Created
March 25, 2014 02:11
-
-
Save that0n3guy/9754054 to your computer and use it in GitHub Desktop.
laptop openvpn log
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Mon Mar 24 21:07:03 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013 | |
Enter Management Password: | |
Mon Mar 24 21:07:03 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340 | |
Mon Mar 24 21:07:03 2014 Need hold release from management interface, waiting... | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340 | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: CMD 'state on' | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: CMD 'log all on' | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: CMD 'hold off' | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: CMD 'hold release' | |
Mon Mar 24 21:07:04 2014 Socket Buffers: R=[8192->8192] S=[8192->8192] | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: >STATE:1395713224,RESOLVE,,, | |
Mon Mar 24 21:07:04 2014 UDPv4 link local: [undef] | |
Mon Mar 24 21:07:04 2014 UDPv4 link remote: [AF_INET]72.196.3.30:1194 | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: >STATE:1395713224,WAIT,,, | |
Mon Mar 24 21:07:04 2014 MANAGEMENT: >STATE:1395713224,AUTH,,, | |
Mon Mar 24 21:07:04 2014 TLS: Initial packet from [AF_INET]72.196.3.30:1194, sid=7b4e1d76 a1a8c9f3 | |
Mon Mar 24 21:07:04 2014 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, CN=Fort-Funston CA, [email protected] | |
Mon Mar 24 21:07:04 2014 VERIFY OK: nsCertType=SERVER | |
Mon Mar 24 21:07:04 2014 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, CN=server, [email protected] | |
Mon Mar 24 21:07:04 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key | |
Mon Mar 24 21:07:04 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Mon Mar 24 21:07:04 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key | |
Mon Mar 24 21:07:04 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Mon Mar 24 21:07:04 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA | |
Mon Mar 24 21:07:04 2014 [server] Peer Connection Initiated with [AF_INET]72.196.3.30:1194 | |
Mon Mar 24 21:07:05 2014 MANAGEMENT: >STATE:1395713225,GET_CONFIG,,, | |
Mon Mar 24 21:07:07 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) | |
Mon Mar 24 21:07:07 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.8.0.1,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' | |
Mon Mar 24 21:07:07 2014 OPTIONS IMPORT: timers and/or timeouts modified | |
Mon Mar 24 21:07:07 2014 OPTIONS IMPORT: --ifconfig/up options modified | |
Mon Mar 24 21:07:07 2014 OPTIONS IMPORT: route options modified | |
Mon Mar 24 21:07:07 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified | |
Mon Mar 24 21:07:07 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 | |
Mon Mar 24 21:07:07 2014 MANAGEMENT: >STATE:1395713227,ASSIGN_IP,,10.8.0.6, | |
Mon Mar 24 21:07:07 2014 open_tun, tt->ipv6=0 | |
Mon Mar 24 21:07:07 2014 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{4A452209-7AAC-41EF-943F-12F2FF6BF68C}.tap | |
Mon Mar 24 21:07:07 2014 TAP-Windows Driver Version 9.9 | |
Mon Mar 24 21:07:07 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {4A452209-7AAC-41EF-943F-12F2FF6BF68C} [DHCP-serv: 10.8.0.5, lease-time: 31536000] | |
Mon Mar 24 21:07:07 2014 Successful ARP Flush on interface [31] {4A452209-7AAC-41EF-943F-12F2FF6BF68C} | |
Mon Mar 24 21:07:12 2014 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up | |
Mon Mar 24 21:07:12 2014 C:\Windows\system32\route.exe ADD 72.196.3.30 MASK 255.255.255.255 192.168.123.1 | |
Mon Mar 24 21:07:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 | |
Mon Mar 24 21:07:12 2014 Route addition via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:07:12 2014 C:\Windows\system32\route.exe ADD 192.168.123.1 MASK 255.255.255.255 192.168.123.1 IF 12 | |
Mon Mar 24 21:07:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 | |
Mon Mar 24 21:07:12 2014 Route addition via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:07:12 2014 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5 | |
Mon Mar 24 21:07:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 | |
Mon Mar 24 21:07:12 2014 Route addition via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:07:12 2014 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5 | |
Mon Mar 24 21:07:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 | |
Mon Mar 24 21:07:12 2014 Route addition via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:07:12 2014 MANAGEMENT: >STATE:1395713232,ADD_ROUTES,,, | |
Mon Mar 24 21:07:12 2014 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.5 | |
Mon Mar 24 21:07:12 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 | |
Mon Mar 24 21:07:12 2014 Route addition via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:07:12 2014 Initialization Sequence Completed | |
Mon Mar 24 21:07:12 2014 MANAGEMENT: >STATE:1395713232,CONNECTED,SUCCESS,10.8.0.6,72.196.3.30 | |
Mon Mar 24 21:09:33 2014 C:\Windows\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.5 | |
Mon Mar 24 21:09:33 2014 Route deletion via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:09:33 2014 C:\Windows\system32\route.exe DELETE 72.196.3.30 MASK 255.255.255.255 192.168.123.1 | |
Mon Mar 24 21:09:33 2014 Route deletion via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:09:33 2014 C:\Windows\system32\route.exe DELETE 192.168.123.1 MASK 255.255.255.255 192.168.123.1 | |
Mon Mar 24 21:09:33 2014 Route deletion via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:09:33 2014 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.5 | |
Mon Mar 24 21:09:33 2014 Route deletion via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:09:33 2014 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.5 | |
Mon Mar 24 21:09:33 2014 Route deletion via IPAPI succeeded [adaptive] | |
Mon Mar 24 21:09:33 2014 Closing TUN/TAP interface | |
Mon Mar 24 21:09:33 2014 SIGTERM[hard,] received, process exiting | |
Mon Mar 24 21:09:33 2014 MANAGEMENT: >STATE:1395713373,EXITING,SIGTERM,, |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment