Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sun Jun 05 00:41:19 2011 OpenVPN 2.1.1 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Dec 11 2009
- Sun Jun 05 00:41:19 2011 WARNING: Make sure you understand the semantics of --tls-remote before using it (see the man page).
- Sun Jun 05 00:41:19 2011 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
- Sun Jun 05 00:41:19 2011 Control Channel Authentication: using 'static.key' as a OpenVPN static key file
- Sun Jun 05 00:41:19 2011 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Jun 05 00:41:19 2011 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Jun 05 00:41:19 2011 LZO compression initialized
- Sun Jun 05 00:41:19 2011 Control Channel MTU parms [ L:1592 D:168 EF:68 EB:0 ET:0 EL:0 ]
- Sun Jun 05 00:41:19 2011 Data Channel MTU parms [ L:1592 D:1450 EF:60 EB:135 ET:32 EL:0 AF:3/1 ]
- Sun Jun 05 00:41:20 2011 Local Options hash (VER=V4): '88107939'
- Sun Jun 05 00:41:20 2011 Expected Remote Options hash (VER=V4): 'ad144f1c'
- Sun Jun 05 00:41:20 2011 Attempting to establish TCP connection with 38.108.125.24:31337
- Sun Jun 05 00:41:20 2011 TCP connection established with 38.108.125.24:31337
- Sun Jun 05 00:41:20 2011 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Sun Jun 05 00:41:20 2011 TCPv4_CLIENT link local: [undef]
- Sun Jun 05 00:41:20 2011 TCPv4_CLIENT link remote: 38.108.125.24:31337
- Sun Jun 05 00:41:20 2011 TLS: Initial packet from 38.108.125.24:31337, sid=601607d5 eae723bc
- Sun Jun 05 00:41:21 2011 VERIFY OK: depth=1, /C=US/ST=NY/L=New_York_City/O=VPN/CN=VPN_CA/emailAddress=macgyver2k@gmx.de
- Sun Jun 05 00:41:21 2011 VERIFY X509NAME OK: /C=US/ST=NY/L=New_York_City/O=VPN/CN=vps/emailAddress=macgyver2k@gmx.de
- Sun Jun 05 00:41:21 2011 VERIFY OK: depth=0, /C=US/ST=NY/L=New_York_City/O=VPN/CN=vps/emailAddress=macgyver2k@gmx.de
- Sun Jun 05 00:41:25 2011 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Jun 05 00:41:25 2011 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Jun 05 00:41:25 2011 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sun Jun 05 00:41:25 2011 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Jun 05 00:41:25 2011 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Sun Jun 05 00:41:25 2011 [vps] Peer Connection Initiated with 38.108.125.24:31337
- Sun Jun 05 00:41:27 2011 SENT CONTROL [vps]: 'PUSH_REQUEST' (status=1)
- Sun Jun 05 00:41:27 2011 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 8.8.8.8,redirect-gateway,route-gateway 10.8.0.1,route 10.8.0.0 255.255.255.0,ping 10,ping-restart 120,ifconfig 10.8.0.10 255.255.255.0'
- Sun Jun 05 00:41:27 2011 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Jun 05 00:41:27 2011 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Jun 05 00:41:27 2011 OPTIONS IMPORT: route options modified
- Sun Jun 05 00:41:27 2011 OPTIONS IMPORT: route-related options modified
- Sun Jun 05 00:41:27 2011 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Jun 05 00:41:27 2011 ROUTE default_gateway=192.168.1.1
- Sun Jun 05 00:41:27 2011 TAP-WIN32 device [LAN-Verbindung 5] opened: \\.\Global\{BAED87D4-8F3D-4123-AE49-17B598A93CFE}.tap
- Sun Jun 05 00:41:27 2011 TAP-Win32 Driver Version 9.6
- Sun Jun 05 00:41:27 2011 TAP-Win32 MTU=1500
- Sun Jun 05 00:41:27 2011 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.10/255.255.255.0 on interface {BAED87D4-8F3D-4123-AE49-17B598A93CFE} [DHCP-serv: 10.8.0.0, lease-time: 31536000]
- Sun Jun 05 00:41:27 2011 Successful ARP Flush on interface [27] {BAED87D4-8F3D-4123-AE49-17B598A93CFE}
- Sun Jun 05 00:41:32 2011 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
- Sun Jun 05 00:41:32 2011 C:\WINDOWS\system32\route.exe ADD 38.108.125.24 MASK 255.255.255.255 192.168.1.1
- Sun Jun 05 00:41:32 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
- Sun Jun 05 00:41:32 2011 Route addition via IPAPI succeeded [adaptive]
- Sun Jun 05 00:41:32 2011 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 0.0.0.0 192.168.1.1
- Sun Jun 05 00:41:32 2011 Route deletion via IPAPI succeeded [adaptive]
- Sun Jun 05 00:41:32 2011 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 0.0.0.0 10.8.0.1
- Sun Jun 05 00:41:32 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Sun Jun 05 00:41:32 2011 Route addition via IPAPI succeeded [adaptive]
- Sun Jun 05 00:41:32 2011 C:\WINDOWS\system32\route.exe ADD 81.52.140.66 MASK 255.255.255.255 10.8.0.1
- Sun Jun 05 00:41:32 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Sun Jun 05 00:41:32 2011 Route addition via IPAPI succeeded [adaptive]
- Sun Jun 05 00:41:32 2011 WARNING: potential route subnet conflict between local LAN [10.8.0.0/255.255.255.0] and remote VPN [10.8.0.0/255.255.255.0]
- Sun Jun 05 00:41:32 2011 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.1
- Sun Jun 05 00:41:32 2011 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
- Sun Jun 05 00:41:32 2011 Route addition via IPAPI succeeded [adaptive]
- Sun Jun 05 00:41:32 2011 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement