Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Mon May 13 20:52:58 2019 write TCP_CLIENT: Unknown error (code=10054)
- Mon May 13 20:52:58 2019 read TCP_CLIENT: Unknown error (code=10060)
- Mon May 13 20:52:58 2019 Connection reset, restarting [-1]
- Mon May 13 20:52:58 2019 SIGUSR1[soft,connection-reset] received, process restarting
- Mon May 13 20:52:58 2019 Restart pause, 1 second(s)
- Mon May 13 20:52:59 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 20:52:59 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon May 13 20:52:59 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
- Mon May 13 20:53:03 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 20:53:03 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon May 13 20:53:03 2019 TCP_CLIENT link local: (not bound)
- Mon May 13 20:53:03 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 20:53:03 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=e1c2e692 f83ad2f5
- Mon May 13 20:53:03 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
- Mon May 13 20:53:03 2019 MANAGEMENT: CMD 'password [...]'
- Mon May 13 20:53:03 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
- Mon May 13 20:53:03 2019 VERIFY KU OK
- Mon May 13 20:53:03 2019 Validating certificate extended key usage
- Mon May 13 20:53:03 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 13 20:53:03 2019 VERIFY EKU OK
- Mon May 13 20:53:03 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
- Mon May 13 20:53:04 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
- Mon May 13 20:53:04 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
- Mon May 13 20:53:04 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 13 20:53:04 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 20:53:05 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon May 13 20:53:05 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: compression parms modified
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: --socket-flags option modified
- Mon May 13 20:53:05 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: route-related options modified
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: peer-id set
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon May 13 20:53:05 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon May 13 20:53:05 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon May 13 20:53:05 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 13 20:53:05 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 13 20:53:05 2019 Preserving previous TUN/TAP instance: FrozenWay
- Mon May 13 20:53:05 2019 Initialization Sequence Completed
- Mon May 13 21:01:43 2019 read TCP_CLIENT: Unknown error (code=10060)
- Mon May 13 21:01:43 2019 Connection reset, restarting [-1]
- Mon May 13 21:01:43 2019 SIGUSR1[soft,connection-reset] received, process restarting
- Mon May 13 21:01:43 2019 Restart pause, 1 second(s)
- Mon May 13 21:01:44 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:01:44 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon May 13 21:01:44 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
- Mon May 13 21:01:45 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:01:45 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon May 13 21:01:45 2019 TCP_CLIENT link local: (not bound)
- Mon May 13 21:01:45 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:01:45 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=e0a5fd16 72f80da2
- Mon May 13 21:01:45 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
- Mon May 13 21:01:45 2019 MANAGEMENT: CMD 'password [...]'
- Mon May 13 21:01:45 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
- Mon May 13 21:01:45 2019 VERIFY KU OK
- Mon May 13 21:01:45 2019 Validating certificate extended key usage
- Mon May 13 21:01:45 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 13 21:01:45 2019 VERIFY EKU OK
- Mon May 13 21:01:45 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
- Mon May 13 21:01:45 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
- Mon May 13 21:01:45 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
- Mon May 13 21:01:45 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 13 21:01:45 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:01:46 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon May 13 21:01:46 2019 Initialization Sequence Completed
- Mon May 13 21:05:49 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: compression parms modified
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: --socket-flags option modified
- Mon May 13 21:05:49 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: route-related options modified
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: peer-id set
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon May 13 21:05:49 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon May 13 21:05:49 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon May 13 21:05:49 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 13 21:05:49 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 13 21:05:49 2019 Preserving previous TUN/TAP instance: FrozenWay
- Mon May 13 21:05:49 2019 Initialization Sequence Completed
- Mon May 13 21:08:46 2019 read TCP_CLIENT: Unknown error (code=10060)
- Mon May 13 21:08:46 2019 Connection reset, restarting [-1]
- Mon May 13 21:08:46 2019 SIGUSR1[soft,connection-reset] received, process restarting
- Mon May 13 21:08:46 2019 Restart pause, 1 second(s)
- Mon May 13 21:08:47 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:08:47 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon May 13 21:08:47 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
- Mon May 13 21:08:57 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:08:57 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon May 13 21:08:57 2019 TCP_CLIENT link local: (not bound)
- Mon May 13 21:08:57 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:08:57 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=40789f3e f855e099
- Mon May 13 21:08:57 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
- Mon May 13 21:08:57 2019 MANAGEMENT: CMD 'password [...]'
- Mon May 13 21:08:57 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
- Mon May 13 21:08:57 2019 VERIFY KU OK
- Mon May 13 21:08:57 2019 Validating certificate extended key usage
- Mon May 13 21:08:57 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 13 21:08:57 2019 VERIFY EKU OK
- Mon May 13 21:08:57 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
- Mon May 13 21:08:57 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
- Mon May 13 21:08:57 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
- Mon May 13 21:08:57 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 13 21:08:57 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
- Mon May 13 21:08:58 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon May 13 21:08:58 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: compression parms modified
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: --socket-flags option modified
- Mon May 13 21:08:58 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: route-related options modified
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: peer-id set
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon May 13 21:08:58 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon May 13 21:08:58 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon May 13 21:08:58 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 13 21:08:58 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 13 21:08:58 2019 Preserving previous TUN/TAP instance: FrozenWay
- Mon May 13 21:08:58 2019 Initialization Sequence Complet
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement