Untitled
unknown
plain_text
a year ago
3.2 kB
2
Indexable
Never
2023-04-27 05:30:59 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2023-04-27 05:30:59 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers. 2023-04-27 05:30:59 Note: '--allow-compression' is not set to 'no', disabling data channel offload. 2023-04-27 05:30:59 OpenVPN 2.6.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] [DCO] 2023-04-27 05:30:59 library versions: OpenSSL 3.0.8 7 Feb 2023, LZO 2.10 2023-04-27 05:30:59 TCP/UDP: Preserving recently used remote address: [AF_INET]18.202.129.195:1194 2023-04-27 05:30:59 Socket Buffers: R=[212992->212992] S=[212992->212992] 2023-04-27 05:30:59 UDPv4 link local: (not bound) 2023-04-27 05:30:59 UDPv4 link remote: [AF_INET]18.202.129.195:1194 2023-04-27 05:31:00 TLS: Initial packet from [AF_INET]18.202.129.195:1194, sid=186a0433 af3a4665 2023-04-27 05:31:00 VERIFY OK: depth=1, CN=ChangeMe 2023-04-27 05:31:00 VERIFY KU OK 2023-04-27 05:31:00 Validating certificate extended key usage 2023-04-27 05:31:00 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication 2023-04-27 05:31:00 VERIFY EKU OK 2023-04-27 05:31:00 VERIFY OK: depth=0, CN=server 2023-04-27 05:31:00 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 2048 bit RSA, signature: RSA-SHA256 2023-04-27 05:31:00 [server] Peer Connection Initiated with [AF_INET]18.202.129.195:1194 2023-04-27 05:31:00 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1 2023-04-27 05:31:00 TLS: tls_multi_process: initial untrusted session promoted to trusted 2023-04-27 05:31:01 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) 2023-04-27 05:31:02 PUSH: Received control message: 'PUSH_REPLY,route 10.10.0.0 255.255.0.0,route-metric 1000,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 5,ping-restart 120,ifconfig 10.8.112.66 255.255.0.0,peer-id 240' 2023-04-27 05:31:02 OPTIONS IMPORT: --ifconfig/up options modified 2023-04-27 05:31:02 OPTIONS IMPORT: route options modified 2023-04-27 05:31:02 OPTIONS IMPORT: route-related options modified 2023-04-27 05:31:02 Using peer cipher 'AES-256-CBC' 2023-04-27 05:31:02 net_route_v4_best_gw query: dst 0.0.0.0 2023-04-27 05:31:02 net_route_v4_best_gw result: via 172.16.103.2 dev eth0 2023-04-27 05:31:02 ROUTE_GATEWAY 172.16.103.2/255.255.255.0 IFACE=eth0 HWADDR=00:0c:29:51:9e:4c 2023-04-27 05:31:02 TUN/TAP device tun0 opened 2023-04-27 05:31:02 net_iface_mtu_set: mtu 1500 for tun0 2023-04-27 05:31:02 net_iface_up: set tun0 up 2023-04-27 05:31:02 net_addr_v4_add: 10.8.112.66/16 dev tun0 2023-04-27 05:31:02 net_route_v4_add: 10.10.0.0/16 via 10.8.0.1 dev [NULL] table 0 metric 1000 2023-04-27 05:31:02 Initialization Sequence Completed 2023-04-27 05:31:02 Data Channel: cipher 'AES-256-CBC', auth 'SHA512', peer-id: 240, compression: 'stub' 2023-04-27 05:31:02 Timers: ping 5, ping-restart 120