Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ➜ Andrei_Boltachev sudo openvpn --config Andrei_Boltachev.ovpn
- Fri Mar 15 17:04:40 2019 Unrecognized option or missing parameter(s) in Andrei_Boltachev.ovpn:29: block-outside-dns (2.3.10)
- Fri Mar 15 17:04:40 2019 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
- Fri Mar 15 17:04:40 2019 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
- Enter Auth Username: **********
- Enter Auth Password: ************
- Fri Mar 15 17:05:07 2019 WARNING: file 'Andrei_Boltachev.key' is group or others accessible
- Fri Mar 15 17:05:07 2019 WARNING: file 'ta.key' is group or others accessible
- Fri Mar 15 17:05:07 2019 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Fri Mar 15 17:05:07 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Mar 15 17:05:07 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Mar 15 17:05:07 2019 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1242)
- Fri Mar 15 17:05:07 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Fri Mar 15 17:05:08 2019 UDPv4 link local: [undef]
- Fri Mar 15 17:05:08 2019 UDPv4 link remote: [AF_INET]77.227.105.210:11194
- Fri Mar 15 17:05:08 2019 TLS: Initial packet from [AF_INET]77.227.105.210:11194, sid=c1dee74f 14e50271
- Fri Mar 15 17:05:08 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Fri Mar 15 17:05:08 2019 VERIFY OK: depth=1, C=ES, ST=BCN, L=Barcelona, O=Diprotech, OU=sistemas, CN=Diprotech CA, emailAddress=sistemas@diprotech.com
- Fri Mar 15 17:05:08 2019 Validating certificate key usage
- Fri Mar 15 17:05:08 2019 ++ Certificate has key usage 00a0, expects 00a0
- Fri Mar 15 17:05:08 2019 VERIFY KU OK
- Fri Mar 15 17:05:08 2019 Validating certificate extended key usage
- Fri Mar 15 17:05:08 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Fri Mar 15 17:05:08 2019 VERIFY EKU OK
- Fri Mar 15 17:05:08 2019 VERIFY OK: depth=0, C=ES, ST=BCN, L=Barcelona, O=Diprotech, OU=sistemas, CN=vpn2.diprotech.com, emailAddress=sistemas@diprotech.com
- Fri Mar 15 17:05:08 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Mar 15 17:05:08 2019 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Mar 15 17:05:08 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Fri Mar 15 17:05:08 2019 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri Mar 15 17:05:08 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
- Fri Mar 15 17:05:08 2019 [vpn2.diprotech.com] Peer Connection Initiated with [AF_INET]77.227.105.210:11194
- Fri Mar 15 17:05:11 2019 SENT CONTROL [vpn2.diprotech.com]: 'PUSH_REQUEST' (status=1)
- Fri Mar 15 17:05:11 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 192.168.11.0 255.255.255.0,route 192.168.12.0 255.255.255.0,route 192.168.13.0 255.255.255.0,route 192.168.22.0 255.255.255.0,route 192.168.23.0 255.255.255.0,route 192.168.24.0 255.255.255.0,route 192.168.25.0 255.255.255.0,route 192.168.32.0 255.255.248.0,route 192.168.128.0 255.255.255.0,route 10.71.80.0 255.255.240.0,route 10.100.1.0 255.255.255.0,route 10.250.255.240 255.255.255.240,route 10.251.3.0 255.255.255.0,route 10.251.5.0 255.255.255.0,route 10.237.29.0 255.255.255.0,route 10.1.0.0 255.255.0.0,route 10.9.0.0 255.255.0.0,route 63.83.238.244 255.255.255.255,dhcp-option DNS 192.168.32.10,dhcp-option DOMAIN gpm.local,route-gateway 192.168.6.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 192.168.6.16 255.255.255.0'
- Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: --socket-flags option modified
- Fri Mar 15 17:05:11 2019 NOTE: setsockopt TCP_NODELAY=1 failed
- Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: route options modified
- Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: route-related options modified
- Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Fri Mar 15 17:05:11 2019 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp4s0 HWADDR=48:5d:60:84:5e:3d
- Fri Mar 15 17:05:11 2019 TUN/TAP device tun0 opened
- Fri Mar 15 17:05:11 2019 TUN/TAP TX queue length set to 100
- Fri Mar 15 17:05:11 2019 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Fri Mar 15 17:05:11 2019 /sbin/ip link set dev tun0 up mtu 1242
- Fri Mar 15 17:05:11 2019 /sbin/ip addr add dev tun0 192.168.6.16/24 broadcast 192.168.6.255
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.0.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.11.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.12.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.13.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.22.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.23.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.24.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.25.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.32.0/21 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.128.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.71.80.0/20 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.100.1.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.250.255.240/28 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.251.3.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.251.5.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.237.29.0/24 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.1.0.0/16 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.9.0.0/16 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 /sbin/ip route add 63.83.238.244/32 via 192.168.6.1
- Fri Mar 15 17:05:11 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement