Вы находитесь на странице: 1из 3

Thu Nov 09 20:07:01 2017 OpenVPN 2.4.

3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4]


[PKCS11] [AEAD] built on Jul 14 2017

Thu Nov 09 20:07:01 2017 Windows version 6.1 (Windows 7) 64bit

Thu Nov 09 20:07:01 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10

Enter Management Password:

Thu Nov 09 20:07:01 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341

Thu Nov 09 20:07:01 2017 Need hold release from management interface, waiting...

Thu Nov 09 20:07:01 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'state on'

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'log all on'

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'echo all on'

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'hold off'

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'hold release'

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'username "Auth" "tcpvpn.com-kiki3"'

Thu Nov 09 20:07:02 2017 MANAGEMENT: CMD 'password [...]'

Thu Nov 09 20:07:02 2017 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.

Thu Nov 09 20:07:02 2017 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.28.149.230:1194

Thu Nov 09 20:07:02 2017 Socket Buffers: R=[8192->8192] S=[8192->8192]

Thu Nov 09 20:07:02 2017 Attempting to establish TCP connection with [AF_INET]103.28.149.230:1194
[nonblock]

Thu Nov 09 20:07:02 2017 MANAGEMENT: >STATE:1510232822,TCP_CONNECT,,,,,,

Thu Nov 09 20:07:03 2017 TCP connection established with [AF_INET]103.28.149.230:1194

Thu Nov 09 20:07:03 2017 TCP_CLIENT link local: (not bound)

Thu Nov 09 20:07:03 2017 TCP_CLIENT link remote: [AF_INET]103.28.149.230:1194

Thu Nov 09 20:07:03 2017 MANAGEMENT: >STATE:1510232823,WAIT,,,,,,

Thu Nov 09 20:07:03 2017 MANAGEMENT: >STATE:1510232823,AUTH,,,,,,

Thu Nov 09 20:07:03 2017 TLS: Initial packet from [AF_INET]103.28.149.230:1194, sid=a5547ecd
108ac90e

Thu Nov 09 20:07:03 2017 WARNING: this configuration may cache passwords in memory -- use the
auth-nocache option to prevent this

Thu Nov 09 20:07:04 2017 VERIFY OK: depth=1, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com
Thu Nov 09 20:07:04 2017 VERIFY OK: depth=0, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com

Thu Nov 09 20:07:04 2017 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048
bit RSA

Thu Nov 09 20:07:04 2017 [tcpvpn.com] Peer Connection Initiated with [AF_INET]103.28.149.230:1194

Thu Nov 09 20:07:06 2017 MANAGEMENT: >STATE:1510232826,GET_CONFIG,,,,,,

Thu Nov 09 20:07:06 2017 SENT CONTROL [tcpvpn.com]: 'PUSH_REQUEST' (status=1)

Thu Nov 09 20:07:06 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway


def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.16.1,topology net30,ping 5,ping-restart
30,ifconfig 10.8.16.142 10.8.16.141'

Thu Nov 09 20:07:06 2017 OPTIONS IMPORT: timers and/or timeouts modified

Thu Nov 09 20:07:06 2017 OPTIONS IMPORT: --ifconfig/up options modified

Thu Nov 09 20:07:06 2017 OPTIONS IMPORT: route options modified

Thu Nov 09 20:07:06 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Thu Nov 09 20:07:06 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

Thu Nov 09 20:07:06 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Thu Nov 09 20:07:06 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Thu Nov 09 20:07:06 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

Thu Nov 09 20:07:06 2017 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Thu Nov 09 20:07:06 2017 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Thu Nov 09 20:07:06 2017 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB
to mitigate SWEET32 attacks.

Thu Nov 09 20:07:06 2017 interactive service msg_channel=376

Thu Nov 09 20:07:06 2017 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=12


HWADDR=02:36:36:02:55:06

Thu Nov 09 20:07:06 2017 open_tun

Thu Nov 09 20:07:06 2017 TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{B8E9E554-
4073-4C96-A73C-5280C60577CB}.tap

Thu Nov 09 20:07:06 2017 TAP-Windows Driver Version 9.21

Thu Nov 09 20:07:06 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.16.142/255.255.255.252 on interface {B8E9E554-4073-4C96-A73C-5280C60577CB} [DHCP-serv:
10.8.16.141, lease-time: 31536000]

Thu Nov 09 20:07:06 2017 Successful ARP Flush on interface [13] {B8E9E554-4073-4C96-A73C-
5280C60577CB}
Thu Nov 09 20:07:06 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Thu Nov 09 20:07:06 2017 MANAGEMENT: >STATE:1510232826,ASSIGN_IP,,10.8.16.142,,,,

Thu Nov 09 20:07:12 2017 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

Thu Nov 09 20:07:12 2017 C:\Windows\system32\route.exe ADD 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Thu Nov 09 20:07:12 2017 Route addition via service succeeded

Thu Nov 09 20:07:12 2017 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.16.141

Thu Nov 09 20:07:12 2017 Route addition via service succeeded

Thu Nov 09 20:07:12 2017 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.16.141

Thu Nov 09 20:07:12 2017 Route addition via service succeeded

Thu Nov 09 20:07:12 2017 MANAGEMENT: >STATE:1510232832,ADD_ROUTES,,,,,,

Thu Nov 09 20:07:12 2017 C:\Windows\system32\route.exe ADD 10.8.16.1 MASK 255.255.255.255


10.8.16.141

Thu Nov 09 20:07:12 2017 Route addition via service succeeded

Thu Nov 09 20:07:12 2017 Initialization Sequence Completed

Thu Nov 09 20:07:12 2017 MANAGEMENT:


>STATE:1510232832,CONNECTED,SUCCESS,10.8.16.142,103.28.149.230,1194,192.168.42.111,4996
8

Thu Nov 09 20:15:48 2017 C:\Windows\system32\route.exe DELETE 10.8.16.1 MASK 255.255.255.255


10.8.16.141

Thu Nov 09 20:15:48 2017 Route deletion via service succeeded

Thu Nov 09 20:15:48 2017 C:\Windows\system32\route.exe DELETE 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Thu Nov 09 20:15:48 2017 Route deletion via service succeeded

Thu Nov 09 20:15:48 2017 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0


10.8.16.141

Thu Nov 09 20:15:48 2017 Route deletion via service succeeded

Thu Nov 09 20:15:48 2017 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0


10.8.16.141

Thu Nov 09 20:15:48 2017 Route deletion via service succeeded

Thu Nov 09 20:15:48 2017 Closing TUN/TAP interface

Thu Nov 09 20:15:48 2017 TAP: DHCP address released

Thu Nov 09 20:15:48 2017 SIGTERM[hard,] received, process exiting

Thu Nov 09 20:15:48 2017 MANAGEMENT: >STATE:1510233348,EXITING,SIGTERM,,,,,

Вам также может понравиться