Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sun Jan 26 01:06:10 2020 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
- Sun Jan 26 01:06:10 2020 Windows version 6.2 (Windows 8 or greater) 64bit
- Sun Jan 26 01:06:10 2020 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10
- Enter Management Password:
- Sun Jan 26 01:06:10 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Sun Jan 26 01:06:10 2020 Need hold release from management interface, waiting...
- Sun Jan 26 01:06:11 2020 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'state on'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'log all on'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'echo all on'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'bytecount 5'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'hold off'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'hold release'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'username "Auth" "njgysling@protonmail.com"'
- Sun Jan 26 01:06:11 2020 MANAGEMENT: CMD 'password [...]'
- Sun Jan 26 01:06:11 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Sun Jan 26 01:06:11 2020 NOTE: --fast-io is disabled since we are running on Windows
- Sun Jan 26 01:06:11 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Jan 26 01:06:11 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Jan 26 01:06:11 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]23.226.132.227:443
- Sun Jan 26 01:06:11 2020 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sun Jan 26 01:06:11 2020 Attempting to establish TCP connection with [AF_INET]23.226.132.227:443 [nonblock]
- Sun Jan 26 01:06:11 2020 MANAGEMENT: >STATE:1580018771,TCP_CONNECT,,,,,,
- Sun Jan 26 01:06:12 2020 TCP connection established with [AF_INET]23.226.132.227:443
- Sun Jan 26 01:06:12 2020 TCP_CLIENT link local: (not bound)
- Sun Jan 26 01:06:12 2020 TCP_CLIENT link remote: [AF_INET]23.226.132.227:443
- Sun Jan 26 01:06:12 2020 MANAGEMENT: >STATE:1580018772,WAIT,,,,,,
- Sun Jan 26 01:06:12 2020 MANAGEMENT: >STATE:1580018772,AUTH,,,,,,
- Sun Jan 26 01:06:12 2020 TLS: Initial packet from [AF_INET]23.226.132.227:443, sid=7f65b675 ce661607
- Sun Jan 26 01:06:12 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Jan 26 01:06:13 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Sun Jan 26 01:06:13 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA4
- Sun Jan 26 01:06:13 2020 VERIFY KU OK
- Sun Jan 26 01:06:13 2020 Validating certificate extended key usage
- Sun Jan 26 01:06:13 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Jan 26 01:06:13 2020 VERIFY EKU OK
- Sun Jan 26 01:06:13 2020 VERIFY OK: depth=0, CN=us3395.nordvpn.com
- Sun Jan 26 01:06:13 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Sun Jan 26 01:06:13 2020 [us3395.nordvpn.com] Peer Connection Initiated with [AF_INET]23.226.132.227:443
- Sun Jan 26 01:06:14 2020 MANAGEMENT: >STATE:1580018774,GET_CONFIG,,,,,,
- Sun Jan 26 01:06:14 2020 SENT CONTROL [us3395.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun Jan 26 01:06:14 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.2.7 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: compression parms modified
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Jan 26 01:06:14 2020 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: route options modified
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: route-related options modified
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: peer-id set
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
- Sun Jan 26 01:06:14 2020 OPTIONS IMPORT: data channel crypto options modified
- Sun Jan 26 01:06:14 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
- Sun Jan 26 01:06:14 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Jan 26 01:06:14 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Jan 26 01:06:14 2020 interactive service msg_channel=0
- Sun Jan 26 01:06:14 2020 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=4 HWADDR=50:3e:aa:48:38:5a
- Sun Jan 26 01:06:14 2020 open_tun
- Sun Jan 26 01:06:14 2020 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{307A1B0C-B215-46CB-9C84-CB8E07BCCFAE}.tap
- Sun Jan 26 01:06:14 2020 TAP-Windows Driver Version 9.24
- Sun Jan 26 01:06:14 2020 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.2.0/10.7.2.7/255.255.255.0 [SUCCEEDED]
- Sun Jan 26 01:06:14 2020 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.2.7/255.255.255.0 on interface {307A1B0C-B215-46CB-9C84-CB8E07BCCFAE} [DHCP-serv: 10.7.2.254, lease-time: 31536000]
- Sun Jan 26 01:06:14 2020 Successful ARP Flush on interface [8] {307A1B0C-B215-46CB-9C84-CB8E07BCCFAE}
- Sun Jan 26 01:06:14 2020 MANAGEMENT: >STATE:1580018774,ASSIGN_IP,,10.7.2.7,,,,
- Sun Jan 26 01:06:19 2020 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
- Sun Jan 26 01:06:19 2020 C:\WINDOWS\system32\route.exe ADD 23.226.132.227 MASK 255.255.255.255 192.168.1.1
- Sun Jan 26 01:06:19 2020 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Sun Jan 26 01:06:19 2020 Route addition via IPAPI succeeded [adaptive]
- Sun Jan 26 01:06:19 2020 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.2.1
- Sun Jan 26 01:06:19 2020 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Sun Jan 26 01:06:19 2020 Route addition via IPAPI succeeded [adaptive]
- Sun Jan 26 01:06:19 2020 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.2.1
- Sun Jan 26 01:06:19 2020 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Sun Jan 26 01:06:19 2020 Route addition via IPAPI succeeded [adaptive]
- Sun Jan 26 01:06:19 2020 Initialization Sequence Completed
- Sun Jan 26 01:06:19 2020 MANAGEMENT: >STATE:1580018779,CONNECTED,SUCCESS,10.7.2.7,23.226.132.227,443,192.168.1.2,51666
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement