Advertisement
Guest User

Untitled

a guest
Nov 13th, 2015
122
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 43.10 KB | None | 0 0
  1. Thu Nov 12 23:40:34 2015 OpenVPN 2.3.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Aug 4 2015
  2. Thu Nov 12 23:40:34 2015 library versions: OpenSSL 1.0.1p 9 Jul 2015, LZO 2.08
  3. Enter Management Password:
  4. Thu Nov 12 23:40:34 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
  5. Thu Nov 12 23:40:34 2015 Need hold release from management interface, waiting...
  6. Thu Nov 12 23:40:35 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
  7. Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'state on'
  8. Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'log all on'
  9. Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'hold off'
  10. Thu Nov 12 23:40:35 2015 MANAGEMENT: CMD 'hold release'
  11. Thu Nov 12 23:40:35 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
  12. Thu Nov 12 23:40:35 2015 UDPv4 link local: [undef]
  13. Thu Nov 12 23:40:35 2015 UDPv4 link remote: [AF_INET]37.57.231.119:1194
  14. Thu Nov 12 23:40:35 2015 MANAGEMENT: >STATE:1447360835,WAIT,,,
  15. Thu Nov 12 23:40:35 2015 MANAGEMENT: >STATE:1447360835,AUTH,,,
  16. Thu Nov 12 23:40:35 2015 TLS: Initial packet from [AF_INET]37.57.231.119:1194, sid=5c81f283 dc3964cc
  17. Thu Nov 12 23:40:35 2015 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  18. Thu Nov 12 23:40:35 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  19. Thu Nov 12 23:40:35 2015 Validating certificate key usage
  20. Thu Nov 12 23:40:35 2015 ++ Certificate has key usage 00a0, expects 00a0
  21. Thu Nov 12 23:40:35 2015 VERIFY KU OK
  22. Thu Nov 12 23:40:35 2015 Validating certificate extended key usage
  23. Thu Nov 12 23:40:35 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  24. Thu Nov 12 23:40:35 2015 VERIFY EKU OK
  25. Thu Nov 12 23:40:35 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  26. Thu Nov 12 23:40:35 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  27. Thu Nov 12 23:40:35 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  28. Thu Nov 12 23:40:35 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  29. Thu Nov 12 23:40:35 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  30. Thu Nov 12 23:40:35 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  31. Thu Nov 12 23:40:35 2015 [server] Peer Connection Initiated with [AF_INET]37.57.231.119:1194
  32. Thu Nov 12 23:40:37 2015 MANAGEMENT: >STATE:1447360837,GET_CONFIG,,,
  33. Thu Nov 12 23:40:38 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  34. Thu Nov 12 23:40:38 2015 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 46.165.235.6 255.255.255.255,route 188.40.35.183 255.255.255.255,route 188.40.74.9 255.255.255.255,route 95.211.0.0 255.255.255.0,route 162.210.0.0 255.255.0.0,route 178.162.0.0 255.255.0.0,route 185.53.0.0 255.255.0.0,route 198.7.0.0 255.255.0.0,route 199.115.0.0 255.255.0.0,route 207.244.0.0 255.255.0.0,route 217.79.0.0 255.255.0.0,route 31.184.0.0 255.255.0.0,route 37.143.0.0 255.255.0.0,route 37.48.0.0 255.255.0.0,route 46.165.0.0 255.255.0.0,route 5.104.0.0 255.255.0.0,route 5.45.0.0 255.255.0.0,route 5.61.0.0 255.255.0.0,route 5.79.0.0 255.255.0.0,route 62.210.0.0 255.255.0.0,route 62.212.0.0 255.255.0.0,route 78.159.0.0 255.255.0.0,route 79.135.0.0 255.255.0.0,route 82.192.0.0 255.255.0.0,route 83.149.0.0 255.255.0.0,route 85.114.0.0 255.255.0.0,route 85.17.0.0 255.255.0.0,route 188.127.0.0 255.255.0.0,route 93.170.0.0 255.255.0.0,push-continuation 2'
  35. Thu Nov 12 23:40:38 2015 PUSH: Received control message: 'PUSH_REPLY,route 195.2.0.0 255.255.0.0,route 217.172.0.0 255.255.0.0,route 5.9.0.0 255.255.0.0,route 217.12.0.0 255.255.0.0,route 185.8.0.0 255.255.0.0,route 89.108.0.0 255.255.0.0,route 185.39.0.0 255.255.0.0,route 62.75.0.0 255.255.0.0,route 185.27.0.0 255.255.0.0,route 82.118.0.0 255.255.0.0,route 91.109.0.0 255.255.0.0,route 46.28.0.0 255.255.0.0,route 93.186.0.0 255.255.0.0,route 80.82.0.0 255.255.0.0,route 185.56.0.0 255.255.0.0,route 85.25.0.0 255.255.0.0,route 62.141.0.0 255.255.0.0,route 193.111.0.0 255.255.0.0,route 178.150.0.0 255.255.0.0,route 185.86.0.0 255.255.0.0,route 109.86.0.0 255.255.0.0,route 91.189.0.0 255.255.0.0,route 176.99.0.0 255.255.0.0,route 95.213.0.0 255.255.0.0,route 185.41.0.0 255.255.0.0,route 188.138.0.0 255.255.0.0,route 185.60.0.0 255.255.0.0,route 178.218.0.0 255.255.0.0,route 46.4.0.0 255.255.0.0,route 80.240.0.0 255.255.0.0,route 94.242.0.0 255.255.0.0,route 10.8.0.1,topology net30,push-continuation 2'
  36. Thu Nov 12 23:40:38 2015 PUSH: Received control message: 'PUSH_REPLY,ping 10,ping-restart 120,ifconfig 10.8.0.22 10.8.0.21,push-continuation 1'
  37. Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: timers and/or timeouts modified
  38. Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: --ifconfig/up options modified
  39. Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: route options modified
  40. Thu Nov 12 23:40:38 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  41. Thu Nov 12 23:40:38 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  42. Thu Nov 12 23:40:38 2015 MANAGEMENT: >STATE:1447360838,ASSIGN_IP,,10.8.0.22,
  43. Thu Nov 12 23:40:38 2015 open_tun, tt->ipv6=0
  44. Thu Nov 12 23:40:38 2015 TAP-WIN32 device [Подключение по локальной сети 2] opened: \\.\Global\{691D2C2E-7EC2-481C-AEAC-E50C8D6F6C15}.tap
  45. Thu Nov 12 23:40:38 2015 TAP-Windows Driver Version 9.21
  46. Thu Nov 12 23:40:38 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.22/255.255.255.252 on interface {691D2C2E-7EC2-481C-AEAC-E50C8D6F6C15} [DHCP-serv: 10.8.0.21, lease-time: 31536000]
  47. Thu Nov 12 23:40:38 2015 Successful ARP Flush on interface [13] {691D2C2E-7EC2-481C-AEAC-E50C8D6F6C15}
  48. Thu Nov 12 23:40:43 2015 TEST ROUTES: 61/61 succeeded len=61 ret=1 a=0 u/d=up
  49. Thu Nov 12 23:40:43 2015 MANAGEMENT: >STATE:1447360843,ADD_ROUTES,,,
  50. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.165.235.6 MASK 255.255.255.255 10.8.0.21
  51. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  52. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  53. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.40.35.183 MASK 255.255.255.255 10.8.0.21
  54. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  55. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  56. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.40.74.9 MASK 255.255.255.255 10.8.0.21
  57. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  58. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  59. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 95.211.0.0 MASK 255.255.255.0 10.8.0.21
  60. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  61. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  62. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 162.210.0.0 MASK 255.255.0.0 10.8.0.21
  63. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  64. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  65. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 178.162.0.0 MASK 255.255.0.0 10.8.0.21
  66. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  67. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  68. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.53.0.0 MASK 255.255.0.0 10.8.0.21
  69. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  70. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  71. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 198.7.0.0 MASK 255.255.0.0 10.8.0.21
  72. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  73. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  74. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 199.115.0.0 MASK 255.255.0.0 10.8.0.21
  75. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  76. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  77. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 207.244.0.0 MASK 255.255.0.0 10.8.0.21
  78. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  79. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  80. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 217.79.0.0 MASK 255.255.0.0 10.8.0.21
  81. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  82. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  83. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 31.184.0.0 MASK 255.255.0.0 10.8.0.21
  84. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  85. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  86. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 37.143.0.0 MASK 255.255.0.0 10.8.0.21
  87. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  88. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  89. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 37.48.0.0 MASK 255.255.0.0 10.8.0.21
  90. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  91. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  92. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.165.0.0 MASK 255.255.0.0 10.8.0.21
  93. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  94. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  95. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.104.0.0 MASK 255.255.0.0 10.8.0.21
  96. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  97. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  98. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.45.0.0 MASK 255.255.0.0 10.8.0.21
  99. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  100. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  101. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.61.0.0 MASK 255.255.0.0 10.8.0.21
  102. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  103. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  104. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.79.0.0 MASK 255.255.0.0 10.8.0.21
  105. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  106. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  107. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.210.0.0 MASK 255.255.0.0 10.8.0.21
  108. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  109. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  110. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.212.0.0 MASK 255.255.0.0 10.8.0.21
  111. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  112. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  113. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 78.159.0.0 MASK 255.255.0.0 10.8.0.21
  114. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  115. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  116. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 79.135.0.0 MASK 255.255.0.0 10.8.0.21
  117. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  118. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  119. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 82.192.0.0 MASK 255.255.0.0 10.8.0.21
  120. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  121. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  122. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 83.149.0.0 MASK 255.255.0.0 10.8.0.21
  123. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  124. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  125. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 85.114.0.0 MASK 255.255.0.0 10.8.0.21
  126. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  127. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  128. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 85.17.0.0 MASK 255.255.0.0 10.8.0.21
  129. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  130. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  131. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.127.0.0 MASK 255.255.0.0 10.8.0.21
  132. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  133. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  134. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 93.170.0.0 MASK 255.255.0.0 10.8.0.21
  135. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  136. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  137. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 195.2.0.0 MASK 255.255.0.0 10.8.0.21
  138. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  139. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  140. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 217.172.0.0 MASK 255.255.0.0 10.8.0.21
  141. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  142. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  143. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 5.9.0.0 MASK 255.255.0.0 10.8.0.21
  144. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  145. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  146. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 217.12.0.0 MASK 255.255.0.0 10.8.0.21
  147. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  148. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  149. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.8.0.0 MASK 255.255.0.0 10.8.0.21
  150. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  151. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  152. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 89.108.0.0 MASK 255.255.0.0 10.8.0.21
  153. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  154. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  155. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.39.0.0 MASK 255.255.0.0 10.8.0.21
  156. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  157. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  158. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.75.0.0 MASK 255.255.0.0 10.8.0.21
  159. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  160. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  161. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.27.0.0 MASK 255.255.0.0 10.8.0.21
  162. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  163. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  164. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 82.118.0.0 MASK 255.255.0.0 10.8.0.21
  165. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  166. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  167. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 91.109.0.0 MASK 255.255.0.0 10.8.0.21
  168. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  169. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  170. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.28.0.0 MASK 255.255.0.0 10.8.0.21
  171. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  172. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  173. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 93.186.0.0 MASK 255.255.0.0 10.8.0.21
  174. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  175. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  176. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 80.82.0.0 MASK 255.255.0.0 10.8.0.21
  177. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  178. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  179. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.56.0.0 MASK 255.255.0.0 10.8.0.21
  180. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  181. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  182. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 85.25.0.0 MASK 255.255.0.0 10.8.0.21
  183. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  184. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  185. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 62.141.0.0 MASK 255.255.0.0 10.8.0.21
  186. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  187. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  188. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 193.111.0.0 MASK 255.255.0.0 10.8.0.21
  189. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  190. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  191. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 178.150.0.0 MASK 255.255.0.0 10.8.0.21
  192. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  193. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  194. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.86.0.0 MASK 255.255.0.0 10.8.0.21
  195. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  196. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  197. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 109.86.0.0 MASK 255.255.0.0 10.8.0.21
  198. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  199. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  200. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 91.189.0.0 MASK 255.255.0.0 10.8.0.21
  201. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  202. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  203. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 176.99.0.0 MASK 255.255.0.0 10.8.0.21
  204. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  205. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  206. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 95.213.0.0 MASK 255.255.0.0 10.8.0.21
  207. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  208. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  209. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.41.0.0 MASK 255.255.0.0 10.8.0.21
  210. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  211. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  212. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 188.138.0.0 MASK 255.255.0.0 10.8.0.21
  213. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  214. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  215. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 185.60.0.0 MASK 255.255.0.0 10.8.0.21
  216. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  217. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  218. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 178.218.0.0 MASK 255.255.0.0 10.8.0.21
  219. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  220. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  221. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 46.4.0.0 MASK 255.255.0.0 10.8.0.21
  222. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  223. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  224. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 80.240.0.0 MASK 255.255.0.0 10.8.0.21
  225. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  226. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  227. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 94.242.0.0 MASK 255.255.0.0 10.8.0.21
  228. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  229. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  230. Thu Nov 12 23:40:43 2015 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.21
  231. Thu Nov 12 23:40:43 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
  232. Thu Nov 12 23:40:43 2015 Route addition via IPAPI succeeded [adaptive]
  233. Thu Nov 12 23:40:43 2015 Initialization Sequence Completed
  234. Thu Nov 12 23:40:43 2015 MANAGEMENT: >STATE:1447360843,CONNECTED,SUCCESS,10.8.0.22,37.57.231.119
  235. Fri Nov 13 00:40:36 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  236. Fri Nov 13 00:40:36 2015 Validating certificate key usage
  237. Fri Nov 13 00:40:36 2015 ++ Certificate has key usage 00a0, expects 00a0
  238. Fri Nov 13 00:40:36 2015 VERIFY KU OK
  239. Fri Nov 13 00:40:36 2015 Validating certificate extended key usage
  240. Fri Nov 13 00:40:36 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  241. Fri Nov 13 00:40:36 2015 VERIFY EKU OK
  242. Fri Nov 13 00:40:36 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  243. Fri Nov 13 00:40:36 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  244. Fri Nov 13 00:40:36 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  245. Fri Nov 13 00:40:36 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  246. Fri Nov 13 00:40:36 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  247. Fri Nov 13 00:40:36 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  248. Fri Nov 13 01:40:35 2015 TLS: tls_process: killed expiring key
  249. Fri Nov 13 01:40:36 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  250. Fri Nov 13 01:40:36 2015 Validating certificate key usage
  251. Fri Nov 13 01:40:36 2015 ++ Certificate has key usage 00a0, expects 00a0
  252. Fri Nov 13 01:40:36 2015 VERIFY KU OK
  253. Fri Nov 13 01:40:36 2015 Validating certificate extended key usage
  254. Fri Nov 13 01:40:36 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  255. Fri Nov 13 01:40:36 2015 VERIFY EKU OK
  256. Fri Nov 13 01:40:36 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  257. Fri Nov 13 01:40:36 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  258. Fri Nov 13 01:40:36 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  259. Fri Nov 13 01:40:36 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  260. Fri Nov 13 01:40:36 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  261. Fri Nov 13 01:40:36 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  262. Fri Nov 13 02:40:35 2015 TLS: tls_process: killed expiring key
  263. Fri Nov 13 02:40:36 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  264. Fri Nov 13 02:40:36 2015 Validating certificate key usage
  265. Fri Nov 13 02:40:36 2015 ++ Certificate has key usage 00a0, expects 00a0
  266. Fri Nov 13 02:40:36 2015 VERIFY KU OK
  267. Fri Nov 13 02:40:36 2015 Validating certificate extended key usage
  268. Fri Nov 13 02:40:36 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  269. Fri Nov 13 02:40:36 2015 VERIFY EKU OK
  270. Fri Nov 13 02:40:36 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  271. Fri Nov 13 02:40:36 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  272. Fri Nov 13 02:40:36 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  273. Fri Nov 13 02:40:36 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  274. Fri Nov 13 02:40:36 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  275. Fri Nov 13 02:40:36 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  276. Fri Nov 13 03:40:35 2015 TLS: tls_process: killed expiring key
  277. Fri Nov 13 03:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  278. Fri Nov 13 03:40:40 2015 Validating certificate key usage
  279. Fri Nov 13 03:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  280. Fri Nov 13 03:40:40 2015 VERIFY KU OK
  281. Fri Nov 13 03:40:40 2015 Validating certificate extended key usage
  282. Fri Nov 13 03:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  283. Fri Nov 13 03:40:40 2015 VERIFY EKU OK
  284. Fri Nov 13 03:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  285. Fri Nov 13 03:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  286. Fri Nov 13 03:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  287. Fri Nov 13 03:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  288. Fri Nov 13 03:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  289. Fri Nov 13 03:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  290. Fri Nov 13 04:40:39 2015 TLS: tls_process: killed expiring key
  291. Fri Nov 13 04:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  292. Fri Nov 13 04:40:40 2015 Validating certificate key usage
  293. Fri Nov 13 04:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  294. Fri Nov 13 04:40:40 2015 VERIFY KU OK
  295. Fri Nov 13 04:40:40 2015 Validating certificate extended key usage
  296. Fri Nov 13 04:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  297. Fri Nov 13 04:40:40 2015 VERIFY EKU OK
  298. Fri Nov 13 04:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  299. Fri Nov 13 04:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  300. Fri Nov 13 04:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  301. Fri Nov 13 04:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  302. Fri Nov 13 04:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  303. Fri Nov 13 04:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  304. Fri Nov 13 05:40:39 2015 TLS: tls_process: killed expiring key
  305. Fri Nov 13 05:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  306. Fri Nov 13 05:40:40 2015 Validating certificate key usage
  307. Fri Nov 13 05:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  308. Fri Nov 13 05:40:40 2015 VERIFY KU OK
  309. Fri Nov 13 05:40:40 2015 Validating certificate extended key usage
  310. Fri Nov 13 05:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  311. Fri Nov 13 05:40:40 2015 VERIFY EKU OK
  312. Fri Nov 13 05:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  313. Fri Nov 13 05:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  314. Fri Nov 13 05:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  315. Fri Nov 13 05:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  316. Fri Nov 13 05:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  317. Fri Nov 13 05:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  318. Fri Nov 13 06:40:39 2015 TLS: tls_process: killed expiring key
  319. Fri Nov 13 06:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  320. Fri Nov 13 06:40:40 2015 Validating certificate key usage
  321. Fri Nov 13 06:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  322. Fri Nov 13 06:40:40 2015 VERIFY KU OK
  323. Fri Nov 13 06:40:40 2015 Validating certificate extended key usage
  324. Fri Nov 13 06:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  325. Fri Nov 13 06:40:40 2015 VERIFY EKU OK
  326. Fri Nov 13 06:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  327. Fri Nov 13 06:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  328. Fri Nov 13 06:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  329. Fri Nov 13 06:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  330. Fri Nov 13 06:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  331. Fri Nov 13 06:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  332. Fri Nov 13 07:40:39 2015 TLS: tls_process: killed expiring key
  333. Fri Nov 13 07:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  334. Fri Nov 13 07:40:40 2015 Validating certificate key usage
  335. Fri Nov 13 07:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  336. Fri Nov 13 07:40:40 2015 VERIFY KU OK
  337. Fri Nov 13 07:40:40 2015 Validating certificate extended key usage
  338. Fri Nov 13 07:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  339. Fri Nov 13 07:40:40 2015 VERIFY EKU OK
  340. Fri Nov 13 07:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  341. Fri Nov 13 07:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  342. Fri Nov 13 07:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  343. Fri Nov 13 07:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  344. Fri Nov 13 07:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  345. Fri Nov 13 07:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  346. Fri Nov 13 08:40:39 2015 TLS: tls_process: killed expiring key
  347. Fri Nov 13 08:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  348. Fri Nov 13 08:40:40 2015 Validating certificate key usage
  349. Fri Nov 13 08:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  350. Fri Nov 13 08:40:40 2015 VERIFY KU OK
  351. Fri Nov 13 08:40:40 2015 Validating certificate extended key usage
  352. Fri Nov 13 08:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  353. Fri Nov 13 08:40:40 2015 VERIFY EKU OK
  354. Fri Nov 13 08:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  355. Fri Nov 13 08:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  356. Fri Nov 13 08:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  357. Fri Nov 13 08:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  358. Fri Nov 13 08:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  359. Fri Nov 13 08:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  360. Fri Nov 13 09:40:39 2015 TLS: tls_process: killed expiring key
  361. Fri Nov 13 09:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  362. Fri Nov 13 09:40:40 2015 Validating certificate key usage
  363. Fri Nov 13 09:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  364. Fri Nov 13 09:40:40 2015 VERIFY KU OK
  365. Fri Nov 13 09:40:40 2015 Validating certificate extended key usage
  366. Fri Nov 13 09:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  367. Fri Nov 13 09:40:40 2015 VERIFY EKU OK
  368. Fri Nov 13 09:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  369. Fri Nov 13 09:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  370. Fri Nov 13 09:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  371. Fri Nov 13 09:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  372. Fri Nov 13 09:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  373. Fri Nov 13 09:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  374. Fri Nov 13 10:40:39 2015 TLS: tls_process: killed expiring key
  375. Fri Nov 13 10:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  376. Fri Nov 13 10:40:40 2015 Validating certificate key usage
  377. Fri Nov 13 10:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  378. Fri Nov 13 10:40:40 2015 VERIFY KU OK
  379. Fri Nov 13 10:40:40 2015 Validating certificate extended key usage
  380. Fri Nov 13 10:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  381. Fri Nov 13 10:40:40 2015 VERIFY EKU OK
  382. Fri Nov 13 10:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  383. Fri Nov 13 10:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  384. Fri Nov 13 10:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  385. Fri Nov 13 10:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  386. Fri Nov 13 10:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  387. Fri Nov 13 10:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  388. Fri Nov 13 11:40:39 2015 TLS: tls_process: killed expiring key
  389. Fri Nov 13 11:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  390. Fri Nov 13 11:40:40 2015 Validating certificate key usage
  391. Fri Nov 13 11:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  392. Fri Nov 13 11:40:40 2015 VERIFY KU OK
  393. Fri Nov 13 11:40:40 2015 Validating certificate extended key usage
  394. Fri Nov 13 11:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  395. Fri Nov 13 11:40:40 2015 VERIFY EKU OK
  396. Fri Nov 13 11:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  397. Fri Nov 13 11:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  398. Fri Nov 13 11:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  399. Fri Nov 13 11:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  400. Fri Nov 13 11:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  401. Fri Nov 13 11:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  402. Fri Nov 13 12:40:39 2015 TLS: tls_process: killed expiring key
  403. Fri Nov 13 12:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  404. Fri Nov 13 12:40:40 2015 Validating certificate key usage
  405. Fri Nov 13 12:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  406. Fri Nov 13 12:40:40 2015 VERIFY KU OK
  407. Fri Nov 13 12:40:40 2015 Validating certificate extended key usage
  408. Fri Nov 13 12:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  409. Fri Nov 13 12:40:40 2015 VERIFY EKU OK
  410. Fri Nov 13 12:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  411. Fri Nov 13 12:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  412. Fri Nov 13 12:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  413. Fri Nov 13 12:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  414. Fri Nov 13 12:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  415. Fri Nov 13 12:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  416. Fri Nov 13 13:40:39 2015 TLS: tls_process: killed expiring key
  417. Fri Nov 13 13:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  418. Fri Nov 13 13:40:40 2015 Validating certificate key usage
  419. Fri Nov 13 13:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  420. Fri Nov 13 13:40:40 2015 VERIFY KU OK
  421. Fri Nov 13 13:40:40 2015 Validating certificate extended key usage
  422. Fri Nov 13 13:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  423. Fri Nov 13 13:40:40 2015 VERIFY EKU OK
  424. Fri Nov 13 13:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  425. Fri Nov 13 13:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  426. Fri Nov 13 13:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  427. Fri Nov 13 13:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  428. Fri Nov 13 13:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  429. Fri Nov 13 13:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  430. Fri Nov 13 14:40:39 2015 TLS: tls_process: killed expiring key
  431. Fri Nov 13 14:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  432. Fri Nov 13 14:40:40 2015 Validating certificate key usage
  433. Fri Nov 13 14:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  434. Fri Nov 13 14:40:40 2015 VERIFY KU OK
  435. Fri Nov 13 14:40:40 2015 Validating certificate extended key usage
  436. Fri Nov 13 14:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  437. Fri Nov 13 14:40:40 2015 VERIFY EKU OK
  438. Fri Nov 13 14:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  439. Fri Nov 13 14:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  440. Fri Nov 13 14:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  441. Fri Nov 13 14:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  442. Fri Nov 13 14:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  443. Fri Nov 13 14:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  444. Fri Nov 13 15:40:39 2015 TLS: tls_process: killed expiring key
  445. Fri Nov 13 15:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  446. Fri Nov 13 15:40:40 2015 Validating certificate key usage
  447. Fri Nov 13 15:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  448. Fri Nov 13 15:40:40 2015 VERIFY KU OK
  449. Fri Nov 13 15:40:40 2015 Validating certificate extended key usage
  450. Fri Nov 13 15:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  451. Fri Nov 13 15:40:40 2015 VERIFY EKU OK
  452. Fri Nov 13 15:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  453. Fri Nov 13 15:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  454. Fri Nov 13 15:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  455. Fri Nov 13 15:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  456. Fri Nov 13 15:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  457. Fri Nov 13 15:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  458. Fri Nov 13 16:40:39 2015 TLS: tls_process: killed expiring key
  459. Fri Nov 13 16:40:40 2015 VERIFY OK: depth=1, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=RU CA, name=EasyRSA, emailAddress=root@example.ru
  460. Fri Nov 13 16:40:40 2015 Validating certificate key usage
  461. Fri Nov 13 16:40:40 2015 ++ Certificate has key usage 00a0, expects 00a0
  462. Fri Nov 13 16:40:40 2015 VERIFY KU OK
  463. Fri Nov 13 16:40:40 2015 Validating certificate extended key usage
  464. Fri Nov 13 16:40:40 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  465. Fri Nov 13 16:40:40 2015 VERIFY EKU OK
  466. Fri Nov 13 16:40:40 2015 VERIFY OK: depth=0, C=RU, ST=RU, L=RU, O=RU, OU=RU, CN=server, name=EasyRSA, emailAddress=root@example.ru
  467. Fri Nov 13 16:40:40 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  468. Fri Nov 13 16:40:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  469. Fri Nov 13 16:40:40 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  470. Fri Nov 13 16:40:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  471. Fri Nov 13 16:40:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement