Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- FrozenWay version 1.6.7
- ----------------------------------
- Server: premium-02-fr-02
- Protocol: OpenVPN
- ----------------------------------
- C:/Program Files/FrozenWay/openvpn.exe --client --dev tun --dev-node {02C9806D-264C-4A4F-981B-3ECF735FDDBB} --proto tcp-client --remote 212-83-130-245.fw-9476.ovh 443 --management 127.0.0.1 59283 --management-client --management-query-passwords --ca C:/Program Files/FrozenWay/ca.crt --remote-cert-tls server --reneg-sec 0 --auth-user-pass --auth-nocache --compress --resolv-retry 0 --ping 10 --ping-exit 30 --persist-tun --persist-key --persist-local-ip --connect-retry 1 --dhcp-option DNS 10.44.6.1 --ip-win32 dynamic --verb 3
- Mon Jun 10 22:37:08 2019 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
- Mon Jun 10 22:37:08 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZ4] [AEAD] built on Sep 24 2018
- Mon Jun 10 22:37:08 2019 Windows version 6.2 (Windows 8 or greater) 64bit
- Mon Jun 10 22:37:08 2019 library versions: OpenSSL 1.0.2o 27 Mar 2018
- Mon Jun 10 22:37:08 2019 MANAGEMENT: Connected to management server at [AF_INET]127.0.0.1:59283
- Mon Jun 10 22:37:08 2019 MANAGEMENT: CMD 'username "Auth" crackerdead'
- Mon Jun 10 22:37:08 2019 MANAGEMENT: CMD 'password [...]'
- Mon Jun 10 22:37:08 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]212.83.130.245:443
- Mon Jun 10 22:37:08 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon Jun 10 22:37:08 2019 Attempting to establish TCP connection with [AF_INET]212.83.130.245:443 [nonblock]
- Mon Jun 10 22:37:09 2019 TCP connection established with [AF_INET]212.83.130.245:443
- Mon Jun 10 22:37:09 2019 TCP_CLIENT link local: (not bound)
- Mon Jun 10 22:37:09 2019 TCP_CLIENT link remote: [AF_INET]212.83.130.245:443
- Mon Jun 10 22:37:09 2019 TLS: Initial packet from [AF_INET]212.83.130.245:443, sid=79925c00 bb35ebe4
- Mon Jun 10 22:37:09 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
- Mon Jun 10 22:37:09 2019 VERIFY KU OK
- Mon Jun 10 22:37:09 2019 Validating certificate extended key usage
- Mon Jun 10 22:37:09 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Jun 10 22:37:09 2019 VERIFY EKU OK
- Mon Jun 10 22:37:09 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
- Mon Jun 10 22:37:09 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
- Mon Jun 10 22:37:09 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
- Mon Jun 10 22:37:09 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon Jun 10 22:37:09 2019 [server] Peer Connection Initiated with [AF_INET]212.83.130.245:443
- Mon Jun 10 22:37:11 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Jun 10 22:37:11 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.73 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: compression parms modified
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: --socket-flags option modified
- Mon Jun 10 22:37:11 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: route-related options modified
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: peer-id set
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon Jun 10 22:37:11 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon Jun 10 22:37:11 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Jun 10 22:37:11 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Jun 10 22:37:11 2019 interactive service msg_channel=0
- Mon Jun 10 22:37:11 2019 open_tun
- Mon Jun 10 22:37:11 2019 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{02C9806D-264C-4A4F-981B-3ECF735FDDBB}.tap
- Mon Jun 10 22:37:11 2019 TAP-Windows Driver Version 9.22
- Mon Jun 10 22:37:11 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.51.1.0/10.51.1.73/255.255.255.0 [SUCCEEDED]
- Mon Jun 10 22:37:11 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.51.1.73/255.255.255.0 on interface {02C9806D-264C-4A4F-981B-3ECF735FDDBB} [DHCP-serv: 10.51.1.254, lease-time: 31536000]
- Mon Jun 10 22:37:11 2019 Successful ARP Flush on interface [2] {02C9806D-264C-4A4F-981B-3ECF735FDDBB}
- Mon Jun 10 22:37:11 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon Jun 10 22:37:16 2019 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
- Mon Jun 10 22:37:16 2019 Initialization Sequence Completed
- IPv4 routing table :
- 0.0.0.0 0.0.0.0 10.44.6.1 10.44.7.223 9999
- 0.0.0.0 0.0.0.0 10.51.1.1 10.51.1.73 25
- 10.44.6.0 255.255.254.0 10.44.7.223 10.44.7.223 311
- 10.44.7.223 255.255.255.255 10.44.7.223 10.44.7.223 311
- 10.44.7.255 255.255.255.255 10.44.7.223 10.44.7.223 311
- 10.51.1.0 255.255.255.0 10.51.1.73 10.51.1.73 281
- 10.51.1.73 255.255.255.255 10.51.1.73 10.51.1.73 281
- 10.51.1.255 255.255.255.255 10.51.1.73 10.51.1.73 281
- 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
- 127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
- 127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
- 212.83.130.245 255.255.255.255 10.44.6.1 10.44.7.223 55
- 224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
- 224.0.0.0 240.0.0.0 10.51.1.73 10.51.1.73 281
- 224.0.0.0 240.0.0.0 10.44.7.223 10.44.7.223 311
- 255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
- 255.255.255.255 255.255.255.255 10.51.1.73 10.51.1.73 281
- 255.255.255.255 255.255.255.255 10.44.7.223 10.44.7.223 311
- Mon Jun 10 22:41:10 2019 MANAGEMENT: Client disconnected
- Mon Jun 10 22:41:10 2019 MANAGEMENT: Triggering management exit
- Mon Jun 10 22:41:10 2019 Closing TUN/TAP interface
- Mon Jun 10 22:41:10 2019 TAP: DHCP address released
- Mon Jun 10 22:41:10 2019 SIGTERM[soft,management-exit] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement