Advertisement
Guest User

Frozenway

a guest
May 13th, 2019
161
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 10.67 KB | None | 0 0
  1. Mon May 13 20:52:58 2019 write TCP_CLIENT: Unknown error (code=10054)
  2. Mon May 13 20:52:58 2019 read TCP_CLIENT: Unknown error (code=10060)
  3. Mon May 13 20:52:58 2019 Connection reset, restarting [-1]
  4.  
  5. Mon May 13 20:52:58 2019 SIGUSR1[soft,connection-reset] received, process restarting
  6. Mon May 13 20:52:58 2019 Restart pause, 1 second(s)
  7.  
  8. Mon May 13 20:52:59 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
  9.  
  10. Mon May 13 20:52:59 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  11. Mon May 13 20:52:59 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
  12.  
  13. Mon May 13 20:53:03 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
  14. Mon May 13 20:53:03 2019 Socket flags: TCP_NODELAY=1 succeeded
  15. Mon May 13 20:53:03 2019 TCP_CLIENT link local: (not bound)
  16. Mon May 13 20:53:03 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
  17.  
  18. Mon May 13 20:53:03 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=e1c2e692 f83ad2f5
  19.  
  20. Mon May 13 20:53:03 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
  21.  
  22. Mon May 13 20:53:03 2019 MANAGEMENT: CMD 'password [...]'
  23.  
  24. Mon May 13 20:53:03 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  25.  
  26. Mon May 13 20:53:03 2019 VERIFY KU OK
  27. Mon May 13 20:53:03 2019 Validating certificate extended key usage
  28. Mon May 13 20:53:03 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  29. Mon May 13 20:53:03 2019 VERIFY EKU OK
  30. Mon May 13 20:53:03 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  31.  
  32. Mon May 13 20:53:04 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  33. Mon May 13 20:53:04 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  34.  
  35. Mon May 13 20:53:04 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  36.  
  37. Mon May 13 20:53:04 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
  38.  
  39. Mon May 13 20:53:05 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  40.  
  41. Mon May 13 20:53:05 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  42.  
  43. Mon May 13 20:53:05 2019 OPTIONS IMPORT: compression parms modified
  44. Mon May 13 20:53:05 2019 OPTIONS IMPORT: --socket-flags option modified
  45. Mon May 13 20:53:05 2019 Socket flags: TCP_NODELAY=1 succeeded
  46. Mon May 13 20:53:05 2019 OPTIONS IMPORT: --ifconfig/up options modified
  47. Mon May 13 20:53:05 2019 OPTIONS IMPORT: route-related options modified
  48. Mon May 13 20:53:05 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  49. Mon May 13 20:53:05 2019 OPTIONS IMPORT: peer-id set
  50. Mon May 13 20:53:05 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  51. Mon May 13 20:53:05 2019 OPTIONS IMPORT: data channel crypto options modified
  52. Mon May 13 20:53:05 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  53. Mon May 13 20:53:05 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  54. Mon May 13 20:53:05 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  55. Mon May 13 20:53:05 2019 Preserving previous TUN/TAP instance: FrozenWay
  56.  
  57. Mon May 13 20:53:05 2019 Initialization Sequence Completed
  58.  
  59. Mon May 13 21:01:43 2019 read TCP_CLIENT: Unknown error (code=10060)
  60. Mon May 13 21:01:43 2019 Connection reset, restarting [-1]
  61.  
  62. Mon May 13 21:01:43 2019 SIGUSR1[soft,connection-reset] received, process restarting
  63. Mon May 13 21:01:43 2019 Restart pause, 1 second(s)
  64.  
  65. Mon May 13 21:01:44 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
  66.  
  67. Mon May 13 21:01:44 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  68. Mon May 13 21:01:44 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
  69.  
  70. Mon May 13 21:01:45 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
  71. Mon May 13 21:01:45 2019 Socket flags: TCP_NODELAY=1 succeeded
  72. Mon May 13 21:01:45 2019 TCP_CLIENT link local: (not bound)
  73. Mon May 13 21:01:45 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
  74.  
  75. Mon May 13 21:01:45 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=e0a5fd16 72f80da2
  76.  
  77. Mon May 13 21:01:45 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
  78.  
  79. Mon May 13 21:01:45 2019 MANAGEMENT: CMD 'password [...]'
  80.  
  81. Mon May 13 21:01:45 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  82.  
  83. Mon May 13 21:01:45 2019 VERIFY KU OK
  84. Mon May 13 21:01:45 2019 Validating certificate extended key usage
  85. Mon May 13 21:01:45 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  86. Mon May 13 21:01:45 2019 VERIFY EKU OK
  87. Mon May 13 21:01:45 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  88.  
  89. Mon May 13 21:01:45 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  90. Mon May 13 21:01:45 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  91.  
  92. Mon May 13 21:01:45 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  93.  
  94. Mon May 13 21:01:45 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
  95.  
  96. Mon May 13 21:01:46 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  97.  
  98.  
  99. Mon May 13 21:01:46 2019 Initialization Sequence Completed
  100.  
  101. Mon May 13 21:05:49 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  102.  
  103. Mon May 13 21:05:49 2019 OPTIONS IMPORT: compression parms modified
  104. Mon May 13 21:05:49 2019 OPTIONS IMPORT: --socket-flags option modified
  105. Mon May 13 21:05:49 2019 Socket flags: TCP_NODELAY=1 succeeded
  106. Mon May 13 21:05:49 2019 OPTIONS IMPORT: --ifconfig/up options modified
  107. Mon May 13 21:05:49 2019 OPTIONS IMPORT: route-related options modified
  108. Mon May 13 21:05:49 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  109. Mon May 13 21:05:49 2019 OPTIONS IMPORT: peer-id set
  110. Mon May 13 21:05:49 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  111. Mon May 13 21:05:49 2019 OPTIONS IMPORT: data channel crypto options modified
  112. Mon May 13 21:05:49 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  113.  
  114. Mon May 13 21:05:49 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  115. Mon May 13 21:05:49 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  116. Mon May 13 21:05:49 2019 Preserving previous TUN/TAP instance: FrozenWay
  117.  
  118. Mon May 13 21:05:49 2019 Initialization Sequence Completed
  119.  
  120. Mon May 13 21:08:46 2019 read TCP_CLIENT: Unknown error (code=10060)
  121. Mon May 13 21:08:46 2019 Connection reset, restarting [-1]
  122.  
  123. Mon May 13 21:08:46 2019 SIGUSR1[soft,connection-reset] received, process restarting
  124. Mon May 13 21:08:46 2019 Restart pause, 1 second(s)
  125.  
  126. Mon May 13 21:08:47 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
  127.  
  128. Mon May 13 21:08:47 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  129. Mon May 13 21:08:47 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
  130.  
  131. Mon May 13 21:08:57 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
  132. Mon May 13 21:08:57 2019 Socket flags: TCP_NODELAY=1 succeeded
  133. Mon May 13 21:08:57 2019 TCP_CLIENT link local: (not bound)
  134. Mon May 13 21:08:57 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
  135.  
  136. Mon May 13 21:08:57 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=40789f3e f855e099
  137.  
  138. Mon May 13 21:08:57 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
  139.  
  140. Mon May 13 21:08:57 2019 MANAGEMENT: CMD 'password [...]'
  141.  
  142. Mon May 13 21:08:57 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  143.  
  144. Mon May 13 21:08:57 2019 VERIFY KU OK
  145. Mon May 13 21:08:57 2019 Validating certificate extended key usage
  146. Mon May 13 21:08:57 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  147. Mon May 13 21:08:57 2019 VERIFY EKU OK
  148. Mon May 13 21:08:57 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  149.  
  150. Mon May 13 21:08:57 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  151. Mon May 13 21:08:57 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  152. Mon May 13 21:08:57 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  153.  
  154. Mon May 13 21:08:57 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
  155.  
  156. Mon May 13 21:08:58 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  157.  
  158. Mon May 13 21:08:58 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  159. Mon May 13 21:08:58 2019 OPTIONS IMPORT: compression parms modified
  160. Mon May 13 21:08:58 2019 OPTIONS IMPORT: --socket-flags option modified
  161. Mon May 13 21:08:58 2019 Socket flags: TCP_NODELAY=1 succeeded
  162. Mon May 13 21:08:58 2019 OPTIONS IMPORT: --ifconfig/up options modified
  163. Mon May 13 21:08:58 2019 OPTIONS IMPORT: route-related options modified
  164. Mon May 13 21:08:58 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  165.  
  166. Mon May 13 21:08:58 2019 OPTIONS IMPORT: peer-id set
  167. Mon May 13 21:08:58 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  168. Mon May 13 21:08:58 2019 OPTIONS IMPORT: data channel crypto options modified
  169. Mon May 13 21:08:58 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  170. Mon May 13 21:08:58 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  171. Mon May 13 21:08:58 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  172. Mon May 13 21:08:58 2019 Preserving previous TUN/TAP instance: FrozenWay
  173. Mon May 13 21:08:58 2019 Initialization Sequence Complet
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement