Advertisement
Guest User

Untitled

a guest
Jun 10th, 2019
242
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.31 KB | None | 0 0
  1. FrozenWay version 1.6.7
  2. ----------------------------------
  3. Server: premium-02-fr-02
  4. Protocol: OpenVPN
  5. ----------------------------------
  6. C:/Program Files/FrozenWay/openvpn.exe --client --dev tun --dev-node {02C9806D-264C-4A4F-981B-3ECF735FDDBB} --proto tcp-client --remote 212-83-130-245.fw-9476.ovh 443 --management 127.0.0.1 59283 --management-client --management-query-passwords --ca C:/Program Files/FrozenWay/ca.crt --remote-cert-tls server --reneg-sec 0 --auth-user-pass --auth-nocache --compress --resolv-retry 0 --ping 10 --ping-exit 30 --persist-tun --persist-key --persist-local-ip --connect-retry 1 --dhcp-option DNS 10.44.6.1 --ip-win32 dynamic --verb 3
  7. Mon Jun 10 22:37:08 2019 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
  8.  
  9. Mon Jun 10 22:37:08 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZ4] [AEAD] built on Sep 24 2018
  10. Mon Jun 10 22:37:08 2019 Windows version 6.2 (Windows 8 or greater) 64bit
  11. Mon Jun 10 22:37:08 2019 library versions: OpenSSL 1.0.2o 27 Mar 2018
  12.  
  13. Mon Jun 10 22:37:08 2019 MANAGEMENT: Connected to management server at [AF_INET]127.0.0.1:59283
  14.  
  15. Mon Jun 10 22:37:08 2019 MANAGEMENT: CMD 'username "Auth" crackerdead'
  16.  
  17. Mon Jun 10 22:37:08 2019 MANAGEMENT: CMD 'password [...]'
  18.  
  19. Mon Jun 10 22:37:08 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]212.83.130.245:443
  20. Mon Jun 10 22:37:08 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
  21. Mon Jun 10 22:37:08 2019 Attempting to establish TCP connection with [AF_INET]212.83.130.245:443 [nonblock]
  22.  
  23. Mon Jun 10 22:37:09 2019 TCP connection established with [AF_INET]212.83.130.245:443
  24. Mon Jun 10 22:37:09 2019 TCP_CLIENT link local: (not bound)
  25. Mon Jun 10 22:37:09 2019 TCP_CLIENT link remote: [AF_INET]212.83.130.245:443
  26.  
  27. Mon Jun 10 22:37:09 2019 TLS: Initial packet from [AF_INET]212.83.130.245:443, sid=79925c00 bb35ebe4
  28.  
  29. Mon Jun 10 22:37:09 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
  30.  
  31. Mon Jun 10 22:37:09 2019 VERIFY KU OK
  32. Mon Jun 10 22:37:09 2019 Validating certificate extended key usage
  33. Mon Jun 10 22:37:09 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  34. Mon Jun 10 22:37:09 2019 VERIFY EKU OK
  35. Mon Jun 10 22:37:09 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
  36.  
  37. Mon Jun 10 22:37:09 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
  38. Mon Jun 10 22:37:09 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
  39.  
  40. Mon Jun 10 22:37:09 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  41. Mon Jun 10 22:37:09 2019 [server] Peer Connection Initiated with [AF_INET]212.83.130.245:443
  42.  
  43. Mon Jun 10 22:37:11 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  44.  
  45. Mon Jun 10 22:37:11 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.1.1,dhcp-option WINS 10.51.1.1,route-gateway 10.51.1.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.1.73 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  46. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: compression parms modified
  47. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: --socket-flags option modified
  48. Mon Jun 10 22:37:11 2019 Socket flags: TCP_NODELAY=1 succeeded
  49. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: --ifconfig/up options modified
  50. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: route-related options modified
  51. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  52. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: peer-id set
  53. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  54. Mon Jun 10 22:37:11 2019 OPTIONS IMPORT: data channel crypto options modified
  55. Mon Jun 10 22:37:11 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  56.  
  57. Mon Jun 10 22:37:11 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  58. Mon Jun 10 22:37:11 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  59. Mon Jun 10 22:37:11 2019 interactive service msg_channel=0
  60. Mon Jun 10 22:37:11 2019 open_tun
  61.  
  62. Mon Jun 10 22:37:11 2019 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{02C9806D-264C-4A4F-981B-3ECF735FDDBB}.tap
  63.  
  64. Mon Jun 10 22:37:11 2019 TAP-Windows Driver Version 9.22
  65.  
  66. Mon Jun 10 22:37:11 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.51.1.0/10.51.1.73/255.255.255.0 [SUCCEEDED]
  67. Mon Jun 10 22:37:11 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.51.1.73/255.255.255.0 on interface {02C9806D-264C-4A4F-981B-3ECF735FDDBB} [DHCP-serv: 10.51.1.254, lease-time: 31536000]
  68.  
  69. Mon Jun 10 22:37:11 2019 Successful ARP Flush on interface [2] {02C9806D-264C-4A4F-981B-3ECF735FDDBB}
  70.  
  71. Mon Jun 10 22:37:11 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  72.  
  73. Mon Jun 10 22:37:16 2019 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
  74. Mon Jun 10 22:37:16 2019 Initialization Sequence Completed
  75.  
  76. IPv4 routing table :
  77. 0.0.0.0 0.0.0.0 10.44.6.1 10.44.7.223 9999
  78. 0.0.0.0 0.0.0.0 10.51.1.1 10.51.1.73 25
  79. 10.44.6.0 255.255.254.0 10.44.7.223 10.44.7.223 311
  80. 10.44.7.223 255.255.255.255 10.44.7.223 10.44.7.223 311
  81. 10.44.7.255 255.255.255.255 10.44.7.223 10.44.7.223 311
  82. 10.51.1.0 255.255.255.0 10.51.1.73 10.51.1.73 281
  83. 10.51.1.73 255.255.255.255 10.51.1.73 10.51.1.73 281
  84. 10.51.1.255 255.255.255.255 10.51.1.73 10.51.1.73 281
  85. 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
  86. 127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
  87. 127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
  88. 212.83.130.245 255.255.255.255 10.44.6.1 10.44.7.223 55
  89. 224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
  90. 224.0.0.0 240.0.0.0 10.51.1.73 10.51.1.73 281
  91. 224.0.0.0 240.0.0.0 10.44.7.223 10.44.7.223 311
  92. 255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
  93. 255.255.255.255 255.255.255.255 10.51.1.73 10.51.1.73 281
  94. 255.255.255.255 255.255.255.255 10.44.7.223 10.44.7.223 311
  95. Mon Jun 10 22:41:10 2019 MANAGEMENT: Client disconnected
  96. Mon Jun 10 22:41:10 2019 MANAGEMENT: Triggering management exit
  97. Mon Jun 10 22:41:10 2019 Closing TUN/TAP interface
  98.  
  99. Mon Jun 10 22:41:10 2019 TAP: DHCP address released
  100. Mon Jun 10 22:41:10 2019 SIGTERM[soft,management-exit] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement