Advertisement
Guest User

Untitled

a guest
Oct 13th, 2019
165
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 19.24 KB | None | 0 0
  1. Sun Oct 13 23:34:50 2019 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
  2. Sun Oct 13 23:34:50 2019 Windows version 6.1 (Windows 7) 64bit
  3. Sun Oct 13 23:34:50 2019 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  4. Enter Management Password:
  5. Sun Oct 13 23:34:50 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  6. Sun Oct 13 23:34:50 2019 Need hold release from management interface, waiting...
  7. Sun Oct 13 23:34:50 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  8. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'state on'
  9. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'log all on'
  10. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'echo all on'
  11. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'hold off'
  12. Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'hold release'
  13. Sun Oct 13 23:34:50 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  14. Sun Oct 13 23:34:51 2019 MANAGEMENT: CMD 'password [...]'
  15. Sun Oct 13 23:34:51 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  16. Sun Oct 13 23:34:51 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  17. Sun Oct 13 23:34:51 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  18. Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,RESOLVE,,,,,,
  19. Sun Oct 13 23:34:51 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]62.210.99.189:1194
  20. Sun Oct 13 23:34:51 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
  21. Sun Oct 13 23:34:51 2019 UDP link local: (not bound)
  22. Sun Oct 13 23:34:51 2019 UDP link remote: [AF_INET]62.210.99.189:1194
  23. Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,WAIT,,,,,,
  24. Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,AUTH,,,,,,
  25. Sun Oct 13 23:34:51 2019 TLS: Initial packet from [AF_INET]62.210.99.189:1194, sid=19dacc78 d10f5310
  26. Sun Oct 13 23:34:51 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  27. Sun Oct 13 23:34:51 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  28. Sun Oct 13 23:34:52 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  29. Sun Oct 13 23:34:52 2019 [server] Peer Connection Initiated with [AF_INET]62.210.99.189:1194
  30. Sun Oct 13 23:34:53 2019 MANAGEMENT: >STATE:1570995293,GET_CONFIG,,,,,,
  31. Sun Oct 13 23:34:53 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  32. Sun Oct 13 23:34:53 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 192.168.50.1,route 192.168.50.0 255.255.255.0,explicit-exit-notify 3,sndbuf 393216,rcvbuf 393216,route 192.168.50.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.50.118 192.168.50.117'
  33. Sun Oct 13 23:34:53 2019 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:4 is ignored by previous <connection> blocks
  34. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: timers and/or timeouts modified
  35. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: explicit notify parm(s) modified
  36. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  37. Sun Oct 13 23:34:53 2019 Socket Buffers: R=[8192->393216] S=[8192->393216]
  38. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --ifconfig/up options modified
  39. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: route options modified
  40. Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  41. Sun Oct 13 23:34:53 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  42. Sun Oct 13 23:34:53 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  43. Sun Oct 13 23:34:53 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  44. Sun Oct 13 23:34:53 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  45. Sun Oct 13 23:34:53 2019 interactive service msg_channel=0
  46. Sun Oct 13 23:34:53 2019 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=e0:3f:49:13:4f:fa
  47. Sun Oct 13 23:34:53 2019 open_tun
  48. Sun Oct 13 23:34:53 2019 TAP-WIN32 device [Подключение по локальной сети 3] opened: \\.\Global\{D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}.tap
  49. Sun Oct 13 23:34:53 2019 TAP-Windows Driver Version 9.21
  50. Sun Oct 13 23:34:53 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.50.118/255.255.255.252 on interface {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081} [DHCP-serv: 192.168.50.117, lease-time: 31536000]
  51. Sun Oct 13 23:34:53 2019 Successful ARP Flush on interface [14] {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}
  52. Sun Oct 13 23:34:53 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  53. Sun Oct 13 23:34:53 2019 MANAGEMENT: >STATE:1570995293,ASSIGN_IP,,192.168.50.118,,,,
  54. Sun Oct 13 23:34:58 2019 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
  55. Sun Oct 13 23:34:58 2019 C:\Windows\system32\route.exe ADD 62.210.99.189 MASK 255.255.255.255 192.168.1.1
  56. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  57. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  58. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.50.117
  59. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  60. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  61. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.50.117
  62. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  63. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  64. Sun Oct 13 23:34:59 2019 MANAGEMENT: >STATE:1570995299,ADD_ROUTES,,,,,,
  65. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  66. Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  67. Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
  68. Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  69. Sun Oct 13 23:34:59 2019 ROUTE: route addition failed using CreateIpForwardEntry: Этот объект уже существует. [status=5010 if_index=14]
  70. Sun Oct 13 23:34:59 2019 Route addition via IPAPI failed [adaptive]
  71. Sun Oct 13 23:34:59 2019 Route addition fallback to route.exe
  72. Sun Oct 13 23:34:59 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  73. Sun Oct 13 23:35:01 2019 Initialization Sequence Completed
  74. Sun Oct 13 23:35:01 2019 MANAGEMENT: >STATE:1570995301,CONNECTED,SUCCESS,192.168.50.118,62.210.99.189,1194,,
  75. Sun Oct 13 23:35:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  76. Sun Oct 13 23:35:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  77. Sun Oct 13 23:35:53 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  78. Sun Oct 13 23:35:53 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  79. Sun Oct 13 23:35:53 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  80. Sun Oct 13 23:35:53 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  81. Sun Oct 13 23:35:53 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  82. Sun Oct 13 23:36:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  83. Sun Oct 13 23:36:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  84. Sun Oct 13 23:36:52 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  85. Sun Oct 13 23:36:52 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  86. Sun Oct 13 23:36:52 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  87. Sun Oct 13 23:36:52 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  88. Sun Oct 13 23:36:52 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  89. Sun Oct 13 23:37:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  90. Sun Oct 13 23:37:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  91. Sun Oct 13 23:37:52 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  92. Sun Oct 13 23:37:52 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  93. Sun Oct 13 23:37:52 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  94. Sun Oct 13 23:37:52 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  95. Sun Oct 13 23:37:52 2019 NOTE: --mute triggered...
  96. Sun Oct 13 23:50:55 2019 85 variation(s) on previous 20 message(s) suppressed by --mute
  97. Sun Oct 13 23:50:55 2019 MANAGEMENT: CMD 'signal SIGHUP'
  98. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  99. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  100. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  101. Sun Oct 13 23:50:55 2019 ROUTE: route deletion failed using DeleteIpForwardEntry: Элемент не найден.
  102. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI failed [adaptive]
  103. Sun Oct 13 23:50:55 2019 Route deletion fallback to route.exe
  104. Sun Oct 13 23:50:55 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  105. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 62.210.99.189 MASK 255.255.255.255 192.168.1.1
  106. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  107. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 192.168.50.117
  108. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  109. Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 192.168.50.117
  110. Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
  111. Sun Oct 13 23:50:55 2019 Closing TUN/TAP interface
  112. Sun Oct 13 23:50:55 2019 TAP: DHCP address released
  113. Sun Oct 13 23:50:55 2019 SIGHUP[hard,] received, process restarting
  114. Sun Oct 13 23:50:55 2019 MANAGEMENT: >STATE:1570996255,RECONNECTING,SIGHUP,,,,,
  115. Sun Oct 13 23:50:55 2019 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
  116. Sun Oct 13 23:50:55 2019 Windows version 6.1 (Windows 7) 64bit
  117. Sun Oct 13 23:50:55 2019 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  118. Sun Oct 13 23:50:55 2019 Restart pause, 5 second(s)
  119. Sun Oct 13 23:51:00 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
  120. Sun Oct 13 23:51:01 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  121. Sun Oct 13 23:51:01 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  122. Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,RESOLVE,,,,,,
  123. Sun Oct 13 23:51:01 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]62.210.99.189:1194
  124. Sun Oct 13 23:51:01 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
  125. Sun Oct 13 23:51:01 2019 UDP link local: (not bound)
  126. Sun Oct 13 23:51:01 2019 UDP link remote: [AF_INET]62.210.99.189:1194
  127. Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,WAIT,,,,,,
  128. Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,AUTH,,,,,,
  129. Sun Oct 13 23:51:01 2019 TLS: Initial packet from [AF_INET]62.210.99.189:1194, sid=f7b16f74 6c478141
  130. Sun Oct 13 23:51:02 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  131. Sun Oct 13 23:51:02 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  132. Sun Oct 13 23:51:02 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  133. Sun Oct 13 23:51:02 2019 [server] Peer Connection Initiated with [AF_INET]62.210.99.189:1194
  134. Sun Oct 13 23:51:03 2019 MANAGEMENT: >STATE:1570996263,GET_CONFIG,,,,,,
  135. Sun Oct 13 23:51:03 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  136. Sun Oct 13 23:51:03 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 192.168.50.1,route 192.168.50.0 255.255.255.0,explicit-exit-notify 3,sndbuf 393216,rcvbuf 393216,route 192.168.50.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.50.118 192.168.50.117'
  137. Sun Oct 13 23:51:03 2019 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:4 is ignored by previous <connection> blocks
  138. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: timers and/or timeouts modified
  139. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: explicit notify parm(s) modified
  140. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  141. Sun Oct 13 23:51:03 2019 Socket Buffers: R=[8192->393216] S=[8192->393216]
  142. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --ifconfig/up options modified
  143. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: route options modified
  144. Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  145. Sun Oct 13 23:51:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  146. Sun Oct 13 23:51:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  147. Sun Oct 13 23:51:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  148. Sun Oct 13 23:51:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  149. Sun Oct 13 23:51:03 2019 interactive service msg_channel=0
  150. Sun Oct 13 23:51:03 2019 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=e0:3f:49:13:4f:fa
  151. Sun Oct 13 23:51:03 2019 open_tun
  152. Sun Oct 13 23:51:03 2019 TAP-WIN32 device [Подключение по локальной сети 3] opened: \\.\Global\{D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}.tap
  153. Sun Oct 13 23:51:03 2019 TAP-Windows Driver Version 9.21
  154. Sun Oct 13 23:51:03 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.50.118/255.255.255.252 on interface {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081} [DHCP-serv: 192.168.50.117, lease-time: 31536000]
  155. Sun Oct 13 23:51:03 2019 Successful ARP Flush on interface [14] {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}
  156. Sun Oct 13 23:51:03 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  157. Sun Oct 13 23:51:03 2019 MANAGEMENT: >STATE:1570996263,ASSIGN_IP,,192.168.50.118,,,,
  158. Sun Oct 13 23:51:08 2019 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
  159. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 62.210.99.189 MASK 255.255.255.255 192.168.1.1
  160. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  161. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  162. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.50.117
  163. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  164. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  165. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.50.117
  166. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  167. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  168. Sun Oct 13 23:51:08 2019 MANAGEMENT: >STATE:1570996268,ADD_ROUTES,,,,,,
  169. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  170. Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  171. Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
  172. Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
  173. Sun Oct 13 23:51:08 2019 ROUTE: route addition failed using CreateIpForwardEntry: Этот объект уже существует. [status=5010 if_index=14]
  174. Sun Oct 13 23:51:08 2019 Route addition via IPAPI failed [adaptive]
  175. Sun Oct 13 23:51:08 2019 Route addition fallback to route.exe
  176. Sun Oct 13 23:51:08 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  177. Sun Oct 13 23:51:08 2019 Initialization Sequence Completed
  178. Sun Oct 13 23:51:08 2019 MANAGEMENT: >STATE:1570996268,CONNECTED,SUCCESS,192.168.50.118,62.210.99.189,1194,,
  179. Sun Oct 13 23:52:02 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  180. Sun Oct 13 23:52:02 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  181. Sun Oct 13 23:52:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  182. Sun Oct 13 23:52:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  183. Sun Oct 13 23:52:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  184. Sun Oct 13 23:52:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  185. Sun Oct 13 23:52:03 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  186. Sun Oct 13 23:53:03 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  187. Sun Oct 13 23:53:03 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  188. Sun Oct 13 23:53:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  189. Sun Oct 13 23:53:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  190. Sun Oct 13 23:53:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  191. Sun Oct 13 23:53:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  192. Sun Oct 13 23:53:03 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  193. Sun Oct 13 23:54:03 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
  194. Sun Oct 13 23:54:03 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
  195. Sun Oct 13 23:54:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  196. Sun Oct 13 23:54:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  197. Sun Oct 13 23:54:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  198. Sun Oct 13 23:54:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
  199. Sun Oct 13 23:54:03 2019 NOTE: --mute triggered...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement