Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Thu Nov 12 23:40:34 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
- Thu Nov 12 23:40:34 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
- Enter Management Password:
- Thu Nov 12 23:40:34 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
- Thu Nov 12 23:40:34 2015 Need hold release from management interface, waiting...
- Thu Nov 12 23:40:35 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
- Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'state on'
- Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'log all on'
- Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'hold off'
- Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'hold release'
- Thu Nov 12 23:40:35 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Thu Nov 12 23:40:35 2015 UDPv4 link local: [undef]
- Thu Nov 12 23:40:35 2015 UDPv4 link remote: [AF_INET]37.57.231.119:1194
- Thu Nov 12 23:40:35 2015 MANAGEMENT: >STATE:1447360835,WAIT,,,
- Thu Nov 12 23:40:35 2015 MANAGEMENT: >STATE:1447360835,AUTH,,,
- Thu Nov 12 23:40:35 2015 TLS: Initial packet from [AF_INET]37.57.231.119:1194, sid=5c81f283 dc3964cc
- Thu Nov 12 23:40:35 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu Nov 12 23:40:35 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Thu Nov 12 23:40:35 2015 Validating certificate key usage
- Thu Nov 12 23:40:35 2015 ++ Certificate has key usage 00a0, expects 00a0
- Thu Nov 12 23:40:35 2015 VERIFY KU OK
- Thu Nov 12 23:40:35 2015 Validating certificate extended key usage
- Thu Nov 12 23:40:35 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Thu Nov 12 23:40:35 2015 VERIFY EKU OK
- Thu Nov 12 23:40:35 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Thu Nov 12 23:40:35 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Thu Nov 12 23:40:35 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Thu Nov 12 23:40:35 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Thu Nov 12 23:40:35 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Thu Nov 12 23:40:35 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Thu Nov 12 23:40:35 2015 [server] Peer Connection Initiated with [AF_INET]37.57.231.119:1194
- Thu Nov 12 23:40:37 2015 MANAGEMENT: >STATE:1447360837,GET_CONFIG,,,
- Thu Nov 12 23:40:38 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Thu Nov 12 23:40:38 2015 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 46.165.235.6 255.255.255.255,route 188.40.35.183 255.255.255.255,route 188.40.74.9 255.255.255.255,route 95.211.0.0 255.255.255.0,route 162.210.0.0 255.255.0.0,route 178.162.0.0 255.255.0.0,route 185.53.0.0 255.255.0.0,route 198.7.0.0 255.255.0.0,route 199.115.0.0 255.255.0.0,route 207.244.0.0 255.255.0.0,route 217.79.0.0 255.255.0.0,route 31.184.0.0 255.255.0.0,route 37.143.0.0 255.255.0.0,route 37.48.0.0 255.255.0.0,route 46.165.0.0 255.255.0.0,route 5.104.0.0 255.255.0.0,route 5.45.0.0 255.255.0.0,route 5.61.0.0 255.255.0.0,route 5.79.0.0 255.255.0.0,route 62.210.0.0 255.255.0.0,route 62.212.0.0 255.255.0.0,route 78.159.0.0 255.255.0.0,route 79.135.0.0 255.255.0.0,route 82.192.0.0 255.255.0.0,route 83.149.0.0 255.255.0.0,route 85.114.0.0 255.255.0.0,route 85.17.0.0 255.255.0.0,route 188.127.0.0 255.255.0.0,route 93.170.0.0 255.255.0.0,push-continuation 2'
- Thu Nov 12 23:40:38 2015 PUSH: Received control message: 'PUSH_REPLY,route 195.2.0.0 255.255.0.0,route 217.172.0.0 255.255.0.0,route 5.9.0.0 255.255.0.0,route 217.12.0.0 255.255.0.0,route 185.8.0.0 255.255.0.0,route 89.108.0.0 255.255.0.0,route 185.39.0.0 255.255.0.0,route 62.75.0.0 255.255.0.0,route 185.27.0.0 255.255.0.0,route 82.118.0.0 255.255.0.0,route 91.109.0.0 255.255.0.0,route 46.28.0.0 255.255.0.0,route 93.186.0.0 255.255.0.0,route 80.82.0.0 255.255.0.0,route 185.56.0.0 255.255.0.0,route 85.25.0.0 255.255.0.0,route 62.141.0.0 255.255.0.0,route 193.111.0.0 255.255.0.0,route 178.150.0.0 255.255.0.0,route 185.86.0.0 255.255.0.0,route 109.86.0.0 255.255.0.0,route 91.189.0.0 255.255.0.0,route 176.99.0.0 255.255.0.0,route 95.213.0.0 255.255.0.0,route 185.41.0.0 255.255.0.0,route 188.138.0.0 255.255.0.0,route 185.60.0.0 255.255.0.0,route 178.218.0.0 255.255.0.0,route 46.4.0.0 255.255.0.0,route 80.240.0.0 255.255.0.0,route 94.242.0.0 255.255.0.0,route 10.8.0.1,topology net30,push-continuation 2'
- Thu Nov 12 23:40:38 2015 PUSH: Received control message: 'PUSH_REPLY,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21,push-continuation 1'
- Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: timers and/or timeouts modified
- Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: --ifconfig/up options modified
- Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: route options modified
- Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu Nov 12 23:40:38 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Thu Nov 12 23:40:38 2015 MANAGEMENT: >STATE:1447360838,ASSIGN_IP,,10.8.0.22,
- Thu Nov 12 23:40:38 2015 open_tun, tt->ipv6=0
- Thu Nov 12 23:40:38 2015 TAP-WIN32 device [Подключение по локальной сети 2] opened: \\.\Global\{691D2C2E-7EC2-481C-AEAC-E50C8D6F6C15}.tap
- Thu Nov 12 23:40:38 2015 TAP-Windows Driver Version 9.21
- Thu Nov 12 23:40:38 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {691D2C2E-7EC2-481C-AEAC-E50C8D6F6C15} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
- Thu Nov 12 23:40:38 2015 Successful ARP Flush on interface [13] {691D2C2E-7EC2-481C-AEAC-E50C8D6F6C15}
- Thu Nov 12 23:40:43 2015 TEST ROUTES: 61/61 succeeded len=61 ret=1 a=0 u/d=up
- Thu Nov 12 23:40:43 2015 MANAGEMENT: >STATE:1447360843,ADD_ROUTES,,,
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.165.235.6 MASK 255.255.255.255 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.40.35.183 MASK 255.255.255.255 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.40.74.9 MASK 255.255.255.255 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 95.211.0.0 MASK 255.255.255.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 162.210.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 178.162.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.53.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 198.7.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 199.115.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 207.244.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 217.79.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 31.184.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 37.143.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 37.48.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.165.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.104.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.45.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.61.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.79.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.210.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.212.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 78.159.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 79.135.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 82.192.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 83.149.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 85.114.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 85.17.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.127.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 93.170.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 195.2.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 217.172.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.9.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 217.12.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.8.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 89.108.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.39.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.75.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.27.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 82.118.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 91.109.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.28.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 93.186.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 80.82.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.56.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 85.25.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.141.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 193.111.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 178.150.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.86.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 109.86.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 91.189.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 176.99.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 95.213.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.41.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.138.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.60.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 178.218.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.4.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 80.240.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 94.242.0.0 MASK 255.255.0.0 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.21
- Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
- Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
- Thu Nov 12 23:40:43 2015 Initialization Sequence Completed
- Thu Nov 12 23:40:43 2015 MANAGEMENT: >STATE:1447360843,CONNECTED,SUCCESS,10.8.0.22,37.57.231.119
- Fri Nov 13 00:40:36 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 00:40:36 2015 Validating certificate key usage
- Fri Nov 13 00:40:36 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 00:40:36 2015 VERIFY KU OK
- Fri Nov 13 00:40:36 2015 Validating certificate extended key usage
- Fri Nov 13 00:40:36 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 00:40:36 2015 VERIFY EKU OK
- Fri Nov 13 00:40:36 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 00:40:36 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 00:40:36 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 00:40:36 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 00:40:36 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 00:40:36 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 01:40:35 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 01:40:36 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 01:40:36 2015 Validating certificate key usage
- Fri Nov 13 01:40:36 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 01:40:36 2015 VERIFY KU OK
- Fri Nov 13 01:40:36 2015 Validating certificate extended key usage
- Fri Nov 13 01:40:36 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 01:40:36 2015 VERIFY EKU OK
- Fri Nov 13 01:40:36 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 01:40:36 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 01:40:36 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 01:40:36 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 01:40:36 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 01:40:36 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 02:40:35 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 02:40:36 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 02:40:36 2015 Validating certificate key usage
- Fri Nov 13 02:40:36 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 02:40:36 2015 VERIFY KU OK
- Fri Nov 13 02:40:36 2015 Validating certificate extended key usage
- Fri Nov 13 02:40:36 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 02:40:36 2015 VERIFY EKU OK
- Fri Nov 13 02:40:36 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 02:40:36 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 02:40:36 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 02:40:36 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 02:40:36 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 02:40:36 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 03:40:35 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 03:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 03:40:40 2015 Validating certificate key usage
- Fri Nov 13 03:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 03:40:40 2015 VERIFY KU OK
- Fri Nov 13 03:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 03:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 03:40:40 2015 VERIFY EKU OK
- Fri Nov 13 03:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 03:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 03:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 03:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 03:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 03:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 04:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 04:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 04:40:40 2015 Validating certificate key usage
- Fri Nov 13 04:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 04:40:40 2015 VERIFY KU OK
- Fri Nov 13 04:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 04:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 04:40:40 2015 VERIFY EKU OK
- Fri Nov 13 04:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 04:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 04:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 04:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 04:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 04:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 05:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 05:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 05:40:40 2015 Validating certificate key usage
- Fri Nov 13 05:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 05:40:40 2015 VERIFY KU OK
- Fri Nov 13 05:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 05:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 05:40:40 2015 VERIFY EKU OK
- Fri Nov 13 05:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 05:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 05:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 05:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 05:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 05:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 06:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 06:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 06:40:40 2015 Validating certificate key usage
- Fri Nov 13 06:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 06:40:40 2015 VERIFY KU OK
- Fri Nov 13 06:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 06:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 06:40:40 2015 VERIFY EKU OK
- Fri Nov 13 06:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 06:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 06:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 06:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 06:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 06:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 07:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 07:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 07:40:40 2015 Validating certificate key usage
- Fri Nov 13 07:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 07:40:40 2015 VERIFY KU OK
- Fri Nov 13 07:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 07:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 07:40:40 2015 VERIFY EKU OK
- Fri Nov 13 07:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 07:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 07:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 07:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 07:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 07:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 08:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 08:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 08:40:40 2015 Validating certificate key usage
- Fri Nov 13 08:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 08:40:40 2015 VERIFY KU OK
- Fri Nov 13 08:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 08:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 08:40:40 2015 VERIFY EKU OK
- Fri Nov 13 08:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 08:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 08:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 08:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 08:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 08:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 09:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 09:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 09:40:40 2015 Validating certificate key usage
- Fri Nov 13 09:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 09:40:40 2015 VERIFY KU OK
- Fri Nov 13 09:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 09:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 09:40:40 2015 VERIFY EKU OK
- Fri Nov 13 09:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 09:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 09:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 09:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 09:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 09:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 10:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 10:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 10:40:40 2015 Validating certificate key usage
- Fri Nov 13 10:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 10:40:40 2015 VERIFY KU OK
- Fri Nov 13 10:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 10:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 10:40:40 2015 VERIFY EKU OK
- Fri Nov 13 10:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 10:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 10:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 10:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 10:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 10:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 11:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 11:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 11:40:40 2015 Validating certificate key usage
- Fri Nov 13 11:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 11:40:40 2015 VERIFY KU OK
- Fri Nov 13 11:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 11:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 11:40:40 2015 VERIFY EKU OK
- Fri Nov 13 11:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 11:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 11:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 11:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 11:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 11:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 12:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 12:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 12:40:40 2015 Validating certificate key usage
- Fri Nov 13 12:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 12:40:40 2015 VERIFY KU OK
- Fri Nov 13 12:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 12:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 12:40:40 2015 VERIFY EKU OK
- Fri Nov 13 12:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 12:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 12:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 12:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 12:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 12:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 13:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 13:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 13:40:40 2015 Validating certificate key usage
- Fri Nov 13 13:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 13:40:40 2015 VERIFY KU OK
- Fri Nov 13 13:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 13:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 13:40:40 2015 VERIFY EKU OK
- Fri Nov 13 13:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 13:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 13:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 13:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 13:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 13:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 14:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 14:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 14:40:40 2015 Validating certificate key usage
- Fri Nov 13 14:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 14:40:40 2015 VERIFY KU OK
- Fri Nov 13 14:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 14:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 14:40:40 2015 VERIFY EKU OK
- Fri Nov 13 14:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 14:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 14:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 14:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 14:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 14:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 15:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 15:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 15:40:40 2015 Validating certificate key usage
- Fri Nov 13 15:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 15:40:40 2015 VERIFY KU OK
- Fri Nov 13 15:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 15:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 15:40:40 2015 VERIFY EKU OK
- Fri Nov 13 15:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 15:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 15:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 15:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 15:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 15:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri Nov 13 16:40:39 2015 TLS: tls_process: killed expiring key
- Fri Nov 13 16:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 16:40:40 2015 Validating certificate key usage
- Fri Nov 13 16:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
- Fri Nov 13 16:40:40 2015 VERIFY KU OK
- Fri Nov 13 16:40:40 2015 Validating certificate extended key usage
- Fri Nov 13 16:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Nov 13 16:40:40 2015 VERIFY EKU OK
- Fri Nov 13 16:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
- Fri Nov 13 16:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 16:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 16:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri Nov 13 16:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Nov 13 16:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement