Вы находитесь на странице: 1из 4

Mon Jul 16 18:57:18 2018 OpenVPN 2.4.

3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11]


[AEAD] built on Jul 14 2017

Mon Jul 16 18:57:18 2018 Windows version 6.2 (Windows 8 or greater) 64bit

Mon Jul 16 18:57:18 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10

Enter Management Password:

Mon Jul 16 18:57:18 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

Mon Jul 16 18:57:18 2018 Need hold release from management interface, waiting...

Mon Jul 16 18:57:18 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'state on'

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'log all on'

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'echo all on'

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'hold off'

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'hold release'

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'username "Auth" "tcpvpn.com-kiki3"'

Mon Jul 16 18:57:19 2018 MANAGEMENT: CMD 'password [...]'

Mon Jul 16 18:57:19 2018 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.

Mon Jul 16 18:57:20 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.28.149.230:1194

Mon Jul 16 18:57:20 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]

Mon Jul 16 18:57:20 2018 Attempting to establish TCP connection with [AF_INET]103.28.149.230:1194
[nonblock]

Mon Jul 16 18:57:20 2018 MANAGEMENT: >STATE:1531742240,TCP_CONNECT,,,,,,

Mon Jul 16 18:57:21 2018 TCP connection established with [AF_INET]103.28.149.230:1194

Mon Jul 16 18:57:21 2018 TCP_CLIENT link local: (not bound)

Mon Jul 16 18:57:21 2018 TCP_CLIENT link remote: [AF_INET]103.28.149.230:1194

Mon Jul 16 18:57:21 2018 MANAGEMENT: >STATE:1531742241,WAIT,,,,,,

Mon Jul 16 18:57:21 2018 MANAGEMENT: >STATE:1531742241,AUTH,,,,,,

Mon Jul 16 18:57:21 2018 TLS: Initial packet from [AF_INET]103.28.149.230:1194, sid=f37ad3f4
e8361168
Mon Jul 16 18:57:21 2018 WARNING: this configuration may cache passwords in memory -- use the
auth-nocache option to prevent this

Mon Jul 16 18:57:21 2018 VERIFY OK: depth=1, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com

Mon Jul 16 18:57:21 2018 VERIFY OK: depth=0, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com

Mon Jul 16 18:57:22 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit
RSA

Mon Jul 16 18:57:22 2018 [tcpvpn.com] Peer Connection Initiated with [AF_INET]103.28.149.230:1194

Mon Jul 16 18:57:23 2018 MANAGEMENT: >STATE:1531742243,GET_CONFIG,,,,,,

Mon Jul 16 18:57:23 2018 SENT CONTROL [tcpvpn.com]: 'PUSH_REQUEST' (status=1)

Mon Jul 16 18:57:23 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-
option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.16.1,topology net30,ping 5,ping-restart
30,ifconfig 10.8.16.14 10.8.16.13'

Mon Jul 16 18:57:23 2018 OPTIONS IMPORT: timers and/or timeouts modified

Mon Jul 16 18:57:23 2018 OPTIONS IMPORT: --ifconfig/up options modified

Mon Jul 16 18:57:23 2018 OPTIONS IMPORT: route options modified

Mon Jul 16 18:57:23 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Mon Jul 16 18:57:23 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

Mon Jul 16 18:57:23 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Mon Jul 16 18:57:23 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Mon Jul 16 18:57:23 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

Mon Jul 16 18:57:23 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Mon Jul 16 18:57:23 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Mon Jul 16 18:57:23 2018 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB
to mitigate SWEET32 attacks.

Mon Jul 16 18:57:23 2018 interactive service msg_channel=624

Mon Jul 16 18:57:23 2018 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=5


HWADDR=02:36:36:02:55:06
Mon Jul 16 18:57:23 2018 open_tun

Mon Jul 16 18:57:23 2018 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C0BB32D0-9C0B-4590-


8393-C215F6B62A98}.tap

Mon Jul 16 18:57:23 2018 TAP-Windows Driver Version 9.21

Mon Jul 16 18:57:23 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.16.14/255.255.255.252 on interface {C0BB32D0-9C0B-4590-8393-C215F6B62A98} [DHCP-serv:
10.8.16.13, lease-time: 31536000]

Mon Jul 16 18:57:23 2018 Successful ARP Flush on interface [13] {C0BB32D0-9C0B-4590-8393-
C215F6B62A98}

Mon Jul 16 18:57:23 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Mon Jul 16 18:57:23 2018 MANAGEMENT: >STATE:1531742243,ASSIGN_IP,,10.8.16.14,,,,

Mon Jul 16 18:57:28 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

Mon Jul 16 18:57:28 2018 C:\Windows\system32\route.exe ADD 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Mon Jul 16 18:57:28 2018 Route addition via service succeeded

Mon Jul 16 18:57:28 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.16.13

Mon Jul 16 18:57:28 2018 Route addition via service succeeded

Mon Jul 16 18:57:28 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.16.13

Mon Jul 16 18:57:28 2018 Route addition via service succeeded

Mon Jul 16 18:57:28 2018 MANAGEMENT: >STATE:1531742248,ADD_ROUTES,,,,,,

Mon Jul 16 18:57:28 2018 C:\Windows\system32\route.exe ADD 10.8.16.1 MASK 255.255.255.255


10.8.16.13

Mon Jul 16 18:57:28 2018 Route addition via service succeeded

Mon Jul 16 18:57:28 2018 Initialization Sequence Completed

Mon Jul 16 18:57:28 2018 MANAGEMENT:


>STATE:1531742248,CONNECTED,SUCCESS,10.8.16.14,103.28.149.230,1194,192.168.42.111,52692

Mon Jul 16 19:37:44 2018 C:\Windows\system32\route.exe DELETE 10.8.16.1 MASK 255.255.255.255


10.8.16.13

Mon Jul 16 19:37:44 2018 Route deletion via service succeeded

Mon Jul 16 19:37:44 2018 C:\Windows\system32\route.exe DELETE 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Mon Jul 16 19:37:44 2018 Route deletion via service succeeded


Mon Jul 16 19:37:44 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.16.13

Mon Jul 16 19:37:44 2018 Route deletion via service succeeded

Mon Jul 16 19:37:44 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0


10.8.16.13

Mon Jul 16 19:37:44 2018 Route deletion via service succeeded

Mon Jul 16 19:37:44 2018 Closing TUN/TAP interface

Mon Jul 16 19:37:44 2018 TAP: DHCP address released

Mon Jul 16 19:37:44 2018 SIGTERM[hard,] received, process exiting

Mon Jul 16 19:37:44 2018 MANAGEMENT: >STATE:1531744664,EXITING,SIGTERM,,,,,