Advertisement
Guest User

Untitled

a guest
Sep 1st, 2017
170
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.23 KB | None | 0 0
  1. sudo openvpn --config path/to/location.ovpn
  2.  
  3. :~$ sudo openvpn --config ~/Desktop/ra4wvpn-nl-amsterdam-udp-1194.ovpn
  4. Fri Sep 1 13:45:15 2017 OpenVPN 2.3.10 x86_64-pc-linux-gnu [SSL
  5. (OpenSSL)] [LZO] [EPOLL] [PKCS11] [MH] [IPv6] built on Jun 22 2017
  6. Fri Sep 1 13:45:15 2017 library versions: OpenSSL 1.0.2g 1 Mar 2016,
  7. LZO 2.08
  8. Enter Auth Username: ******
  9. Enter Auth Password: **********
  10. Fri Sep 1 13:45:26 2017 WARNING: No server certificate verification
  11. method has been enabled. See http://openvpn.net/howto.html#mitm for
  12. more info.
  13. Fri Sep 1 13:45:26 2017 Control Channel Authentication: tls-auth
  14. using INLINE static key file
  15. Fri Sep 1 13:45:26 2017 Outgoing Control Channel Authentication:
  16. Using 160 bit message hash 'SHA1' for HMAC authentication
  17. Fri Sep 1 13:45:26 2017 Incoming Control Channel Authentication:
  18. Using 160 bit message hash 'SHA1' for HMAC authentication
  19. Fri Sep 1 13:45:26 2017 Socket Buffers: R=[212992->212992] S=[212992-
  20. >212992]
  21. Fri Sep 1 13:45:26 2017 UDPv4 link local: [undef]
  22. Fri Sep 1 13:45:26 2017 UDPv4 link remote:
  23. [AF_INET]154.59.112.130:1194
  24. Fri Sep 1 13:45:26 2017 TLS: Initial packet from
  25. [AF_INET]154.59.112.130:1194, sid=9c75530e 3e238e30
  26. Fri Sep 1 13:45:26 2017 WARNING: this configuration may cache
  27. passwords in memory -- use the auth-nocache option to prevent this
  28. Fri Sep 1 13:45:26 2017 VERIFY OK: depth=1, CN=RA4WVPN
  29. Fri Sep 1 13:45:26 2017 VERIFY OK: depth=0, CN=RA4WVPN
  30. Fri Sep 1 13:45:26 2017 Data Channel Encrypt: Cipher 'AES-128-CBC'
  31. initialized with 128 bit key
  32. Fri Sep 1 13:45:26 2017 Data Channel Encrypt: Using 160 bit message
  33. hash 'SHA1' for HMAC authentication
  34. Fri Sep 1 13:45:26 2017 Data Channel Decrypt: Cipher 'AES-128-CBC'
  35. initialized with 128 bit key
  36. Fri Sep 1 13:45:26 2017 Data Channel Decrypt: Using 160 bit message
  37. hash 'SHA1' for HMAC authentication
  38. Fri Sep 1 13:45:26 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3
  39. ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  40. Fri Sep 1 13:45:26 2017 [RA4WVPN] Peer Connection Initiated with
  41. [AF_INET]154.59.112.130:1194
  42. Fri Sep 1 13:45:28 2017 SENT CONTROL [RA4WVPN]: 'PUSH_REQUEST'
  43. (status=1)
  44. Fri Sep 1 13:45:28 2017 AUTH: Received control message: AUTH_FAILED
  45. Fri Sep 1 13:45:28 2017 SIGTERM[soft,auth-failure] received, process
  46. exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement