2016 [openvpn] Peer Connection Initiated with [AF_INET]139.59.238.204:443
  433. Sun Dec 25 21:50:32 2016 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  434. Sun Dec 25 21:50:33 2016 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig 10.8.0.22 10.8.0.21'
  435. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: timers and/or timeouts modified
  436. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: --ifconfig/up options modified
  437. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: route options modified
  438. Sun Dec 25 21:50:33 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  439. Sun Dec 25 21:50:33 2016 Preserving previous TUN/TAP instance: tun1
  440. Sun Dec 25 21:50:33 2016 Initialization Sequence Completed
  441. Sun Dec 25 21:50:37 2016 Connection reset, restarting [0]
  442. Sun Dec 25 21:50:37 2016 SIGUSR1[soft,connection-reset] received, process restarting
  443. Sun Dec 25 21:50:37 2016 Restart pause, 5 second(s)
  444. ^CSun Dec 25 21:50:37 2016 Assertion failed at misc.c:785 (es)
  445. Sun Dec 25 21:50:37 2016 Exiting due to fatal error
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement