Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save xv-tom-l/67b5966f82d3ff5141e1 to your computer and use it in GitHub Desktop.
Save xv-tom-l/67b5966f82d3ff5141e1 to your computer and use it in GitHub Desktop.
==============================================
Connecting to Australia - Melbourne, ip: XXX.XXX.XXX.XXX, protocol: udp
Thu Oct 1 10:00:11 2015 DEPRECATED OPTION: --tls-remote, please update your configuration
Thu Oct 1 10:00:11 2015 OpenVPN 2.3.8 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [PKCS11] [MH] [IPv6] built on Aug 27 2015
Thu Oct 1 10:00:11 2015 library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.09
Thu Oct 1 10:00:11 2015 MANAGEMENT: TCP Socket listening on [AF_INET]XXX.XXX.XXX.XXX:1337
Thu Oct 1 10:00:11 2015 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Oct 1 10:00:11 2015 Control Channel Authentication: using 'ssl/ta.key' as a OpenVPN static key file
Thu Oct 1 10:00:11 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Oct 1 10:00:11 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Oct 1 10:00:11 2015 Socket Buffers: R=[196724->65536] S=[9216->65536]
Thu Oct 1 10:00:11 2015 UDPv4 link local: [undef]
Thu Oct 1 10:00:11 2015 UDPv4 link remote: [AF_INET]XXX.XXX.XXX.XXX:16618
Thu Oct 1 10:00:11 2015 TLS: Initial packet from [AF_INET]XXX.XXX.XXX.XXX:16618, sid=eb72fbf1 00857ff9
Thu Oct 1 10:00:11 2015 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=Fort-Funston_CA/[email protected]
Thu Oct 1 10:00:11 2015 VERIFY OK: nsCertType=SERVER
Thu Oct 1 10:00:11 2015 VERIFY X509NAME OK: /C=US/ST=CA/O=Fort-Funston/CN=server_v1/[email protected]
Thu Oct 1 10:00:11 2015 VERIFY OK: depth=0, /C=US/ST=CA/O=Fort-Funston/CN=server_v1/[email protected]
Thu Oct 1 10:00:13 2015 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Oct 1 10:00:13 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Oct 1 10:00:13 2015 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Thu Oct 1 10:00:13 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Thu Oct 1 10:00:13 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Thu Oct 1 10:00:13 2015 [server_v1] Peer Connection Initiated with [AF_INET]XXX.XXX.XXX.XXX:16618
Thu Oct 1 10:00:15 2015 SENT CONTROL [server_v1]: 'PUSH_REQUEST' (status=1)
Thu Oct 1 10:00:16 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS XXX.XXX.XXX.XXX,route XXX.XXX.XXX.XXX,topology net30,ping 10,ping-restart 60,ifconfig XXX.XXX.XXX.XXX XXX.XXX.XXX.XXX'
Thu Oct 1 10:00:16 2015 OPTIONS IMPORT: timers and/or timeouts modified
Thu Oct 1 10:00:16 2015 OPTIONS IMPORT: --ifconfig/up options modified
Thu Oct 1 10:00:16 2015 OPTIONS IMPORT: route options modified
Thu Oct 1 10:00:16 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
dyld: lazy symbol binding failed: Symbol not found: ___strlcpy_chk
Referenced from: /Applications/ExpressVPN.app/Contents/Resources/openvpn
Expected in: /usr/lib/libSystem.B.dylib
dyld: Symbol not found: ___strlcpy_chk
Referenced from: /Applications/ExpressVPN.app/Contents/Resources/openvpn
Expected in: /usr/lib/libSystem.B.dylib
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment