Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- FrozenWay version 1.6.7
- ----------------------------------
- Server: premium-01-fr-04
- Protocol: OpenVPN
- ----------------------------------
- D:/Programmes/FrozenWay/openvpn.exe --client --dev tun --dev-node {9AED8D19-5B66-412E-BA59-D3CE325D4F65} --proto tcp-client --remote 178.33.23.183 443 --management 127.0.0.1 57533 --management-client --management-query-passwords --ca D:/Programmes/FrozenWay/ca.crt --remote-cert-tls server --reneg-sec 0 --auth-user-pass --auth-nocache --compress --resolv-retry 0 --ping 10 --ping-exit 30 --persist-tun --persist-key --persist-local-ip --connect-retry 1 --ip-win32 dynamic --verb 3
- Mon Feb 04 17:03:58 2019 WARNING: Using --management on a TCP port WITHOUT passwords is STRONGLY discouraged and considered insecure
- Mon Feb 04 17:03:58 2019 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZ4] [AEAD] built on Sep 24 2018
- Mon Feb 04 17:03:58 2019 Windows version 6.2 (Windows 8 or greater) 64bit
- Mon Feb 04 17:03:58 2019 library versions: OpenSSL 1.0.2o 27 Mar 2018
- Mon Feb 04 17:03:58 2019 MANAGEMENT: Connected to management server at [AF_INET]127.0.0.1:57533
- Mon Feb 04 17:03:58 2019 MANAGEMENT: CMD 'username "Auth" Yamakasinge'
- Mon Feb 04 17:03:58 2019 MANAGEMENT: CMD 'password [...]'
- Mon Feb 04 17:03:58 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]178.33.23.183:443
- Mon Feb 04 17:03:58 2019 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon Feb 04 17:03:58 2019 Attempting to establish TCP connection with [AF_INET]178.33.23.183:443 [nonblock]
- Mon Feb 04 17:03:59 2019 TCP connection established with [AF_INET]178.33.23.183:443
- Mon Feb 04 17:03:59 2019 TCP_CLIENT link local: (not bound)
- Mon Feb 04 17:03:59 2019 TCP_CLIENT link remote: [AF_INET]178.33.23.183:443
- Mon Feb 04 17:03:59 2019 TLS: Initial packet from [AF_INET]178.33.23.183:443, sid=a825f9af 13dd2f7f
- Mon Feb 04 17:03:59 2019 VERIFY OK: depth=1, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=FrozenWay OpenVPN CA, name=FrozenWay OpenVPN CA, emailAddress=contact@frozendo.com
- Mon Feb 04 17:03:59 2019 VERIFY KU OK
- Mon Feb 04 17:03:59 2019 Validating certificate extended key usage
- Mon Feb 04 17:03:59 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Feb 04 17:03:59 2019 VERIFY EKU OK
- Mon Feb 04 17:03:59 2019 VERIFY OK: depth=0, C=FR, ST=PACA, L=Sorgues, O=Frozendo SARL, OU=FrozenWay, CN=server, name=server, emailAddress=contact@frozendo.com
- Mon Feb 04 17:03:59 2019 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1544', remote='link-mtu 1543'
- Mon Feb 04 17:03:59 2019 WARNING: 'comp-lzo' is present in local config but missing in remote config, local='comp-lzo'
- Mon Feb 04 17:03:59 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon Feb 04 17:03:59 2019 [server] Peer Connection Initiated with [AF_INET]178.33.23.183:443
- Mon Feb 04 17:04:00 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Feb 04 17:04:00 2019 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.51.4.1,dhcp-option WINS 10.51.4.1,route-gateway 10.51.4.1,topology subnet,socket-flags TCP_NODELAY,compress lz4-v2,ifconfig 10.51.4.57 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: compression parms modified
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: --socket-flags option modified
- Mon Feb 04 17:04:00 2019 Socket flags: TCP_NODELAY=1 succeeded
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: route-related options modified
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: peer-id set
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: adjusting link_mtu to 1627
- Mon Feb 04 17:04:00 2019 OPTIONS IMPORT: data channel crypto options modified
- Mon Feb 04 17:04:00 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon Feb 04 17:04:00 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Feb 04 17:04:00 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Feb 04 17:04:00 2019 interactive service msg_channel=0
- Mon Feb 04 17:04:00 2019 open_tun
- Mon Feb 04 17:04:00 2019 TAP-WIN32 device [FrozenWay] opened: \\.\Global\{9AED8D19-5B66-412E-BA59-D3CE325D4F65}.tap
- Mon Feb 04 17:04:00 2019 TAP-Windows Driver Version 9.22
- Mon Feb 04 17:04:00 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.51.4.0/10.51.4.57/255.255.255.0 [SUCCEEDED]
- Mon Feb 04 17:04:00 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.51.4.57/255.255.255.0 on interface {9AED8D19-5B66-412E-BA59-D3CE325D4F65} [DHCP-serv: 10.51.4.254, lease-time: 31536000]
- Mon Feb 04 17:04:00 2019 Successful ARP Flush on interface [14] {9AED8D19-5B66-412E-BA59-D3CE325D4F65}
- Mon Feb 04 17:04:00 2019 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon Feb 04 17:04:05 2019 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
- Mon Feb 04 17:04:05 2019 Initialization Sequence Completed
- IPv4 routing table :
- 0.0.0.0 0.0.0.0 134.206.228.1 134.206.231.187 50
- 0.0.0.0 128.0.0.0 10.51.4.1 10.51.4.57 25
- 10.51.4.0 255.255.255.0 10.51.4.57 10.51.4.57 281
- 10.51.4.57 255.255.255.255 10.51.4.57 10.51.4.57 281
- 10.51.4.255 255.255.255.255 10.51.4.57 10.51.4.57 281
- 127.0.0.0 255.0.0.0 127.0.0.1 127.0.0.1 331
- 127.0.0.1 255.255.255.255 127.0.0.1 127.0.0.1 331
- 127.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
- 128.0.0.0 128.0.0.0 10.51.4.1 10.51.4.57 25
- 134.206.228.0 255.255.252.0 134.206.231.187 134.206.231.187 306
- 134.206.231.187 255.255.255.255 134.206.231.187 134.206.231.187 306
- 134.206.231.255 255.255.255.255 134.206.231.187 134.206.231.187 306
- 178.33.23.183 255.255.255.255 134.206.228.1 134.206.231.187 50
- 224.0.0.0 240.0.0.0 127.0.0.1 127.0.0.1 331
- 224.0.0.0 240.0.0.0 134.206.231.187 134.206.231.187 306
- 224.0.0.0 240.0.0.0 10.51.4.57 10.51.4.57 281
- 255.255.255.255 255.255.255.255 127.0.0.1 127.0.0.1 331
- 255.255.255.255 255.255.255.255 134.206.231.187 134.206.231.187 306
- 255.255.255.255 255.255.255.255 10.51.4.57 10.51.4.57 281
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement