Advertisement
Guest User

Untitled

a guest
Mar 15th, 2019
119
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.21 KB | None | 0 0
  1. ➜ Andrei_Boltachev sudo openvpn --config Andrei_Boltachev.ovpn
  2. Fri Mar 15 17:04:40 2019 Unrecognized option or missing parameter(s) in Andrei_Boltachev.ovpn:29: block-outside-dns (2.3.10)
  3. Fri Mar 15 17:04:40 2019 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
  4. Fri Mar 15 17:04:40 2019 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
  5. Enter Auth Username: **********
  6. Enter Auth Password: ************
  7. Fri Mar 15 17:05:07 2019 WARNING: file 'Andrei_Boltachev.key' is group or others accessible
  8. Fri Mar 15 17:05:07 2019 WARNING: file 'ta.key' is group or others accessible
  9. Fri Mar 15 17:05:07 2019 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
  10. Fri Mar 15 17:05:07 2019 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  11. Fri Mar 15 17:05:07 2019 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  12. Fri Mar 15 17:05:07 2019 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1242)
  13. Fri Mar 15 17:05:07 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
  14. Fri Mar 15 17:05:08 2019 UDPv4 link local: [undef]
  15. Fri Mar 15 17:05:08 2019 UDPv4 link remote: [AF_INET]77.227.105.210:11194
  16. Fri Mar 15 17:05:08 2019 TLS: Initial packet from [AF_INET]77.227.105.210:11194, sid=c1dee74f 14e50271
  17. Fri Mar 15 17:05:08 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  18. Fri Mar 15 17:05:08 2019 VERIFY OK: depth=1, C=ES, ST=BCN, L=Barcelona, O=Diprotech, OU=sistemas, CN=Diprotech CA, emailAddress=sistemas@diprotech.com
  19. Fri Mar 15 17:05:08 2019 Validating certificate key usage
  20. Fri Mar 15 17:05:08 2019 ++ Certificate has key usage 00a0, expects 00a0
  21. Fri Mar 15 17:05:08 2019 VERIFY KU OK
  22. Fri Mar 15 17:05:08 2019 Validating certificate extended key usage
  23. Fri Mar 15 17:05:08 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  24. Fri Mar 15 17:05:08 2019 VERIFY EKU OK
  25. Fri Mar 15 17:05:08 2019 VERIFY OK: depth=0, C=ES, ST=BCN, L=Barcelona, O=Diprotech, OU=sistemas, CN=vpn2.diprotech.com, emailAddress=sistemas@diprotech.com
  26. Fri Mar 15 17:05:08 2019 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  27. Fri Mar 15 17:05:08 2019 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  28. Fri Mar 15 17:05:08 2019 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  29. Fri Mar 15 17:05:08 2019 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  30. Fri Mar 15 17:05:08 2019 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  31. Fri Mar 15 17:05:08 2019 [vpn2.diprotech.com] Peer Connection Initiated with [AF_INET]77.227.105.210:11194
  32. Fri Mar 15 17:05:11 2019 SENT CONTROL [vpn2.diprotech.com]: 'PUSH_REQUEST' (status=1)
  33. Fri Mar 15 17:05:11 2019 PUSH: Received control message: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 192.168.11.0 255.255.255.0,route 192.168.12.0 255.255.255.0,route 192.168.13.0 255.255.255.0,route 192.168.22.0 255.255.255.0,route 192.168.23.0 255.255.255.0,route 192.168.24.0 255.255.255.0,route 192.168.25.0 255.255.255.0,route 192.168.32.0 255.255.248.0,route 192.168.128.0 255.255.255.0,route 10.71.80.0 255.255.240.0,route 10.100.1.0 255.255.255.0,route 10.250.255.240 255.255.255.240,route 10.251.3.0 255.255.255.0,route 10.251.5.0 255.255.255.0,route 10.237.29.0 255.255.255.0,route 10.1.0.0 255.255.0.0,route 10.9.0.0 255.255.0.0,route 63.83.238.244 255.255.255.255,dhcp-option DNS 192.168.32.10,dhcp-option DOMAIN gpm.local,route-gateway 192.168.6.1,topology subnet,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 192.168.6.16 255.255.255.0'
  34. Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: timers and/or timeouts modified
  35. Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: --socket-flags option modified
  36. Fri Mar 15 17:05:11 2019 NOTE: setsockopt TCP_NODELAY=1 failed
  37. Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: --ifconfig/up options modified
  38. Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: route options modified
  39. Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: route-related options modified
  40. Fri Mar 15 17:05:11 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  41. Fri Mar 15 17:05:11 2019 ROUTE_GATEWAY 192.168.43.1/255.255.255.0 IFACE=wlp4s0 HWADDR=48:5d:60:84:5e:3d
  42. Fri Mar 15 17:05:11 2019 TUN/TAP device tun0 opened
  43. Fri Mar 15 17:05:11 2019 TUN/TAP TX queue length set to 100
  44. Fri Mar 15 17:05:11 2019 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  45. Fri Mar 15 17:05:11 2019 /sbin/ip link set dev tun0 up mtu 1242
  46. Fri Mar 15 17:05:11 2019 /sbin/ip addr add dev tun0 192.168.6.16/24 broadcast 192.168.6.255
  47. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.0.0/24 via 192.168.6.1
  48. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.11.0/24 via 192.168.6.1
  49. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.12.0/24 via 192.168.6.1
  50. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.13.0/24 via 192.168.6.1
  51. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.22.0/24 via 192.168.6.1
  52. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.23.0/24 via 192.168.6.1
  53. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.24.0/24 via 192.168.6.1
  54. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.25.0/24 via 192.168.6.1
  55. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.32.0/21 via 192.168.6.1
  56. Fri Mar 15 17:05:11 2019 /sbin/ip route add 192.168.128.0/24 via 192.168.6.1
  57. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.71.80.0/20 via 192.168.6.1
  58. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.100.1.0/24 via 192.168.6.1
  59. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.250.255.240/28 via 192.168.6.1
  60. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.251.3.0/24 via 192.168.6.1
  61. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.251.5.0/24 via 192.168.6.1
  62. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.237.29.0/24 via 192.168.6.1
  63. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.1.0.0/16 via 192.168.6.1
  64. Fri Mar 15 17:05:11 2019 /sbin/ip route add 10.9.0.0/16 via 192.168.6.1
  65. Fri Mar 15 17:05:11 2019 /sbin/ip route add 63.83.238.244/32 via 192.168.6.1
  66. Fri Mar 15 17:05:11 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement