Advertisement
Guest User

Untitled

a guest
May 16th, 2019
171
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Bash 4.41 KB | None | 0 0
  1. Thu May 16 16:23:54 2019 OpenVPN 2.4.7 [git:makepkg/2b8aec62d5db2c17+] x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
  2. Thu May 16 16:23:54 2019 library versions: OpenSSL 1.1.1b  26 Feb 2019, LZO 2.10
  3. Thu May 16 16:23:54 2019 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  4. Thu May 16 16:23:54 2019 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  5. Thu May 16 16:23:54 2019 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
  6. Thu May 16 16:23:54 2019 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
  7. Thu May 16 16:23:55 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]XXXXXXXXXX:443
  8. Thu May 16 16:23:55 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
  9. Thu May 16 16:23:55 2019 Attempting to establish TCP connection with [AF_INET]XXXXXXXXXX:443 [nonblock]
  10. Thu May 16 16:23:56 2019 TCP connection established with [AF_INET]XXXXXXXXXX:443
  11. Thu May 16 16:23:56 2019 TCP_CLIENT link local: (not bound)
  12. Thu May 16 16:23:56 2019 TCP_CLIENT link remote: [AF_INET]XXXXXXXXXX:443
  13. Thu May 16 16:23:57 2019 TLS: Initial packet from [AF_INET]XXXXXXXXX:443, sid=d4db8f2c 1ed97987
  14. Thu May 16 16:23:58 2019 VERIFY OK: depth=1, CN=ChangeMe
  15. Thu May 16 16:23:58 2019 VERIFY KU OK
  16. Thu May 16 16:23:58 2019 Validating certificate extended key usage
  17. Thu May 16 16:23:58 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  18. Thu May 16 16:23:58 2019 VERIFY EKU OK
  19. Thu May 16 16:23:58 2019 VERIFY X509NAME OK: CN=server_QUVDBwnHDPKsTF8A
  20. Thu May 16 16:23:58 2019 VERIFY OK: depth=0, CN=server_QUVDBwnHDPKsTF8A
  21. Thu May 16 16:23:58 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-ECDSA-AES256-GCM-SHA384, 256 bit EC, curve: prime256v1
  22. Thu May 16 16:23:58 2019 [server_QUVDBwnHDPKsTF8A] Peer Connection Initiated with [AF_INET]XXXXXXXXXX:443
  23. Thu May 16 16:23:59 2019 SENT CONTROL [server_QUVDBwnHDPKsTF8A]: 'PUSH_REQUEST' (status=1)
  24. Thu May 16 16:23:59 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,block-outside-dns,redirect-gateway def1,route-gateway 10.8.0.1,topology subnet,ping 1800,ping-restart 3600,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  25. Thu May 16 16:23:59 2019 Options error: Unrecognized option or missing or extra parameter(s) in [PUSH-OPTIONS]:3: block-outside-dns (2.4.7)
  26. Thu May 16 16:23:59 2019 OPTIONS IMPORT: timers and/or timeouts modified
  27. Thu May 16 16:23:59 2019 OPTIONS IMPORT: --ifconfig/up options modified
  28. Thu May 16 16:23:59 2019 OPTIONS IMPORT: route options modified
  29. Thu May 16 16:23:59 2019 OPTIONS IMPORT: route-related options modified
  30. Thu May 16 16:23:59 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  31. Thu May 16 16:23:59 2019 OPTIONS IMPORT: peer-id set
  32. Thu May 16 16:23:59 2019 OPTIONS IMPORT: adjusting link_mtu to 1626
  33. Thu May 16 16:23:59 2019 OPTIONS IMPORT: data channel crypto options modified
  34. Thu May 16 16:23:59 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
  35. Thu May 16 16:23:59 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  36. Thu May 16 16:23:59 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  37. Thu May 16 16:23:59 2019 ROUTE_GATEWAY 192.168.63.254/255.255.224.0 IFACE=wlp2s0 HWADDR=2e:a4:42:5d:1d:0e
  38. Thu May 16 16:23:59 2019 TUN/TAP device tun0 opened
  39. Thu May 16 16:23:59 2019 TUN/TAP TX queue length set to 100
  40. Thu May 16 16:23:59 2019 /usr/bin/ip link set dev tun0 up mtu 1500
  41. Thu May 16 16:23:59 2019 /usr/bin/ip addr add dev tun0 10.8.0.2/24 broadcast 10.8.0.255
  42. Thu May 16 16:23:59 2019 /usr/bin/ip route add XXXXXXXXXXXXX/32 via 192.168.63.254
  43. Thu May 16 16:23:59 2019 /usr/bin/ip route add 0.0.0.0/1 via 10.8.0.1
  44. Thu May 16 16:23:59 2019 /usr/bin/ip route add 128.0.0.0/1 via 10.8.0.1
  45. Thu May 16 16:23:59 2019 Initialization Sequence Completed
  46. ^CThu May 16 16:24:49 2019 event_wait : Interrupted system call (code=4)
  47. Thu May 16 16:24:49 2019 /usr/bin/ip route del XXXXXXXXXX/32
  48. Thu May 16 16:24:49 2019 /usr/bin/ip route del 0.0.0.0/1
  49. Thu May 16 16:24:49 2019 /usr/bin/ip route del 128.0.0.0/1
  50. Thu May 16 16:24:49 2019 Closing TUN/TAP interface
  51. Thu May 16 16:24:49 2019 /usr/bin/ip addr del dev tun0 10.8.0.2/24
  52. Thu May 16 16:24:49 2019 SIGINT[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement