Advertisement
Guest User

Untitled

a guest
Aug 18th, 2017
465
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 17.92 KB | None | 0 0
  1. Sun May 15 21:53:19 2011 OpenVPN 2.2.0 Win32-MSVC++ [SSL] [LZO2] built on Apr 26 2011
  2. Sun May 15 21:53:19 2011 NOTE: when bridging your LAN adapter with the TAP adapter, note that the new bridge adapter will often take on its own IP address that is different from what the LAN adapter was previously set to
  3. Sun May 15 21:53:19 2011 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
  4. Sun May 15 21:53:19 2011 Diffie-Hellman initialized with 1024 bit key
  5. Sun May 15 21:53:19 2011 TLS-Auth MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  6. Sun May 15 21:53:19 2011 Socket Buffers: R=[8192->8192] S=[8192->8192]
  7. Sun May 15 21:53:19 2011 TAP-WIN32 device [tap0] opened: \\.\Global\{D4658C5E-6723-4D17-8E4D-2EBF94DE625F}.tap
  8. Sun May 15 21:53:19 2011 TAP-Win32 Driver Version 9.8
  9. Sun May 15 21:53:19 2011 TAP-Win32 MTU=1500
  10. Sun May 15 21:53:19 2011 Sleeping for 10 seconds...
  11. Sun May 15 21:53:29 2011 NOTE: FlushIpNetTable failed on interface [19] {D4658C5E-6723-4D17-8E4D-2EBF94DE625F} (status=1168) : Element not found.
  12. Sun May 15 21:53:29 2011 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  13. Sun May 15 21:53:29 2011 UDPv4 link local (bound): 192.168.67.210:1194
  14. Sun May 15 21:53:29 2011 UDPv4 link remote: [undef]
  15. Sun May 15 21:53:29 2011 MULTI: multi_init called, r=256 v=256
  16. Sun May 15 21:53:29 2011 IFCONFIG POOL: base=192.168.67.211 size=40
  17. Sun May 15 21:53:29 2011 IFCONFIG POOL LIST
  18. Sun May 15 21:53:29 2011 prophet,192.168.67.211
  19. Sun May 15 21:53:29 2011 Initialization Sequence Completed
  20. Sun May 15 21:53:29 2011 MULTI: multi_create_instance called
  21. Sun May 15 21:53:29 2011 75.30.68.211:3875 Re-using SSL/TLS context
  22. Sun May 15 21:53:29 2011 75.30.68.211:3875 LZO compression initialized
  23. Sun May 15 21:53:29 2011 75.30.68.211:3875 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  24. Sun May 15 21:53:29 2011 75.30.68.211:3875 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  25. Sun May 15 21:53:29 2011 75.30.68.211:3875 Local Options hash (VER=V4): 'f7df56b8'
  26. Sun May 15 21:53:29 2011 75.30.68.211:3875 Expected Remote Options hash (VER=V4): 'd79ca330'
  27. Sun May 15 21:53:29 2011 75.30.68.211:3875 TLS: Initial packet from 75.30.68.211:3875, sid=24abd84a 3ffe05a9
  28. Sun May 15 21:53:42 2011 75.30.68.211:3875 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  29. Sun May 15 21:53:42 2011 75.30.68.211:3875 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  30. Sun May 15 21:53:44 2011 75.30.68.211:3875 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  31. Sun May 15 21:53:44 2011 75.30.68.211:3875 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  32. Sun May 15 21:53:44 2011 75.30.68.211:3875 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  33. Sun May 15 21:53:44 2011 75.30.68.211:3875 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  34. Sun May 15 21:53:44 2011 75.30.68.211:3875 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  35. Sun May 15 21:53:44 2011 75.30.68.211:3875 [prophet] Peer Connection Initiated with 75.30.68.211:3875
  36. Sun May 15 21:53:45 2011 prophet/75.30.68.211:3875 PUSH: Received control message: 'PUSH_REQUEST'
  37. Sun May 15 21:53:45 2011 prophet/75.30.68.211:3875 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  38. Sun May 15 21:54:44 2011 prophet/75.30.68.211:3875 MULTI: Learn: 00:ff:63:f7:ca:8a -> prophet/75.30.68.211:3875
  39. Sun May 15 21:55:14 2011 MULTI: multi_create_instance called
  40. Sun May 15 21:55:14 2011 75.30.68.211:1909 Re-using SSL/TLS context
  41. Sun May 15 21:55:14 2011 75.30.68.211:1909 LZO compression initialized
  42. Sun May 15 21:55:14 2011 75.30.68.211:1909 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  43. Sun May 15 21:55:14 2011 75.30.68.211:1909 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  44. Sun May 15 21:55:14 2011 75.30.68.211:1909 Local Options hash (VER=V4): 'f7df56b8'
  45. Sun May 15 21:55:14 2011 75.30.68.211:1909 Expected Remote Options hash (VER=V4): 'd79ca330'
  46. Sun May 15 21:55:14 2011 75.30.68.211:1909 TLS: Initial packet from 75.30.68.211:1909, sid=c8fef442 c3c1d228
  47. Sun May 15 21:55:17 2011 75.30.68.211:1909 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  48. Sun May 15 21:55:17 2011 75.30.68.211:1909 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  49. Sun May 15 21:55:18 2011 75.30.68.211:1909 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  50. Sun May 15 21:55:18 2011 75.30.68.211:1909 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  51. Sun May 15 21:55:18 2011 75.30.68.211:1909 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  52. Sun May 15 21:55:18 2011 75.30.68.211:1909 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  53. Sun May 15 21:55:18 2011 75.30.68.211:1909 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  54. Sun May 15 21:55:18 2011 75.30.68.211:1909 [prophet] Peer Connection Initiated with 75.30.68.211:1909
  55. Sun May 15 21:55:18 2011 MULTI: new connection by client 'prophet' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  56. Sun May 15 21:55:21 2011 prophet/75.30.68.211:1909 PUSH: Received control message: 'PUSH_REQUEST'
  57. Sun May 15 21:55:21 2011 prophet/75.30.68.211:1909 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  58. Sun May 15 21:55:25 2011 prophet/75.30.68.211:1909 MULTI: Learn: 00:ff:dc:46:ec:4f -> prophet/75.30.68.211:1909
  59. Sun May 15 22:00:04 2011 MULTI: multi_create_instance called
  60. Sun May 15 22:00:04 2011 75.30.68.211:2174 Re-using SSL/TLS context
  61. Sun May 15 22:00:04 2011 75.30.68.211:2174 LZO compression initialized
  62. Sun May 15 22:00:04 2011 75.30.68.211:2174 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  63. Sun May 15 22:00:04 2011 75.30.68.211:2174 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  64. Sun May 15 22:00:04 2011 75.30.68.211:2174 Local Options hash (VER=V4): 'f7df56b8'
  65. Sun May 15 22:00:04 2011 75.30.68.211:2174 Expected Remote Options hash (VER=V4): 'd79ca330'
  66. Sun May 15 22:00:04 2011 75.30.68.211:2174 TLS: Initial packet from 75.30.68.211:2174, sid=580422fe f0baaa03
  67. Sun May 15 22:00:07 2011 75.30.68.211:2174 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  68. Sun May 15 22:00:07 2011 75.30.68.211:2174 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  69. Sun May 15 22:00:08 2011 75.30.68.211:2174 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  70. Sun May 15 22:00:08 2011 75.30.68.211:2174 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  71. Sun May 15 22:00:08 2011 75.30.68.211:2174 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  72. Sun May 15 22:00:08 2011 75.30.68.211:2174 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  73. Sun May 15 22:00:08 2011 75.30.68.211:2174 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  74. Sun May 15 22:00:08 2011 75.30.68.211:2174 [prophet] Peer Connection Initiated with 75.30.68.211:2174
  75. Sun May 15 22:00:08 2011 MULTI: new connection by client 'prophet' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  76. Sun May 15 22:00:10 2011 prophet/75.30.68.211:2174 PUSH: Received control message: 'PUSH_REQUEST'
  77. Sun May 15 22:00:10 2011 prophet/75.30.68.211:2174 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  78. Sun May 15 22:00:11 2011 prophet/75.30.68.211:2174 MULTI: Learn: 00:ff:dc:46:ec:4f -> prophet/75.30.68.211:2174
  79. Sun May 15 22:00:36 2011 prophet/75.30.68.211:2174 MULTI: Learn: b2:b2:d8:f5:fe:d6 -> prophet/75.30.68.211:2174
  80. Sun May 15 22:06:47 2011 MULTI: multi_create_instance called
  81. Sun May 15 22:06:47 2011 75.30.68.211:2265 Re-using SSL/TLS context
  82. Sun May 15 22:06:47 2011 75.30.68.211:2265 LZO compression initialized
  83. Sun May 15 22:06:47 2011 75.30.68.211:2265 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  84. Sun May 15 22:06:47 2011 75.30.68.211:2265 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  85. Sun May 15 22:06:47 2011 75.30.68.211:2265 Local Options hash (VER=V4): 'f7df56b8'
  86. Sun May 15 22:06:47 2011 75.30.68.211:2265 Expected Remote Options hash (VER=V4): 'd79ca330'
  87. Sun May 15 22:06:47 2011 75.30.68.211:2265 TLS: Initial packet from 75.30.68.211:2265, sid=853a899f e2407832
  88. Sun May 15 22:06:49 2011 75.30.68.211:2265 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  89. Sun May 15 22:06:49 2011 75.30.68.211:2265 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  90. Sun May 15 22:06:50 2011 75.30.68.211:2265 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  91. Sun May 15 22:06:50 2011 75.30.68.211:2265 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  92. Sun May 15 22:06:50 2011 75.30.68.211:2265 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  93. Sun May 15 22:06:50 2011 75.30.68.211:2265 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  94. Sun May 15 22:06:50 2011 75.30.68.211:2265 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  95. Sun May 15 22:06:50 2011 75.30.68.211:2265 [prophet] Peer Connection Initiated with 75.30.68.211:2265
  96. Sun May 15 22:06:50 2011 MULTI: new connection by client 'prophet' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  97. Sun May 15 22:06:51 2011 prophet/75.30.68.211:2265 MULTI: Learn: 00:ff:dc:46:ec:4f -> prophet/75.30.68.211:2265
  98. Sun May 15 22:06:52 2011 prophet/75.30.68.211:2265 PUSH: Received control message: 'PUSH_REQUEST'
  99. Sun May 15 22:06:52 2011 prophet/75.30.68.211:2265 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  100. Sun May 15 22:07:03 2011 prophet/75.30.68.211:2265 MULTI: Learn: b2:b2:d8:f5:fe:d6 -> prophet/75.30.68.211:2265
  101. Sun May 15 22:08:56 2011 MULTI: multi_create_instance called
  102. Sun May 15 22:08:56 2011 75.30.68.211:2322 Re-using SSL/TLS context
  103. Sun May 15 22:08:56 2011 75.30.68.211:2322 LZO compression initialized
  104. Sun May 15 22:08:56 2011 75.30.68.211:2322 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  105. Sun May 15 22:08:56 2011 75.30.68.211:2322 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  106. Sun May 15 22:08:56 2011 75.30.68.211:2322 Local Options hash (VER=V4): 'f7df56b8'
  107. Sun May 15 22:08:56 2011 75.30.68.211:2322 Expected Remote Options hash (VER=V4): 'd79ca330'
  108. Sun May 15 22:08:56 2011 75.30.68.211:2322 TLS: Initial packet from 75.30.68.211:2322, sid=2ce680bf 09eee1bb
  109. Sun May 15 22:08:58 2011 75.30.68.211:2322 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  110. Sun May 15 22:08:58 2011 75.30.68.211:2322 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  111. Sun May 15 22:08:59 2011 75.30.68.211:2322 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  112. Sun May 15 22:08:59 2011 75.30.68.211:2322 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  113. Sun May 15 22:08:59 2011 75.30.68.211:2322 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  114. Sun May 15 22:08:59 2011 75.30.68.211:2322 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  115. Sun May 15 22:09:00 2011 75.30.68.211:2322 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  116. Sun May 15 22:09:00 2011 75.30.68.211:2322 [prophet] Peer Connection Initiated with 75.30.68.211:2322
  117. Sun May 15 22:09:00 2011 MULTI: new connection by client 'prophet' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  118. Sun May 15 22:09:01 2011 prophet/75.30.68.211:2322 PUSH: Received control message: 'PUSH_REQUEST'
  119. Sun May 15 22:09:01 2011 prophet/75.30.68.211:2322 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  120. Sun May 15 22:09:12 2011 prophet/75.30.68.211:2322 MULTI: Learn: 00:ff:dc:46:ec:4f -> prophet/75.30.68.211:2322
  121. Sun May 15 22:09:12 2011 prophet/75.30.68.211:2322 MULTI: Learn: b2:b2:d8:f5:fe:d6 -> prophet/75.30.68.211:2322
  122. Sun May 15 22:15:27 2011 MULTI: multi_create_instance called
  123. Sun May 15 22:15:27 2011 75.30.68.211:2732 Re-using SSL/TLS context
  124. Sun May 15 22:15:27 2011 75.30.68.211:2732 LZO compression initialized
  125. Sun May 15 22:15:27 2011 75.30.68.211:2732 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  126. Sun May 15 22:15:27 2011 75.30.68.211:2732 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  127. Sun May 15 22:15:27 2011 75.30.68.211:2732 Local Options hash (VER=V4): 'f7df56b8'
  128. Sun May 15 22:15:27 2011 75.30.68.211:2732 Expected Remote Options hash (VER=V4): 'd79ca330'
  129. Sun May 15 22:15:27 2011 75.30.68.211:2732 TLS: Initial packet from 75.30.68.211:2732, sid=77920626 020f32e3
  130. Sun May 15 22:15:29 2011 75.30.68.211:2732 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  131. Sun May 15 22:15:29 2011 75.30.68.211:2732 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  132. Sun May 15 22:15:30 2011 75.30.68.211:2732 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  133. Sun May 15 22:15:30 2011 75.30.68.211:2732 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  134. Sun May 15 22:15:30 2011 75.30.68.211:2732 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  135. Sun May 15 22:15:30 2011 75.30.68.211:2732 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  136. Sun May 15 22:15:30 2011 75.30.68.211:2732 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  137. Sun May 15 22:15:30 2011 75.30.68.211:2732 [prophet] Peer Connection Initiated with 75.30.68.211:2732
  138. Sun May 15 22:15:30 2011 MULTI: new connection by client 'prophet' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
  139. Sun May 15 22:15:32 2011 prophet/75.30.68.211:2732 PUSH: Received control message: 'PUSH_REQUEST'
  140. Sun May 15 22:15:32 2011 prophet/75.30.68.211:2732 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  141. Sun May 15 22:15:34 2011 prophet/75.30.68.211:2732 MULTI: Learn: 00:ff:dc:46:ec:4f -> prophet/75.30.68.211:2732
  142. Sun May 15 22:15:46 2011 prophet/75.30.68.211:2732 MULTI: Learn: b2:b2:d8:f5:fe:d6 -> prophet/75.30.68.211:2732
  143. Sun May 15 22:23:41 2011 prophet/75.30.68.211:2732 [prophet] Inactivity timeout (--ping-restart), restarting
  144. Sun May 15 22:23:41 2011 prophet/75.30.68.211:2732 SIGUSR1[soft,ping-restart] received, client-instance restarting
  145. Sun May 15 22:26:37 2011 MULTI: multi_create_instance called
  146. Sun May 15 22:26:37 2011 75.30.68.211:4789 Re-using SSL/TLS context
  147. Sun May 15 22:26:37 2011 75.30.68.211:4789 LZO compression initialized
  148. Sun May 15 22:26:37 2011 75.30.68.211:4789 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ]
  149. Sun May 15 22:26:37 2011 75.30.68.211:4789 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ]
  150. Sun May 15 22:26:37 2011 75.30.68.211:4789 Local Options hash (VER=V4): 'f7df56b8'
  151. Sun May 15 22:26:37 2011 75.30.68.211:4789 Expected Remote Options hash (VER=V4): 'd79ca330'
  152. Sun May 15 22:26:37 2011 75.30.68.211:4789 TLS: Initial packet from 75.30.68.211:4789, sid=766ad77e 5ade6077
  153. Sun May 15 22:26:39 2011 75.30.68.211:4789 VERIFY OK: depth=1, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=server/emailAddress=dB@fuckyeah.info
  154. Sun May 15 22:26:39 2011 75.30.68.211:4789 VERIFY OK: depth=0, /C=US/ST=HI/L=Honolulu/O=eamutiny/CN=prophet/emailAddress=dB@fuckyeah.info
  155. Sun May 15 22:26:40 2011 75.30.68.211:4789 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  156. Sun May 15 22:26:40 2011 75.30.68.211:4789 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  157. Sun May 15 22:26:40 2011 75.30.68.211:4789 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  158. Sun May 15 22:26:40 2011 75.30.68.211:4789 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  159. Sun May 15 22:26:40 2011 75.30.68.211:4789 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
  160. Sun May 15 22:26:40 2011 75.30.68.211:4789 [prophet] Peer Connection Initiated with 75.30.68.211:4789
  161. Sun May 15 22:26:42 2011 prophet/75.30.68.211:4789 PUSH: Received control message: 'PUSH_REQUEST'
  162. Sun May 15 22:26:42 2011 prophet/75.30.68.211:4789 SENT CONTROL [prophet]: 'PUSH_REPLY,route-gateway 192.168.67.210,ping 10,ping-restart 120,ifconfig 192.168.67.211 255.255.255.0' (status=1)
  163. Sun May 15 22:26:46 2011 prophet/75.30.68.211:4789 MULTI: Learn: 00:ff:dc:46:ec:4f -> prophet/75.30.68.211:4789
  164. Sun May 15 22:27:31 2011 prophet/75.30.68.211:4789 MULTI: Learn: b2:b2:d8:f5:fe:d6 -> prophet/75.30.68.211:4789
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement