Advertisement
S1AnGeR

test2

May 23rd, 2017
123
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 9.39 KB | None | 0 0
  1. Tue May 23 16:28:31 2017 NOTE: --win-sys env is default from OpenVPN v2.3.   This entry will now be ignored.  Please remove this entry from your configuration file.
  2. Tue May 23 16:28:31 2017 us=397166 Current Parameter Settings:
  3. Tue May 23 16:28:31 2017 us=398172   config = 'Russia, Moscow S10.ovpn'
  4. Tue May 23 16:28:31 2017 us=398172   mode = 0
  5. Tue May 23 16:28:31 2017 us=398172   show_ciphers = DISABLED
  6. Tue May 23 16:28:31 2017 us=398172   show_digests = DISABLED
  7. Tue May 23 16:28:31 2017 us=398172   show_engines = DISABLED
  8. Tue May 23 16:28:31 2017 us=398172   genkey = DISABLED
  9. Tue May 23 16:28:31 2017 us=398172   key_pass_file = '[UNDEF]'
  10. Tue May 23 16:28:31 2017 us=398172   show_tls_ciphers = DISABLED
  11. Tue May 23 16:28:31 2017 us=398172   connect_retry_max = 0
  12. Tue May 23 16:28:31 2017 us=398172 Connection profiles [0]:
  13. Tue May 23 16:28:31 2017 us=398172   proto = tcp-client
  14. Tue May 23 16:28:31 2017 us=398172   local = '[UNDEF]'
  15. Tue May 23 16:28:31 2017 us=398172   local_port = '[UNDEF]'
  16. Tue May 23 16:28:31 2017 us=398172   remote = '188.64.174.63'
  17. Tue May 23 16:28:31 2017 us=398172   remote_port = '443'
  18. Tue May 23 16:28:31 2017 us=398172   remote_float = DISABLED
  19. Tue May 23 16:28:31 2017 us=398172   bind_defined = DISABLED
  20. Tue May 23 16:28:31 2017 us=398172   bind_local = DISABLED
  21. Tue May 23 16:28:31 2017 us=398172   bind_ipv6_only = DISABLED
  22. Tue May 23 16:28:31 2017 us=398172 NOTE: --mute triggered...
  23. Tue May 23 16:28:31 2017 us=398172 273 variation(s) on previous 20 message(s) suppressed by --mute
  24. Tue May 23 16:28:31 2017 us=398172 OpenVPN 2.4.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on May 11 2017
  25. Tue May 23 16:28:31 2017 us=398172 Windows version 6.2 (Windows 8 or greater) 64bit
  26. Tue May 23 16:28:31 2017 us=398172 library versions: OpenSSL 1.0.2k  26 Jan 2017, LZO 2.10
  27. Enter Management Password:
  28. Tue May 23 16:28:31 2017 us=398172 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25345
  29. Tue May 23 16:28:31 2017 us=398172 Need hold release from management interface, waiting...
  30. Tue May 23 16:28:31 2017 us=899268 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25345
  31. Tue May 23 16:28:32 2017 us=773 MANAGEMENT: CMD 'state on'
  32. Tue May 23 16:28:32 2017 us=773 MANAGEMENT: CMD 'log all on'
  33. Tue May 23 16:28:32 2017 us=35878 MANAGEMENT: CMD 'echo all on'
  34. Tue May 23 16:28:32 2017 us=36866 MANAGEMENT: CMD 'hold off'
  35. Tue May 23 16:28:32 2017 us=38872 MANAGEMENT: CMD 'hold release'
  36. Tue May 23 16:28:39 2017 us=45857 MANAGEMENT: CMD 'proxy HTTP 10.0.32.227 9090'
  37. Tue May 23 16:28:40 2017 us=49847 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
  38. Tue May 23 16:28:40 2017 us=139884 LZO compression initializing
  39. Tue May 23 16:28:40 2017 us=141888 Control Channel MTU parms [ L:1656 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  40. Tue May 23 16:28:40 2017 us=141888 Data Channel MTU parms [ L:1656 D:1450 EF:124 EB:412 ET:32 EL:3 ]
  41. Tue May 23 16:28:40 2017 us=142890 Local Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  42. Tue May 23 16:28:40 2017 us=142890 Expected Remote Options String (VER=V4): 'V4,dev-type tap,link-mtu 1592,tun-mtu 1532,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  43. Tue May 23 16:28:40 2017 us=142890 TCP/UDP: Preserving recently used remote address: [AF_INET]10.0.32.227:9090
  44. Tue May 23 16:28:40 2017 us=142890 Socket Buffers: R=[65536->262144] S=[65536->262144]
  45. Tue May 23 16:28:40 2017 us=142890 Attempting to establish TCP connection with [AF_INET]10.0.32.227:9090 [nonblock]
  46. Tue May 23 16:28:40 2017 us=142890 MANAGEMENT: >STATE:1495546120,TCP_CONNECT,,,,,,
  47. Tue May 23 16:28:41 2017 us=143404 TCP connection established with [AF_INET]10.0.32.227:9090
  48. Tue May 23 16:28:41 2017 us=145190 Send to HTTP proxy: 'CONNECT 188.64.174.63:443 HTTP/1.0'
  49. Tue May 23 16:28:41 2017 us=145190 Send to HTTP proxy: 'Host: 188.64.174.63'
  50. Tue May 23 16:28:42 2017 us=580654 HTTP proxy returned: 'HTTP/1.0 200 Connection established'
  51. Tue May 23 16:28:44 2017 us=580877 TCP_CLIENT link local: (not bound)
  52. Tue May 23 16:28:44 2017 us=580877 TCP_CLIENT link remote: [AF_INET]10.0.32.227:9090
  53. Tue May 23 16:28:44 2017 us=582781 MANAGEMENT: >STATE:1495546124,WAIT,,,,,,
  54. Tue May 23 16:28:44 2017 us=611455 MANAGEMENT: >STATE:1495546124,AUTH,,,,,,
  55. Tue May 23 16:28:44 2017 us=611455 TLS: Initial packet from [AF_INET]10.0.32.227:9090, sid=d1bd4e42 f5cf459a
  56. Tue May 23 16:28:44 2017 us=721775 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  57. Tue May 23 16:28:44 2017 us=722792 VERIFY OK: nsCertType=SERVER
  58. Tue May 23 16:28:44 2017 us=722792 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  59. Tue May 23 16:28:44 2017 us=853557 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1592', remote='link-mtu 1576'
  60. Tue May 23 16:28:44 2017 us=853557 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  61. Tue May 23 16:28:44 2017 us=853557 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  62. Tue May 23 16:28:44 2017 us=853557 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  63. Tue May 23 16:28:44 2017 us=853557 [server] Peer Connection Initiated with [AF_INET]10.0.32.227:9090
  64. Tue May 23 16:28:46 2017 us=91077 MANAGEMENT: >STATE:1495546126,GET_CONFIG,,,,,,
  65. Tue May 23 16:28:46 2017 us=91077 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  66. Tue May 23 16:28:46 2017 us=187986 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.122.0.1,ping 8,ping-restart 30,ifconfig 10.122.47.248 255.224.0.0,peer-id 0,cipher AES-128-GCM'
  67. Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: timers and/or timeouts modified
  68. Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: --ifconfig/up options modified
  69. Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: route-related options modified
  70. Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: peer-id set
  71. Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: adjusting link_mtu to 1659
  72. Tue May 23 16:28:46 2017 us=187986 OPTIONS IMPORT: data channel crypto options modified
  73. Tue May 23 16:28:46 2017 us=188490 Data Channel MTU parms [ L:1587 D:1450 EF:55 EB:412 ET:32 EL:3 ]
  74. Tue May 23 16:28:46 2017 us=190013 Data Channel Encrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  75. Tue May 23 16:28:46 2017 us=190013 Data Channel Decrypt: Cipher 'AES-128-GCM' initialized with 128 bit key
  76. Tue May 23 16:28:46 2017 us=190505 interactive service msg_channel=0
  77. Tue May 23 16:28:46 2017 us=191539 ROUTE_GATEWAY 10.0.32.1/255.255.224.0 I=5 HWADDR=40:8d:5c:b5:61:24
  78. Tue May 23 16:28:46 2017 us=197534 open_tun
  79. Tue May 23 16:28:46 2017 us=198535 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB}.tap
  80. Tue May 23 16:28:46 2017 us=198535 TAP-Windows Driver Version 9.21
  81. Tue May 23 16:28:46 2017 us=198535 TAP-Windows MTU=1500
  82. Tue May 23 16:28:46 2017 us=199539 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.122.47.248/255.224.0.0 on interface {BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB} [DHCP-serv: 10.96.0.0, lease-time: 31536000]
  83. Tue May 23 16:28:46 2017 us=199539 DHCP option string: 06040808 0808
  84. Tue May 23 16:28:46 2017 us=199539 Successful ARP Flush on interface [16] {BC87DA93-0FD8-4DE5-84D9-E4A2DF8983DB}
  85. Tue May 23 16:28:46 2017 us=203525 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  86. Tue May 23 16:28:46 2017 us=203525 MANAGEMENT: >STATE:1495546126,ASSIGN_IP,,10.122.47.248,,,,
  87. Tue May 23 16:28:49 2017 us=1228 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
  88. Tue May 23 16:28:49 2017 us=1228 C:\Windows\system32\route.exe ADD 10.0.32.227 MASK 255.255.255.255 10.0.32.1 IF 5
  89. Tue May 23 16:28:49 2017 us=1228 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  90. Tue May 23 16:28:49 2017 us=23371 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.122.0.1
  91. Tue May 23 16:28:49 2017 us=23371 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  92. Tue May 23 16:28:49 2017 us=40493 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.122.0.1
  93. Tue May 23 16:28:49 2017 us=40493 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  94. Tue May 23 16:28:49 2017 us=62552 Initialization Sequence Completed
  95. Tue May 23 16:28:49 2017 us=62552 MANAGEMENT: >STATE:1495546129,CONNECTED,SUCCESS,10.122.47.248,10.0.32.227,9090,10.0.34.157,4024
  96. Tue May 23 16:28:49 2017 us=131319 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  97. Tue May 23 16:28:52 2017 us=56207 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  98. Tue May 23 16:28:58 2017 us=57379 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  99. Tue May 23 16:29:00 2017 us=81381 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  100. Tue May 23 16:29:00 2017 us=81381 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  101. Tue May 23 16:29:03 2017 us=81716 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  102. Tue May 23 16:29:03 2017 us=82816 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  103. Tue May 23 16:29:09 2017 us=82365 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
  104. Tue May 23 16:29:09 2017 us=83278 Recursive routing detected, drop tun packet to [AF_INET]10.0.32.227:9090
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement