Guest User

Server log of succesful client

a guest
May 6th, 2021
170
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 5.27 KB | None | 0 0
  1. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: MULTI: multi_create_instance called
  2. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip Re-using SSL/TLS context
  3. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ]
  4. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ]
  5. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  6. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1557,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  7. Thu May 6 18:57:31 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip TLS: Initial packet from [AF_INET6]::ffff:public.client.ip:64879, sid=41b168c8 7e145ab9
  8. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip VERIFY OK: depth=1, C=XX, ST=XXX, L=xxxxxxxxx, O=XXXXX, OU=XXXXX, CN=xxxxxxxxxxx, name=xxxxxxxxxx, [email protected]
  9. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip VERIFY OK: depth=0, C=XX, ST=XXX, L=xxxxxxxxx, O=XXXXX, OU=XXXXX, CN=xxxxxxxxxxx, name=xxxxxxxxxx, [email protected]
  10. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_VER=2.4.6
  11. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_PLAT=win
  12. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_PROTO=2
  13. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_NCP=2
  14. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_LZ4=1
  15. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_LZ4v2=1
  16. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_LZO=1
  17. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_COMP_STUB=1
  18. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_COMP_STUBv2=1
  19. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_TCPNL=1
  20. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip peer info: IV_GUI_VER=OpenVPN_GUI_11
  21. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-CHACHA20-POLY1305, 4096 bit RSA
  22. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: public.client.ip [xxxxxxxxxxx] Peer Connection Initiated with [AF_INET6]::ffff:public.client.ip:64879
  23. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip MULTI_sva: pool returned IPv4=10.0.1.10, IPv6=(Not enabled)
  24. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip MULTI: Learn: 10.0.1.10 -> xxxxxxxxxxx/public.client.ip
  25. Thu May 6 18:57:32 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip MULTI: primary virtual IP for xxxxxxxxxxx/public.client.ip: 10.0.1.10
  26. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip PUSH: Received control message: 'PUSH_REQUEST'
  27. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip SENT CONTROL [xxxxxxxxxxx]: 'PUSH_REPLY,route 192.168.3.0 255.255.255.0,route 10.0.1.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.0.1.10 10.0.1.9,peer-id 1,cipher AES-256-GCM' (status=1)
  28. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip Data Channel: using negotiated cipher 'AES-256-GCM'
  29. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip Data Channel MTU parms [ L:1549 D:1450 EF:49 EB:406 ET:0 EL:3 ]
  30. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  31. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  32. Thu May 6 18:57:34 2021 daemon.notice openvpn(7365727665725F4F70656E56504E)[5609]: xxxxxxxxxxx/public.client.ip MULTI: bad source address from client [::], packet dropped
  33.  
Advertisement
Add Comment
Please, Sign In to add comment