SHARE
TWEET

Frozenway

a guest May 13th, 2019 85 Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. Mon May 13 20:52:58 2019 write TCP_CLIENT: Unknown error (code=10054)
  2. Mon May 13 20:52:58 2019 read TCP_CLIENT: Unknown error (code=10060)
  3. Mon May 13 20:52:58 2019 Connection reset, restarting [-1]
  4.  
  5. Mon May 13 20:52:58 2019 SIGUSR1[soft,connection-reset] received, process restarting
  6. Mon May 13 20:52:58 2019 Restart pause, 1 second(s)
  7.  
  8. Mon May 13 20:52:59 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
  9.  
  10. Mon May 13 20:52:59 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  11. Mon May 13 20:52:59 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
  12.  
  13. Mon May 13 20:53:03 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
  14. Mon May 13 20:53:03 2019 Socket flags: TCP_NODELAY=1 succeeded
  15. Mon May 13 20:53:03 2019 TCP_CLIENT link local: (not bound)
  16. Mon May 13 20:53:03 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
  17.  
  18. Mon May 13 20:53:03 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=e1c2e692 f83ad2f5
  19.  
  20. Mon May 13 20:53:03 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
  21.  
  22. Mon May 13 20:53:03 2019 MANAGEMENT: CMD 'password [...]'
  23.  
  24. Mon May 13 20:53:03 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  25.  
  26. Mon May 13 20:53:03 2019 VERIFY KU OK
  27. Mon May 13 20:53:03 2019 Validating certificate extended key usage
  28. Mon May 13 20:53:03 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  29. Mon May 13 20:53:03 2019 VERIFY EKU OK
  30. Mon May 13 20:53:03 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  31.  
  32. Mon May 13 20:53:04 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  33. Mon May 13 20:53:04 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  34.  
  35. Mon May 13 20:53:04 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  36.  
  37. Mon May 13 20:53:04 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
  38.  
  39. Mon May 13 20:53:05 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  40.  
  41. Mon May 13 20:53:05 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  42.  
  43. Mon May 13 20:53:05 2019 OPTIONS IMPORT: compression parms modified
  44. Mon May 13 20:53:05 2019 OPTIONS IMPORT: --socket-flags option modified
  45. Mon May 13 20:53:05 2019 Socket flags: TCP_NODELAY=1 succeeded
  46. Mon May 13 20:53:05 2019 OPTIONS IMPORT: --ifconfig/up options modified
  47. Mon May 13 20:53:05 2019 OPTIONS IMPORT: route-related options modified
  48. Mon May 13 20:53:05 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  49. Mon May 13 20:53:05 2019 OPTIONS IMPORT: peer-id set
  50. Mon May 13 20:53:05 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  51. Mon May 13 20:53:05 2019 OPTIONS IMPORT: data channel crypto options modified
  52. Mon May 13 20:53:05 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  53. Mon May 13 20:53:05 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  54. Mon May 13 20:53:05 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  55. Mon May 13 20:53:05 2019 Preserving previous TUN/TAP instance: FrozenWay
  56.  
  57. Mon May 13 20:53:05 2019 Initialization Sequence Completed
  58.  
  59. Mon May 13 21:01:43 2019 read TCP_CLIENT: Unknown error (code=10060)
  60. Mon May 13 21:01:43 2019 Connection reset, restarting [-1]
  61.  
  62. Mon May 13 21:01:43 2019 SIGUSR1[soft,connection-reset] received, process restarting
  63. Mon May 13 21:01:43 2019 Restart pause, 1 second(s)
  64.  
  65. Mon May 13 21:01:44 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
  66.  
  67. Mon May 13 21:01:44 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  68. Mon May 13 21:01:44 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
  69.  
  70. Mon May 13 21:01:45 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
  71. Mon May 13 21:01:45 2019 Socket flags: TCP_NODELAY=1 succeeded
  72. Mon May 13 21:01:45 2019 TCP_CLIENT link local: (not bound)
  73. Mon May 13 21:01:45 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
  74.  
  75. Mon May 13 21:01:45 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=e0a5fd16 72f80da2
  76.  
  77. Mon May 13 21:01:45 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
  78.  
  79. Mon May 13 21:01:45 2019 MANAGEMENT: CMD 'password [...]'
  80.  
  81. Mon May 13 21:01:45 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  82.  
  83. Mon May 13 21:01:45 2019 VERIFY KU OK
  84. Mon May 13 21:01:45 2019 Validating certificate extended key usage
  85. Mon May 13 21:01:45 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  86. Mon May 13 21:01:45 2019 VERIFY EKU OK
  87. Mon May 13 21:01:45 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  88.  
  89. Mon May 13 21:01:45 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  90. Mon May 13 21:01:45 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  91.  
  92. Mon May 13 21:01:45 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  93.  
  94. Mon May 13 21:01:45 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
  95.  
  96. Mon May 13 21:01:46 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  97.  
  98.  
  99. Mon May 13 21:01:46 2019 Initialization Sequence Completed
  100.  
  101. Mon May 13 21:05:49 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  102.  
  103. Mon May 13 21:05:49 2019 OPTIONS IMPORT: compression parms modified
  104. Mon May 13 21:05:49 2019 OPTIONS IMPORT: --socket-flags option modified
  105. Mon May 13 21:05:49 2019 Socket flags: TCP_NODELAY=1 succeeded
  106. Mon May 13 21:05:49 2019 OPTIONS IMPORT: --ifconfig/up options modified
  107. Mon May 13 21:05:49 2019 OPTIONS IMPORT: route-related options modified
  108. Mon May 13 21:05:49 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  109. Mon May 13 21:05:49 2019 OPTIONS IMPORT: peer-id set
  110. Mon May 13 21:05:49 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  111. Mon May 13 21:05:49 2019 OPTIONS IMPORT: data channel crypto options modified
  112. Mon May 13 21:05:49 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  113.  
  114. Mon May 13 21:05:49 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  115. Mon May 13 21:05:49 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  116. Mon May 13 21:05:49 2019 Preserving previous TUN/TAP instance: FrozenWay
  117.  
  118. Mon May 13 21:05:49 2019 Initialization Sequence Completed
  119.  
  120. Mon May 13 21:08:46 2019 read TCP_CLIENT: Unknown error (code=10060)
  121. Mon May 13 21:08:46 2019 Connection reset, restarting [-1]
  122.  
  123. Mon May 13 21:08:46 2019 SIGUSR1[soft,connection-reset] received, process restarting
  124. Mon May 13 21:08:46 2019 Restart pause, 1 second(s)
  125.  
  126. Mon May 13 21:08:47 2019 TCP/UDP: Preserving recently used remote address: [AF_INET6]64:ff9b::d453:82f5:443
  127.  
  128. Mon May 13 21:08:47 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  129. Mon May 13 21:08:47 2019 Attempting to establish TCP connection with [AF_INET6]64:ff9b::d453:82f5:443 [nonblock]
  130.  
  131. Mon May 13 21:08:57 2019 TCP connection established with [AF_INET6]64:ff9b::d453:82f5:443
  132. Mon May 13 21:08:57 2019 Socket flags: TCP_NODELAY=1 succeeded
  133. Mon May 13 21:08:57 2019 TCP_CLIENT link local: (not bound)
  134. Mon May 13 21:08:57 2019 TCP_CLIENT link remote: [AF_INET6]64:ff9b::d453:82f5:443
  135.  
  136. Mon May 13 21:08:57 2019 TLS: Initial packet from [AF_INET6]64:ff9b::d453:82f5:443, sid=40789f3e f855e099
  137.  
  138. Mon May 13 21:08:57 2019 MANAGEMENT: CMD 'username "Auth" Eohor'
  139.  
  140. Mon May 13 21:08:57 2019 MANAGEMENT: CMD 'password [...]'
  141.  
  142. Mon May 13 21:08:57 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  143.  
  144. Mon May 13 21:08:57 2019 VERIFY KU OK
  145. Mon May 13 21:08:57 2019 Validating certificate extended key usage
  146. Mon May 13 21:08:57 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  147. Mon May 13 21:08:57 2019 VERIFY EKU OK
  148. Mon May 13 21:08:57 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  149.  
  150. Mon May 13 21:08:57 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  151. Mon May 13 21:08:57 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  152. Mon May 13 21:08:57 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  153.  
  154. Mon May 13 21:08:57 2019 [server] Peer Connection Initiated with [AF_INET6]64:ff9b::d453:82f5:443
  155.  
  156. Mon May 13 21:08:58 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  157.  
  158. Mon May 13 21:08:58 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.38 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  159. Mon May 13 21:08:58 2019 OPTIONS IMPORT: compression parms modified
  160. Mon May 13 21:08:58 2019 OPTIONS IMPORT: --socket-flags option modified
  161. Mon May 13 21:08:58 2019 Socket flags: TCP_NODELAY=1 succeeded
  162. Mon May 13 21:08:58 2019 OPTIONS IMPORT: --ifconfig/up options modified
  163. Mon May 13 21:08:58 2019 OPTIONS IMPORT: route-related options modified
  164. Mon May 13 21:08:58 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  165.  
  166. Mon May 13 21:08:58 2019 OPTIONS IMPORT: peer-id set
  167. Mon May 13 21:08:58 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  168. Mon May 13 21:08:58 2019 OPTIONS IMPORT: data channel crypto options modified
  169. Mon May 13 21:08:58 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  170. Mon May 13 21:08:58 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  171. Mon May 13 21:08:58 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  172. Mon May 13 21:08:58 2019 Preserving previous TUN/TAP instance: FrozenWay
  173. Mon May 13 21:08:58 2019 Initialization Sequence Complet
RAW Paste Data
We use cookies for various purposes including analytics. By continuing to use Pastebin, you agree to our use of cookies as described in the Cookies Policy. OK, I Understand
 
Top