Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sun Oct 13 23:34:50 2019 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
- Sun Oct 13 23:34:50 2019 Windows version 6.1 (Windows 7) 64bit
- Sun Oct 13 23:34:50 2019 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Enter Management Password:
- Sun Oct 13 23:34:50 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Sun Oct 13 23:34:50 2019 Need hold release from management interface, waiting...
- Sun Oct 13 23:34:50 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'state on'
- Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'log all on'
- Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'echo all on'
- Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'hold off'
- Sun Oct 13 23:34:50 2019 MANAGEMENT: CMD 'hold release'
- Sun Oct 13 23:34:50 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Oct 13 23:34:51 2019 MANAGEMENT: CMD 'password [...]'
- Sun Oct 13 23:34:51 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Oct 13 23:34:51 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:34:51 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,RESOLVE,,,,,,
- Sun Oct 13 23:34:51 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]62.210.99.189:1194
- Sun Oct 13 23:34:51 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Sun Oct 13 23:34:51 2019 UDP link local: (not bound)
- Sun Oct 13 23:34:51 2019 UDP link remote: [AF_INET]62.210.99.189:1194
- Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,WAIT,,,,,,
- Sun Oct 13 23:34:51 2019 MANAGEMENT: >STATE:1570995291,AUTH,,,,,,
- Sun Oct 13 23:34:51 2019 TLS: Initial packet from [AF_INET]62.210.99.189:1194, sid=19dacc78 d10f5310
- Sun Oct 13 23:34:51 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:34:51 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:34:52 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Oct 13 23:34:52 2019 [server] Peer Connection Initiated with [AF_INET]62.210.99.189:1194
- Sun Oct 13 23:34:53 2019 MANAGEMENT: >STATE:1570995293,GET_CONFIG,,,,,,
- Sun Oct 13 23:34:53 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Oct 13 23:34:53 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 192.168.50.1,route 192.168.50.0 255.255.255.0,explicit-exit-notify 3,sndbuf 393216,rcvbuf 393216,route 192.168.50.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.50.118 192.168.50.117'
- Sun Oct 13 23:34:53 2019 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:4 is ignored by previous <connection> blocks
- Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: explicit notify parm(s) modified
- Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Oct 13 23:34:53 2019 Socket Buffers: R=[8192->393216] S=[8192->393216]
- Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: route options modified
- Sun Oct 13 23:34:53 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Oct 13 23:34:53 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:34:53 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:34:53 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:34:53 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:34:53 2019 interactive service msg_channel=0
- Sun Oct 13 23:34:53 2019 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=e0:3f:49:13:4f:fa
- Sun Oct 13 23:34:53 2019 open_tun
- Sun Oct 13 23:34:53 2019 TAP-WIN32 device [Подключение по локальной сети 3] opened: \\.\Global\{D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}.tap
- Sun Oct 13 23:34:53 2019 TAP-Windows Driver Version 9.21
- Sun Oct 13 23:34:53 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.50.118/255.255.255.252 on interface {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081} [DHCP-serv: 192.168.50.117, lease-time: 31536000]
- Sun Oct 13 23:34:53 2019 Successful ARP Flush on interface [14] {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}
- Sun Oct 13 23:34:53 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sun Oct 13 23:34:53 2019 MANAGEMENT: >STATE:1570995293,ASSIGN_IP,,192.168.50.118,,,,
- Sun Oct 13 23:34:58 2019 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
- Sun Oct 13 23:34:58 2019 C:\Windows\system32\route.exe ADD 62.210.99.189 MASK 255.255.255.255 192.168.1.1
- Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.50.117
- Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.50.117
- Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:34:59 2019 MANAGEMENT: >STATE:1570995299,ADD_ROUTES,,,,,,
- Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
- Sun Oct 13 23:34:59 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:34:59 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:34:59 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
- Sun Oct 13 23:34:59 2019 ROUTE: route addition failed using CreateIpForwardEntry: Этот объект уже существует. [status=5010 if_index=14]
- Sun Oct 13 23:34:59 2019 Route addition via IPAPI failed [adaptive]
- Sun Oct 13 23:34:59 2019 Route addition fallback to route.exe
- Sun Oct 13 23:34:59 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sun Oct 13 23:35:01 2019 Initialization Sequence Completed
- Sun Oct 13 23:35:01 2019 MANAGEMENT: >STATE:1570995301,CONNECTED,SUCCESS,192.168.50.118,62.210.99.189,1194,,
- Sun Oct 13 23:35:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:35:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:35:53 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:35:53 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:35:53 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:35:53 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:35:53 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Oct 13 23:36:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:36:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:36:52 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:36:52 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:36:52 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:36:52 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:36:52 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Oct 13 23:37:52 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:37:52 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:37:52 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:37:52 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:37:52 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:37:52 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:37:52 2019 NOTE: --mute triggered...
- Sun Oct 13 23:50:55 2019 85 variation(s) on previous 20 message(s) suppressed by --mute
- Sun Oct 13 23:50:55 2019 MANAGEMENT: CMD 'signal SIGHUP'
- Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 192.168.50.0 MASK 255.255.255.0 192.168.50.117
- Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
- Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 192.168.50.0 MASK 255.255.255.0 192.168.50.117
- Sun Oct 13 23:50:55 2019 ROUTE: route deletion failed using DeleteIpForwardEntry: Элемент не найден.
- Sun Oct 13 23:50:55 2019 Route deletion via IPAPI failed [adaptive]
- Sun Oct 13 23:50:55 2019 Route deletion fallback to route.exe
- Sun Oct 13 23:50:55 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 62.210.99.189 MASK 255.255.255.255 192.168.1.1
- Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
- Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 192.168.50.117
- Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
- Sun Oct 13 23:50:55 2019 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 192.168.50.117
- Sun Oct 13 23:50:55 2019 Route deletion via IPAPI succeeded [adaptive]
- Sun Oct 13 23:50:55 2019 Closing TUN/TAP interface
- Sun Oct 13 23:50:55 2019 TAP: DHCP address released
- Sun Oct 13 23:50:55 2019 SIGHUP[hard,] received, process restarting
- Sun Oct 13 23:50:55 2019 MANAGEMENT: >STATE:1570996255,RECONNECTING,SIGHUP,,,,,
- Sun Oct 13 23:50:55 2019 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
- Sun Oct 13 23:50:55 2019 Windows version 6.1 (Windows 7) 64bit
- Sun Oct 13 23:50:55 2019 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Sun Oct 13 23:50:55 2019 Restart pause, 5 second(s)
- Sun Oct 13 23:51:00 2019 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
- Sun Oct 13 23:51:01 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:51:01 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,RESOLVE,,,,,,
- Sun Oct 13 23:51:01 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]62.210.99.189:1194
- Sun Oct 13 23:51:01 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Sun Oct 13 23:51:01 2019 UDP link local: (not bound)
- Sun Oct 13 23:51:01 2019 UDP link remote: [AF_INET]62.210.99.189:1194
- Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,WAIT,,,,,,
- Sun Oct 13 23:51:01 2019 MANAGEMENT: >STATE:1570996261,AUTH,,,,,,
- Sun Oct 13 23:51:01 2019 TLS: Initial packet from [AF_INET]62.210.99.189:1194, sid=f7b16f74 6c478141
- Sun Oct 13 23:51:02 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:51:02 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:51:02 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Oct 13 23:51:02 2019 [server] Peer Connection Initiated with [AF_INET]62.210.99.189:1194
- Sun Oct 13 23:51:03 2019 MANAGEMENT: >STATE:1570996263,GET_CONFIG,,,,,,
- Sun Oct 13 23:51:03 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Sun Oct 13 23:51:03 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway,dhcp-option DNS 192.168.50.1,route 192.168.50.0 255.255.255.0,explicit-exit-notify 3,sndbuf 393216,rcvbuf 393216,route 192.168.50.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 192.168.50.118 192.168.50.117'
- Sun Oct 13 23:51:03 2019 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:4 is ignored by previous <connection> blocks
- Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: explicit notify parm(s) modified
- Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Oct 13 23:51:03 2019 Socket Buffers: R=[8192->393216] S=[8192->393216]
- Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: route options modified
- Sun Oct 13 23:51:03 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Oct 13 23:51:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:51:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:51:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:51:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:51:03 2019 interactive service msg_channel=0
- Sun Oct 13 23:51:03 2019 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=12 HWADDR=e0:3f:49:13:4f:fa
- Sun Oct 13 23:51:03 2019 open_tun
- Sun Oct 13 23:51:03 2019 TAP-WIN32 device [Подключение по локальной сети 3] opened: \\.\Global\{D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}.tap
- Sun Oct 13 23:51:03 2019 TAP-Windows Driver Version 9.21
- Sun Oct 13 23:51:03 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.50.118/255.255.255.252 on interface {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081} [DHCP-serv: 192.168.50.117, lease-time: 31536000]
- Sun Oct 13 23:51:03 2019 Successful ARP Flush on interface [14] {D0B040FA-4E97-439F-A2B3-C9D1ADFFF081}
- Sun Oct 13 23:51:03 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sun Oct 13 23:51:03 2019 MANAGEMENT: >STATE:1570996263,ASSIGN_IP,,192.168.50.118,,,,
- Sun Oct 13 23:51:08 2019 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
- Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 62.210.99.189 MASK 255.255.255.255 192.168.1.1
- Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 192.168.50.117
- Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 192.168.50.117
- Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:51:08 2019 MANAGEMENT: >STATE:1570996268,ADD_ROUTES,,,,,,
- Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
- Sun Oct 13 23:51:08 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Sun Oct 13 23:51:08 2019 Route addition via IPAPI succeeded [adaptive]
- Sun Oct 13 23:51:08 2019 C:\Windows\system32\route.exe ADD 192.168.50.0 MASK 255.255.255.0 192.168.50.117
- Sun Oct 13 23:51:08 2019 ROUTE: route addition failed using CreateIpForwardEntry: Этот объект уже существует. [status=5010 if_index=14]
- Sun Oct 13 23:51:08 2019 Route addition via IPAPI failed [adaptive]
- Sun Oct 13 23:51:08 2019 Route addition fallback to route.exe
- Sun Oct 13 23:51:08 2019 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sun Oct 13 23:51:08 2019 Initialization Sequence Completed
- Sun Oct 13 23:51:08 2019 MANAGEMENT: >STATE:1570996268,CONNECTED,SUCCESS,192.168.50.118,62.210.99.189,1194,,
- Sun Oct 13 23:52:02 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:52:02 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:52:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:52:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:52:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:52:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:52:03 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Oct 13 23:53:03 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:53:03 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:53:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:53:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:53:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:53:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:53:03 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Oct 13 23:54:03 2019 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=IT, CN=.webii.ru, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:54:03 2019 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, OU=changeme, CN=server, name=changeme, emailAddress=mail@host.domain
- Sun Oct 13 23:54:03 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:54:03 2019 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:54:03 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Oct 13 23:54:03 2019 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 13 23:54:03 2019 NOTE: --mute triggered...
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement