Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Roman Andreev, [21.10.19 12:04]
- Mon Oct 21 13:01:53 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mon Oct 21 13:01:53 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mon Oct 21 13:01:53 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:01:53 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
- Mon Oct 21 13:01:53 2019 Attempting to establish TCP connection with [AF_INET]185.247.194.105:5517 [nonblock]
- Mon Oct 21 13:01:54 2019 TCP connection established with [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:01:54 2019 TCP_CLIENT link local: (not bound)
- Mon Oct 21 13:01:54 2019 TCP_CLIENT link remote: [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:01:54 2019 TLS: Initial packet from [AF_INET]185.247.194.105:5517, sid=8711e182 fcbec35e
- Mon Oct 21 13:01:54 2019 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
- Mon Oct 21 13:01:54 2019 VERIFY OK: depth=1, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=Bank131.ru, name=EasyRSA, emailAddress=id@bank131.ru
- Mon Oct 21 13:01:54 2019 VERIFY KU OK
- Mon Oct 21 13:01:54 2019 Validating certificate extended key usage
- Mon Oct 21 13:01:54 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Oct 21 13:01:54 2019 VERIFY EKU OK
- Mon Oct 21 13:01:54 2019 VERIFY OK: depth=0, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=openvpn, name=EasyRSA, emailAddress=id@bank131.ru
- Mon Oct 21 13:01:54 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon Oct 21 13:01:54 2019 [openvpn] Peer Connection Initiated with [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:01:55 2019 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Mon Oct 21 13:01:55 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.0.40.1,route 10.2.0.0 255.255.255.0,route 10.2.1.0 255.255.255.0,route 10.2.2.0 255.255.255.0,route 10.2.3.0 255.255.255.0,route 10.2.4.0 255.255.255.0,route 10.2.5.0 255.255.255.0,route 10.2.6.0 255.255.255.0,route 10.2.7.0 255.255.255.0,route 10.2.8.0 255.255.255.0,route 10.2.9.0 255.255.255.0,route 10.2.10.0 255.255.255.0,route 10.1.0.0 255.255.0.0,dhcp-option DNS 10.2.1.7,dhcp-option DOMAIN bank131.ru,route-gateway 10.0.40.1,topology subnet,ping 60,ping-restart 600,ifconfig 10.0.40.106 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: —ifconfig/up options modified
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: route options modified
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: route-related options modified
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: peer-id set
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon Oct 21 13:01:55 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon Oct 21 13:01:55 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Oct 21 13:01:55 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Oct 21 13:01:55 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp2s0 HWADDR=00:23:54:1d:7c:8e
- Mon Oct 21 13:01:55 2019 TUN/TAP device tun0 opened
- Mon Oct 21 13:01:55 2019 TUN/TAP TX queue length set to 100
- Mon Oct 21 13:01:55 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon Oct 21 13:01:55 2019 /sbin/ip link set dev tun0 up mtu 1500
- Mon Oct 21 13:01:55 2019 /sbin/ip addr add dev tun0 10.0.40.106/24 broadcast 10.0.40.255
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.0.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.1.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.2.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.3.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.4.0/24 via 10.0.40.1
- Roman Andreev, [21.10.19 12:04]
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.5.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.6.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.7.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.8.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.9.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.10.0/24 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.1.0.0/16 via 10.0.40.1
- Mon Oct 21 13:01:55 2019 Initialization Sequence Completed
- ^CMon Oct 21 13:03:00 2019 event_wait : Interrupted system call (code=4)
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.0.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.1.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.2.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.3.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.4.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.5.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.6.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.7.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.8.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.9.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.10.0/24
- Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.1.0.0/16
- Mon Oct 21 13:03:00 2019 Closing TUN/TAP interface
- Mon Oct 21 13:03:00 2019 /sbin/ip addr del dev tun0 10.0.40.106/24
- Mon Oct 21 13:03:00 2019 SIGINT[hard,] received, process exiting
- someone@someone:~$ sudo systemctl restart openvpn
- someone@someone:~$ sudo openvpn —config /etc/openvpn/client/randreev.ovpn
- Mon Oct 21 13:03:24 2019 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration
- Mon Oct 21 13:03:24 2019 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019
- Mon Oct 21 13:03:24 2019 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.08
- Enter Auth Username: randreev
- Enter Auth Password: *****
- Mon Oct 21 13:03:45 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mon Oct 21 13:03:45 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mon Oct 21 13:03:45 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:03:45 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
- Mon Oct 21 13:03:45 2019 Attempting to establish TCP connection with [AF_INET]185.247.194.105:5517 [nonblock]
- Mon Oct 21 13:03:46 2019 TCP: connect to [AF_INET]185.247.194.105:5517 failed: No route to host
- Mon Oct 21 13:03:46 2019 SIGUSR1[connection failed(soft),init_instance] received, process restarting
- Mon Oct 21 13:03:46 2019 Restart pause, 5 second(s)
- Mon Oct 21 13:03:51 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:03:51 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
- Mon Oct 21 13:03:51 2019 Attempting to establish TCP connection with [AF_INET]185.247.194.105:5517 [nonblock]
- Mon Oct 21 13:03:52 2019 TCP connection established with [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:03:52 2019 TCP_CLIENT link local: (not bound)
- Mon Oct 21 13:03:52 2019 TCP_CLIENT link remote: [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:03:52 2019 TLS: Initial packet from [AF_INET]185.247.194.105:5517, sid=c88a8f41 f4dd6625
- Mon Oct 21 13:03:52 2019 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
- Mon Oct 21 13:03:53 2019 VERIFY OK: depth=1, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=Bank131.ru, name=EasyRSA, emailAddress=id@bank131.ru
- Mon Oct 21 13:03:53 2019 VERIFY KU OK
- Mon Oct 21 13:03:53 2019 Validating certificate extended key usage
- Mon Oct 21 13:03:53 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Oct 21 13:03:53 2019 VERIFY EKU OK
- Roman Andreev, [21.10.19 12:04]
- Mon Oct 21 13:03:53 2019 VERIFY OK: depth=0, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=openvpn, name=EasyRSA, emailAddress=id@bank131.ru
- Mon Oct 21 13:03:53 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon Oct 21 13:03:53 2019 [openvpn] Peer Connection Initiated with [AF_INET]185.247.194.105:5517
- Mon Oct 21 13:03:54 2019 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
- Mon Oct 21 13:03:54 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.0.40.1,route 10.2.0.0 255.255.255.0,route 10.2.1.0 255.255.255.0,route 10.2.2.0 255.255.255.0,route 10.2.3.0 255.255.255.0,route 10.2.4.0 255.255.255.0,route 10.2.5.0 255.255.255.0,route 10.2.6.0 255.255.255.0,route 10.2.7.0 255.255.255.0,route 10.2.8.0 255.255.255.0,route 10.2.9.0 255.255.255.0,route 10.2.10.0 255.255.255.0,route 10.1.0.0 255.255.0.0,dhcp-option DNS 10.2.1.7,dhcp-option DOMAIN bank131.ru,route-gateway 10.0.40.1,topology subnet,ping 60,ping-restart 600,ifconfig 10.0.40.106 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: —ifconfig/up options modified
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: route options modified
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: route-related options modified
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: peer-id set
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon Oct 21 13:03:54 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon Oct 21 13:03:54 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Oct 21 13:03:54 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Oct 21 13:03:54 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp2s0 HWADDR=00:23:54:1d:7c:8e
- Mon Oct 21 13:03:54 2019 TUN/TAP device tun0 opened
- Mon Oct 21 13:03:54 2019 TUN/TAP TX queue length set to 100
- Mon Oct 21 13:03:54 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon Oct 21 13:03:54 2019 /sbin/ip link set dev tun0 up mtu 1500
- Mon Oct 21 13:03:54 2019 /sbin/ip addr add dev tun0 10.0.40.106/24 broadcast 10.0.40.255
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.0.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.1.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.2.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.3.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.4.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.5.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.6.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.7.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.8.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.9.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.10.0/24 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.1.0.0/16 via 10.0.40.1
- Mon Oct 21 13:03:54 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement