Advertisement
Guest User

Untitled

a guest
Oct 21st, 2019
195
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.26 KB | None | 0 0
  1. Roman Andreev, [21.10.19 12:04]
  2. Mon Oct 21 13:01:53 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  3. Mon Oct 21 13:01:53 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  4. Mon Oct 21 13:01:53 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.247.194.105:5517
  5. Mon Oct 21 13:01:53 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
  6. Mon Oct 21 13:01:53 2019 Attempting to establish TCP connection with [AF_INET]185.247.194.105:5517 [nonblock]
  7. Mon Oct 21 13:01:54 2019 TCP connection established with [AF_INET]185.247.194.105:5517
  8. Mon Oct 21 13:01:54 2019 TCP_CLIENT link local: (not bound)
  9. Mon Oct 21 13:01:54 2019 TCP_CLIENT link remote: [AF_INET]185.247.194.105:5517
  10. Mon Oct 21 13:01:54 2019 TLS: Initial packet from [AF_INET]185.247.194.105:5517, sid=8711e182 fcbec35e
  11. Mon Oct 21 13:01:54 2019 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
  12. Mon Oct 21 13:01:54 2019 VERIFY OK: depth=1, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=Bank131.ru, name=EasyRSA, emailAddress=id@bank131.ru
  13. Mon Oct 21 13:01:54 2019 VERIFY KU OK
  14. Mon Oct 21 13:01:54 2019 Validating certificate extended key usage
  15. Mon Oct 21 13:01:54 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  16. Mon Oct 21 13:01:54 2019 VERIFY EKU OK
  17. Mon Oct 21 13:01:54 2019 VERIFY OK: depth=0, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=openvpn, name=EasyRSA, emailAddress=id@bank131.ru
  18. Mon Oct 21 13:01:54 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  19. Mon Oct 21 13:01:54 2019 [openvpn] Peer Connection Initiated with [AF_INET]185.247.194.105:5517
  20. Mon Oct 21 13:01:55 2019 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  21. Mon Oct 21 13:01:55 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.0.40.1,route 10.2.0.0 255.255.255.0,route 10.2.1.0 255.255.255.0,route 10.2.2.0 255.255.255.0,route 10.2.3.0 255.255.255.0,route 10.2.4.0 255.255.255.0,route 10.2.5.0 255.255.255.0,route 10.2.6.0 255.255.255.0,route 10.2.7.0 255.255.255.0,route 10.2.8.0 255.255.255.0,route 10.2.9.0 255.255.255.0,route 10.2.10.0 255.255.255.0,route 10.1.0.0 255.255.0.0,dhcp-option DNS 10.2.1.7,dhcp-option DOMAIN bank131.ru,route-gateway 10.0.40.1,topology subnet,ping 60,ping-restart 600,ifconfig 10.0.40.106 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  22. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: timers and/or timeouts modified
  23. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: —ifconfig/up options modified
  24. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: route options modified
  25. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: route-related options modified
  26. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
  27. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: peer-id set
  28. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  29. Mon Oct 21 13:01:55 2019 OPTIONS IMPORT: data channel crypto options modified
  30. Mon Oct 21 13:01:55 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  31. Mon Oct 21 13:01:55 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  32. Mon Oct 21 13:01:55 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  33. Mon Oct 21 13:01:55 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp2s0 HWADDR=00:23:54:1d:7c:8e
  34. Mon Oct 21 13:01:55 2019 TUN/TAP device tun0 opened
  35. Mon Oct 21 13:01:55 2019 TUN/TAP TX queue length set to 100
  36. Mon Oct 21 13:01:55 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  37. Mon Oct 21 13:01:55 2019 /sbin/ip link set dev tun0 up mtu 1500
  38. Mon Oct 21 13:01:55 2019 /sbin/ip addr add dev tun0 10.0.40.106/24 broadcast 10.0.40.255
  39. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.0.0/24 via 10.0.40.1
  40. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.1.0/24 via 10.0.40.1
  41. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.2.0/24 via 10.0.40.1
  42. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.3.0/24 via 10.0.40.1
  43. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.4.0/24 via 10.0.40.1
  44.  
  45. Roman Andreev, [21.10.19 12:04]
  46. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.5.0/24 via 10.0.40.1
  47. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.6.0/24 via 10.0.40.1
  48. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.7.0/24 via 10.0.40.1
  49. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.8.0/24 via 10.0.40.1
  50. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.9.0/24 via 10.0.40.1
  51. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.2.10.0/24 via 10.0.40.1
  52. Mon Oct 21 13:01:55 2019 /sbin/ip route add 10.1.0.0/16 via 10.0.40.1
  53. Mon Oct 21 13:01:55 2019 Initialization Sequence Completed
  54. ^CMon Oct 21 13:03:00 2019 event_wait : Interrupted system call (code=4)
  55. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.0.0/24
  56. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.1.0/24
  57. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.2.0/24
  58. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.3.0/24
  59. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.4.0/24
  60. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.5.0/24
  61. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.6.0/24
  62. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.7.0/24
  63. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.8.0/24
  64. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.9.0/24
  65. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.2.10.0/24
  66. Mon Oct 21 13:03:00 2019 /sbin/ip route del 10.1.0.0/16
  67. Mon Oct 21 13:03:00 2019 Closing TUN/TAP interface
  68. Mon Oct 21 13:03:00 2019 /sbin/ip addr del dev tun0 10.0.40.106/24
  69. Mon Oct 21 13:03:00 2019 SIGINT[hard,] received, process exiting
  70. someone@someone:~$ sudo systemctl restart openvpn
  71. someone@someone:~$ sudo openvpn —config /etc/openvpn/client/randreev.ovpn
  72. Mon Oct 21 13:03:24 2019 WARNING: Ignoring option 'dh' in tls-client mode, please only include this in your server configuration
  73. Mon Oct 21 13:03:24 2019 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019
  74. Mon Oct 21 13:03:24 2019 library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.08
  75. Enter Auth Username: randreev
  76. Enter Auth Password: *****
  77. Mon Oct 21 13:03:45 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  78. Mon Oct 21 13:03:45 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  79. Mon Oct 21 13:03:45 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.247.194.105:5517
  80. Mon Oct 21 13:03:45 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
  81. Mon Oct 21 13:03:45 2019 Attempting to establish TCP connection with [AF_INET]185.247.194.105:5517 [nonblock]
  82. Mon Oct 21 13:03:46 2019 TCP: connect to [AF_INET]185.247.194.105:5517 failed: No route to host
  83. Mon Oct 21 13:03:46 2019 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  84. Mon Oct 21 13:03:46 2019 Restart pause, 5 second(s)
  85. Mon Oct 21 13:03:51 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]185.247.194.105:5517
  86. Mon Oct 21 13:03:51 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
  87. Mon Oct 21 13:03:51 2019 Attempting to establish TCP connection with [AF_INET]185.247.194.105:5517 [nonblock]
  88. Mon Oct 21 13:03:52 2019 TCP connection established with [AF_INET]185.247.194.105:5517
  89. Mon Oct 21 13:03:52 2019 TCP_CLIENT link local: (not bound)
  90. Mon Oct 21 13:03:52 2019 TCP_CLIENT link remote: [AF_INET]185.247.194.105:5517
  91. Mon Oct 21 13:03:52 2019 TLS: Initial packet from [AF_INET]185.247.194.105:5517, sid=c88a8f41 f4dd6625
  92. Mon Oct 21 13:03:52 2019 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
  93. Mon Oct 21 13:03:53 2019 VERIFY OK: depth=1, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=Bank131.ru, name=EasyRSA, emailAddress=id@bank131.ru
  94. Mon Oct 21 13:03:53 2019 VERIFY KU OK
  95. Mon Oct 21 13:03:53 2019 Validating certificate extended key usage
  96. Mon Oct 21 13:03:53 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  97. Mon Oct 21 13:03:53 2019 VERIFY EKU OK
  98.  
  99. Roman Andreev, [21.10.19 12:04]
  100. Mon Oct 21 13:03:53 2019 VERIFY OK: depth=0, C=RU, ST=Moscow, L=Moscow, O=Bank131, OU=It, CN=openvpn, name=EasyRSA, emailAddress=id@bank131.ru
  101. Mon Oct 21 13:03:53 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  102. Mon Oct 21 13:03:53 2019 [openvpn] Peer Connection Initiated with [AF_INET]185.247.194.105:5517
  103. Mon Oct 21 13:03:54 2019 SENT CONTROL [openvpn]: 'PUSH_REQUEST' (status=1)
  104. Mon Oct 21 13:03:54 2019 PUSH: Received control message: 'PUSH_REPLY,route-gateway 10.0.40.1,route 10.2.0.0 255.255.255.0,route 10.2.1.0 255.255.255.0,route 10.2.2.0 255.255.255.0,route 10.2.3.0 255.255.255.0,route 10.2.4.0 255.255.255.0,route 10.2.5.0 255.255.255.0,route 10.2.6.0 255.255.255.0,route 10.2.7.0 255.255.255.0,route 10.2.8.0 255.255.255.0,route 10.2.9.0 255.255.255.0,route 10.2.10.0 255.255.255.0,route 10.1.0.0 255.255.0.0,dhcp-option DNS 10.2.1.7,dhcp-option DOMAIN bank131.ru,route-gateway 10.0.40.1,topology subnet,ping 60,ping-restart 600,ifconfig 10.0.40.106 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  105. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: timers and/or timeouts modified
  106. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: —ifconfig/up options modified
  107. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: route options modified
  108. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: route-related options modified
  109. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: —ip-win32 and/or —dhcp-option options modified
  110. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: peer-id set
  111. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
  112. Mon Oct 21 13:03:54 2019 OPTIONS IMPORT: data channel crypto options modified
  113. Mon Oct 21 13:03:54 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  114. Mon Oct 21 13:03:54 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  115. Mon Oct 21 13:03:54 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  116. Mon Oct 21 13:03:54 2019 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=enp2s0 HWADDR=00:23:54:1d:7c:8e
  117. Mon Oct 21 13:03:54 2019 TUN/TAP device tun0 opened
  118. Mon Oct 21 13:03:54 2019 TUN/TAP TX queue length set to 100
  119. Mon Oct 21 13:03:54 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  120. Mon Oct 21 13:03:54 2019 /sbin/ip link set dev tun0 up mtu 1500
  121. Mon Oct 21 13:03:54 2019 /sbin/ip addr add dev tun0 10.0.40.106/24 broadcast 10.0.40.255
  122. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.0.0/24 via 10.0.40.1
  123. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.1.0/24 via 10.0.40.1
  124. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.2.0/24 via 10.0.40.1
  125. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.3.0/24 via 10.0.40.1
  126. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.4.0/24 via 10.0.40.1
  127. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.5.0/24 via 10.0.40.1
  128. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.6.0/24 via 10.0.40.1
  129. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.7.0/24 via 10.0.40.1
  130. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.8.0/24 via 10.0.40.1
  131. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.9.0/24 via 10.0.40.1
  132. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.2.10.0/24 via 10.0.40.1
  133. Mon Oct 21 13:03:54 2019 /sbin/ip route add 10.1.0.0/16 via 10.0.40.1
  134. Mon Oct 21 13:03:54 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement