Advertisement
Guest User

Untitled

a guest
Jul 19th, 2018
199
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.89 KB | None | 0 0
  1. Thu Jul 19 13:26:14 2018 OpenVPN 2.3.2 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [EPOLL] [PKCS11] [eurephia] [MH] [IPv6] built on Dec 1 2014
  2. Thu Jul 19 13:26:14 2018 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
  3. Thu Jul 19 13:26:14 2018 Diffie-Hellman initialized with 2048 bit key
  4. Thu Jul 19 13:26:14 2018 Socket Buffers: R=[212992->131072] S=[212992->131072]
  5. Thu Jul 19 13:26:14 2018 ROUTE_GATEWAY 192.168.0.6/255.255.255.0 IFACE=eth0 HWADDR=00:25:90:aa:b7:85
  6. Thu Jul 19 13:26:14 2018 TUN/TAP device tun0 opened
  7. Thu Jul 19 13:26:14 2018 TUN/TAP TX queue length set to 100
  8. Thu Jul 19 13:26:14 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  9. Thu Jul 19 13:26:14 2018 /sbin/ip link set dev tun0 up mtu 1500
  10. Thu Jul 19 13:26:14 2018 /sbin/ip addr add dev tun0 local 10.254.254.1 peer 10.254.254.2
  11. Thu Jul 19 13:26:14 2018 /sbin/ip route add 192.168.10.0/24 via 10.254.254.2
  12. Thu Jul 19 13:26:14 2018 /sbin/ip route add 10.254.254.0/24 via 10.254.254.2
  13. Thu Jul 19 13:26:14 2018 UID set to nobody
  14. Thu Jul 19 13:26:14 2018 UDPv4 link local (bound): [undef]
  15. Thu Jul 19 13:26:14 2018 UDPv4 link remote: [undef]
  16. Thu Jul 19 13:26:14 2018 MULTI: multi_init called, r=256 v=256
  17. Thu Jul 19 13:26:14 2018 IFCONFIG POOL: base=10.254.254.4 size=62, ipv6=0
  18. Thu Jul 19 13:26:14 2018 Initialization Sequence Completed
  19. Thu Jul 19 13:26:19 2018 194.190.1.123:1955 TLS: Initial packet from [AF_INET]194.190.1.123:1955, sid=6a20d4c1 915029d8
  20. Thu Jul 19 13:26:50 2018 194.190.1.123:1955 TLS: new session incoming connection from [AF_INET]194.190.1.123:1955
  21. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 TLS: Initial packet from [AF_INET]195.19.64.53:37500, sid=3b595999 bf396060
  22. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 VERIFY OK: depth=1, C=RU, ST=Samara, L=Samara, O=Bravo, OU=admin, CN=Aster, name=EasyRSA, emailAddress=9868.08@gmail.com
  23. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 VERIFY OK: depth=0, C=RU, ST=Samara, L=Samara, O=Bravo, OU=admin, CN=Gypro, name=EasyRSA, emailAddress=9868.08@gmail.com
  24. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  25. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 Data Channel Encrypt: Using 128 bit message hash 'MD5' for HMAC authentication
  26. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  27. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 Data Channel Decrypt: Using 128 bit message hash 'MD5' for HMAC authentication
  28. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 Control Channel: TLSv1, cipher TLSv1/SSLv3 RC4-MD5, 2048 bit RSA
  29. Thu Jul 19 13:26:52 2018 195.19.64.53:37500 [Gypro] Peer Connection Initiated with [AF_INET]195.19.64.53:37500
  30. Thu Jul 19 13:26:52 2018 Gypro/195.19.64.53:37500 OPTIONS IMPORT: reading client specific options from: ccd/Gypro
  31. Thu Jul 19 13:26:52 2018 Gypro/195.19.64.53:37500 MULTI: Learn: 10.254.254.4 -> Gypro/195.19.64.53:37500
  32. Thu Jul 19 13:26:52 2018 Gypro/195.19.64.53:37500 MULTI: primary virtual IP for Gypro/195.19.64.53:37500: 10.254.254.4
  33. Thu Jul 19 13:26:52 2018 Gypro/195.19.64.53:37500 MULTI: internal route 192.168.10.0/24 -> Gypro/195.19.64.53:37500
  34. Thu Jul 19 13:26:52 2018 Gypro/195.19.64.53:37500 MULTI: Learn: 192.168.10.0/24 -> Gypro/195.19.64.53:37500
  35. Thu Jul 19 13:26:54 2018 Gypro/195.19.64.53:37500 PUSH: Received control message: 'PUSH_REQUEST'
  36. Thu Jul 19 13:26:54 2018 Gypro/195.19.64.53:37500 send_push_reply(): safe_cap=940
  37. Thu Jul 19 13:26:54 2018 Gypro/195.19.64.53:37500 SENT CONTROL [Gypro]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.254.254.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.254.254.4 10.254.254.1' (status=1)
  38. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 TLS: Initial packet from [AF_INET]46.0.196.214:1955, sid=a9aa84db 6a291885
  39. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 VERIFY OK: depth=1, C=RU, ST=Samara, L=Samara, O=Bravo, OU=admin, CN=Aster, name=EasyRSA, emailAddress=9868.08@gmail.com
  40. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 VERIFY OK: depth=0, C=RU, ST=Samara, L=Samara, O=Bravo, OU=admin, CN=AsterSmr, name=EasyRSA, emailAddress=9868.08@gmail.com
  41. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  42. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 Data Channel Encrypt: Using 128 bit message hash 'MD5' for HMAC authentication
  43. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  44. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 Data Channel Decrypt: Using 128 bit message hash 'MD5' for HMAC authentication
  45. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
  46. Thu Jul 19 13:27:05 2018 46.0.196.214:1955 [AsterSmr] Peer Connection Initiated with [AF_INET]46.0.196.214:1955
  47. Thu Jul 19 13:27:05 2018 AsterSmr/46.0.196.214:1955 OPTIONS IMPORT: reading client specific options from: ccd/AsterSmr
  48. Thu Jul 19 13:27:05 2018 AsterSmr/46.0.196.214:1955 MULTI: Learn: 10.254.254.2 -> AsterSmr/46.0.196.214:1955
  49. Thu Jul 19 13:27:05 2018 AsterSmr/46.0.196.214:1955 MULTI: primary virtual IP for AsterSmr/46.0.196.214:1955: 10.254.254.2
  50. Thu Jul 19 13:27:07 2018 AsterSmr/46.0.196.214:1955 PUSH: Received control message: 'PUSH_REQUEST'
  51. Thu Jul 19 13:27:07 2018 AsterSmr/46.0.196.214:1955 send_push_reply(): safe_cap=940
  52. Thu Jul 19 13:27:07 2018 AsterSmr/46.0.196.214:1955 SENT CONTROL [AsterSmr]: 'PUSH_REPLY,route 192.168.0.0 255.255.255.0,route 10.254.254.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.254.254.2 10.254.254.1' (status=1)
  53. Thu Jul 19 13:27:19 2018 194.190.1.123:1955 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  54. Thu Jul 19 13:27:19 2018 194.190.1.123:1955 TLS Error: TLS handshake failed
  55. Thu Jul 19 13:27:19 2018 194.190.1.123:1955 SIGUSR1[soft,tls-error] received, client-instance restarting
  56. Thu Jul 19 13:27:21 2018 194.190.1.123:1955 TLS: Initial packet from [AF_INET]194.190.1.123:1955, sid=3f4d193a faaa1995
  57. Thu Jul 19 13:27:26 2018 Gypro/195.19.64.53:37500 MULTI: Learn: 192.168.10.115 -> Gypro/195.19.64.53:37500
  58. Thu Jul 19 13:27:53 2018 194.190.1.123:1955 TLS: new session incoming connection from [AF_INET]194.190.1.123:1955
  59. Thu Jul 19 13:28:21 2018 194.190.1.123:1955 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  60. Thu Jul 19 13:28:21 2018 194.190.1.123:1955 TLS Error: TLS handshake failed
  61. Thu Jul 19 13:28:21 2018 194.190.1.123:1955 SIGUSR1[soft,tls-error] received, client-instance restarting
  62. Thu Jul 19 13:28:23 2018 194.190.1.123:1955 TLS: Initial packet from [AF_INET]194.190.1.123:1955, sid=df76f618 a1d20da6
  63. Thu Jul 19 13:28:54 2018 194.190.1.123:1955 TLS: new session incoming connection from [AF_INET]194.190.1.123:1955
  64. Thu Jul 19 13:29:23 2018 194.190.1.123:1955 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  65. Thu Jul 19 13:29:23 2018 194.190.1.123:1955 TLS Error: TLS handshake failed
  66. Thu Jul 19 13:29:23 2018 194.190.1.123:1955 SIGUSR1[soft,tls-error] received, client-instance restarting
  67. Thu Jul 19 13:29:24 2018 194.190.1.123:1955 TLS: Initial packet from [AF_INET]194.190.1.123:1955, sid=0a35920d ee4857bb
  68. Thu Jul 19 13:29:56 2018 194.190.1.123:1955 TLS: new session incoming connection from [AF_INET]194.190.1.123:1955
  69. Thu Jul 19 13:30:24 2018 194.190.1.123:1955 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
  70. Thu Jul 19 13:30:24 2018 194.190.1.123:1955 TLS Error: TLS handshake failed
  71. Thu Jul 19 13:30:24 2018 194.190.1.123:1955 SIGUSR1[soft,tls-error] received, client-instance restarting
  72. Thu Jul 19 13:30:27 2018 194.190.1.123:1955 TLS: Initial packet from [AF_INET]194.190.1.123:1955, sid=c44e8ff8 918f0fe7
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement