Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ~# openvpn vpn.ovpn
- Fri Jul 20 03:30:13 2018 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Dec 10 2017
- Fri Jul 20 03:30:13 2018 library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08
- Enter Auth Username: p.marino21x@gmail.com
- Enter Auth Password: ********
- Fri Jul 20 03:30:24 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Jul 20 03:30:24 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Jul 20 03:30:24 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]149.28.239.13:1194
- Fri Jul 20 03:30:24 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Fri Jul 20 03:30:24 2018 UDP link local: (not bound)
- Fri Jul 20 03:30:24 2018 UDP link remote: [AF_INET]149.28.239.13:1194
- Fri Jul 20 03:30:24 2018 TLS: Initial packet from [AF_INET]149.28.239.13:1194, sid=7509303b 7b4f47b7
- Fri Jul 20 03:30:24 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Fri Jul 20 03:30:24 2018 VERIFY OK: depth=1, CN=ChangeMe
- Fri Jul 20 03:30:24 2018 VERIFY KU OK
- Fri Jul 20 03:30:24 2018 Validating certificate extended key usage
- Fri Jul 20 03:30:24 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Jul 20 03:30:24 2018 VERIFY EKU OK
- Fri Jul 20 03:30:24 2018 VERIFY OK: depth=0, CN=server
- Fri Jul 20 03:30:24 2018 Control Channel: TLSv1, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Fri Jul 20 03:30:24 2018 [server] Peer Connection Initiated with [AF_INET]149.28.239.13:1194
- Fri Jul 20 03:30:25 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Fri Jul 20 03:30:25 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0'
- Fri Jul 20 03:30:25 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Fri Jul 20 03:30:25 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Fri Jul 20 03:30:25 2018 OPTIONS IMPORT: route options modified
- Fri Jul 20 03:30:25 2018 OPTIONS IMPORT: route-related options modified
- Fri Jul 20 03:30:25 2018 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Jul 20 03:30:25 2018 Outgoing Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Jul 20 03:30:25 2018 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Jul 20 03:30:25 2018 Incoming Data Channel: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Jul 20 03:30:25 2018 ROUTE_GATEWAY 10.0.2.1/255.255.255.0 IFACE=eth0 HWADDR=08:00:27:72:f2:2a
- Fri Jul 20 03:30:25 2018 TUN/TAP device tun0 opened
- Fri Jul 20 03:30:25 2018 TUN/TAP TX queue length set to 100
- Fri Jul 20 03:30:25 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Fri Jul 20 03:30:25 2018 /sbin/ip link set dev tun0 up mtu 1500
- Fri Jul 20 03:30:25 2018 /sbin/ip addr add dev tun0 10.8.0.2/24 broadcast 10.8.0.255
- Fri Jul 20 03:30:25 2018 /sbin/ip route add 149.28.239.13/32 via 10.0.2.1
- Fri Jul 20 03:30:25 2018 /sbin/ip route add 0.0.0.0/1 via 10.8.0.1
- Fri Jul 20 03:30:25 2018 /sbin/ip route add 128.0.0.0/1 via 10.8.0.1
- Fri Jul 20 03:30:25 2018 Initialization Sequence Completed
- ^CFri Jul 20 03:31:16 2018 event_wait : Interrupted system call (code=4)
- Fri Jul 20 03:31:16 2018 /sbin/ip route del 149.28.239.13/32
- Fri Jul 20 03:31:16 2018 /sbin/ip route del 0.0.0.0/1
- Fri Jul 20 03:31:16 2018 /sbin/ip route del 128.0.0.0/1
- Fri Jul 20 03:31:16 2018 Closing TUN/TAP interface
- Fri Jul 20 03:31:16 2018 /sbin/ip addr del dev tun0 10.8.0.2/24
- Fri Jul 20 03:31:16 2018 SIGINT[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement