Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue May 23 16:28:31 2017 NOTE: --win-sys env is default from OpenVPN v2.3. This entry will now be ignored. Please remove this entry from your configuration file.
- Tue May 23 16:28:31 2017 us=397166 Current Parameter Settings:
- Tue May 23 16:28:31 2017 us=398172 config = 'Russia, Moscow S10.ovpn'
- Tue May 23 16:28:31 2017 us=398172 mode = 0
- Tue May 23 16:28:31 2017 us=398172 show_ciphers = DISABLED
- Tue May 23 16:28:31 2017 us=398172 show_digests = DISABLED
- Tue May 23 16:28:31 2017 us=398172 show_engines = DISABLED
- Tue May 23 16:28:31 2017 us=398172 genkey = DISABLED
- Tue May 23 16:28:31 2017 us=398172 key_pass_file = '[UNDEF]'
- Tue May 23 16:28:31 2017 us=398172 show_tls_ciphers = DISABLED
- Tue May 23 16:28:31 2017 us=398172 connect_retry_max = 0
- Tue May 23 16:28:31 2017 us=398172 Connection profiles [0]:
- Tue May 23 16:28:31 2017 us=398172 proto = tcp-client
- Tue May 23 16:28:31 2017 us=398172 local = '[UNDEF]'
- Tue May 23 16:28:31 2017 us=398172 local_port = '[UNDEF]'
- Tue May 23 16:28:31 2017 us=398172 remote = '188.64.174.63'
- Tue May 23 16:28:31 2017 us=398172 remote_port = '443'
- Tue May 23 16:28:31 2017 us=398172 remote_float = DISABLED
- Tue May 23 16:28:31 2017 us=398172 bind_defined = DISABLED
- Tue May 23 16:28:31 2017 us=398172 bind_local = DISABLED
- Tue May 23 16:28:31 2017 us=398172 bind_ipv6_only = DISABLED
- Tue May 23 16:28:31 2017 us=398172 NOTE: --mute triggered...
- Tue May 23 16:28:31 2017 us=398172 273 variation(s) on previous 20 message(s) suppressed by --mute
- Tue May 23 16:28:31 2017 us=398172 OpenVPN 2.4.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 11 2017
- Tue May 23 16:28:31 2017 us=398172 Windows version 6.2 (Windows 8 or greater) 64bit
- Tue May 23 16:28:31 2017 us=398172 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.10
- Enter Management Password:
- Tue May 23 16:28:31 2017 us=398172 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25345
- Tue May 23 16:28:31 2017 us=398172 Need hold release from management interface, waiting...
- Tue May 23 16:28:31 2017 us=899268 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25345
- Tue May 23 16:28:32 2017 us=773 MANAGEMENT: CMD 'state on'
- Tue May 23 16:28:32 2017 us=773 MANAGEMENT: CMD 'log all on'
- Tue May 23 16:28:32 2017 us=35878 MANAGEMENT: CMD 'echo all on'
- Tue May 23 16:28:32 2017 us=36866 MANAGEMENT: CMD 'hold off'
- Tue May 23 16:28:32 2017 us=38872 MANAGEMENT: CMD 'hold release'
- Tue May 23 16:28:39 2017 us=45857 MANAGEMENT: CMD 'proxy HTTP 10.0.32.227 9090'
- Tue May 23 16:28:40 2017 us=49847 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Tue May 23 16:28:40 2017 us=139884 LZO compression initializing
- Tue May 23 16:28:40 2017 us=141888 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
- Tue May 23 16:28:40 2017 us=141888 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
- Tue May 23 16:28:40 2017 us=142890 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
- Tue May 23 16:28:40 2017 us=142890 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
- Tue May 23 16:28:40 2017 us=142890 TCP/UDP: Preserving recently used remote address: [AF_INET]10.0.32.227:9090
- Tue May 23 16:28:40 2017 us=142890 Socket Buffers: R=[65536->262144] S=[65536->262144]
- Tue May 23 16:28:40 2017 us=142890 Attempting to establish TCP connection with [AF_INET]10.0.32.227:9090 [nonblock]
- Tue May 23 16:28:40 2017 us=142890 MANAGEMENT: >STATE:1495546120,TCP_CONNECT,,,,,,
- Tue May 23 16:28:41 2017 us=143404 TCP connection established with [AF_INET]10.0.32.227:9090
- Tue May 23 16:28:41 2017 us=145190 Send to HTTP proxy: 'CONNECT 188.64.174.63:443 HTTP/1.0'
- Tue May 23 16:28:41 2017 us=145190 Send to HTTP proxy: 'Host: 188.64.174.63'
- Tue May 23 16:28:42 2017 us=580654 HTTP proxy returned: 'HTTP/1.0 200 Connection established'
- Tue May 23 16:28:44 2017 us=580877 TCP_CLIENT link local: (not bound)
- Tue May 23 16:28:44 2017 us=580877 TCP_CLIENT link remote: [AF_INET]10.0.32.227:9090
- Tue May 23 16:28:44 2017 us=582781 MANAGEMENT: >STATE:1495546124,WAIT,,,,,,
- Tue May 23 16:28:44 2017 us=611455 MANAGEMENT: >STATE:1495546124,AUTH,,,,,,
- Tue May 23 16:28:44 2017 us=611455 TLS: Initial packet from [AF_INET]10.0.32.227:9090, sid=d1bd4e42 f5cf459a
- Tue May 23 16:28:44 2017 us=721775 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
- Tue May 23 16:28:44 2017 us=722792 VERIFY OK: nsCertType=SERVER
- Tue May 23 16:28:44 2017 us=722792 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
- Tue May 23 16:28:44 2017 us=853557 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
- Tue May 23 16:28:44 2017 us=853557 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
- Tue May 23 16:28:44 2017 us=853557 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
- Tue May 23 16:28:44 2017 us=853557 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 23 16:28:44 2017 us=853557 [server] Peer Connection Initiated with [AF_INET]10.0.32.227:9090
- Tue May 23 16:28:46 2017 us=91077 MANAGEMENT: >STATE:1495546126,GET_CONFIG,,,,,,
- Tue May 23 16:28:46 2017 us=91077 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Tue May 23 16:28:46 2017 us=187986 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.122.0.1,ping 8,ping-restart 30,ifconfig 10.122.47.248 255.224.0.0,peer-id 0,cipher AES-128-GCM'
- Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: timers and/or timeouts modified
- Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: route-related options modified
- Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: peer-id set
- Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: adjusting link_mtu to 1659
- Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: data channel crypto options modified
- Tue May 23 16:28:46 2017 us=188490 Data Channel MTU parms [ L:1587 D:1450 EF:55 EB:412 ET:32 EL:3 ]
- Tue May 23 16:28:46 2017 us=190013 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Tue May 23 16:28:46 2017 us=190013 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
- Tue May 23 16:28:46 2017 us=190505 interactive service msg_channel=0
- Tue May 23 16:28:46 2017 us=191539 ROUTE_GATEWAY 10.0.32.1/255.255.224.0 I=5 HWADDR=40:8d:5c:b5:61:24
- Tue May 23 16:28:46 2017 us=197534 open_tun
- Tue May 23 16:28:46 2017 us=198535 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB}.tap
- Tue May 23 16:28:46 2017 us=198535 TAP-Windows Driver Version 9.21
- Tue May 23 16:28:46 2017 us=198535 TAP-Windows MTU=1500
- Tue May 23 16:28:46 2017 us=199539 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.122.47.248/255.224.0.0 on interface {BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB} [DHCP-serv: 10.96.0.0, lease-time: 31536000]
- Tue May 23 16:28:46 2017 us=199539 DHCP option string: 06040808 0808
- Tue May 23 16:28:46 2017 us=199539 Successful ARP Flush on interface [16] {BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB}
- Tue May 23 16:28:46 2017 us=203525 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Tue May 23 16:28:46 2017 us=203525 MANAGEMENT: >STATE:1495546126,ASSIGN_IP,,10.122.47.248,,,,
- Tue May 23 16:28:49 2017 us=1228 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
- Tue May 23 16:28:49 2017 us=1228 C:\Windows\system32\route.exe ADD 10.0.32.227 MASK 255.255.255.255 10.0.32.1 IF 5
- Tue May 23 16:28:49 2017 us=1228 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Tue May 23 16:28:49 2017 us=23371 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.122.0.1
- Tue May 23 16:28:49 2017 us=23371 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Tue May 23 16:28:49 2017 us=40493 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.122.0.1
- Tue May 23 16:28:49 2017 us=40493 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Tue May 23 16:28:49 2017 us=62552 Initialization Sequence Completed
- Tue May 23 16:28:49 2017 us=62552 MANAGEMENT: >STATE:1495546129,CONNECTED,SUCCESS,10.122.47.248,10.0.32.227,9090,10.0.34.157,4024
- Tue May 23 16:28:49 2017 us=131319 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:28:52 2017 us=56207 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:28:58 2017 us=57379 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:29:00 2017 us=81381 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:29:00 2017 us=81381 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:29:03 2017 us=81716 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:29:03 2017 us=82816 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:29:09 2017 us=82365 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
- Tue May 23 16:29:09 2017 us=83278 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement