Vous êtes sur la page 1sur 3

Thu Mar 15 22:53:32 2018 OpenVPN 2.4.

3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4]


[PKCS11] [AEAD] built on Jul 14 2017

Thu Mar 15 22:53:32 2018 Windows version 6.2 (Windows 8 or greater) 64bit

Thu Mar 15 22:53:32 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10

Enter Management Password:

Thu Mar 15 22:53:32 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

Thu Mar 15 22:53:32 2018 Need hold release from management interface, waiting...

Thu Mar 15 22:53:32 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340

Thu Mar 15 22:53:32 2018 MANAGEMENT: CMD 'state on'

Thu Mar 15 22:53:32 2018 MANAGEMENT: CMD 'log all on'

Thu Mar 15 22:53:32 2018 MANAGEMENT: CMD 'echo all on'

Thu Mar 15 22:53:32 2018 MANAGEMENT: CMD 'hold off'

Thu Mar 15 22:53:32 2018 MANAGEMENT: CMD 'hold release'

Thu Mar 15 22:53:33 2018 MANAGEMENT: CMD 'username "Auth" "tcpvpn.com-kiki1"'

Thu Mar 15 22:53:33 2018 MANAGEMENT: CMD 'password [...]'

Thu Mar 15 22:53:33 2018 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.

Thu Mar 15 22:53:33 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.28.149.230:1194

Thu Mar 15 22:53:33 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]

Thu Mar 15 22:53:33 2018 Attempting to establish TCP connection with [AF_INET]103.28.149.230:1194
[nonblock]

Thu Mar 15 22:53:33 2018 MANAGEMENT: >STATE:1521129213,TCP_CONNECT,,,,,,

Thu Mar 15 22:53:34 2018 TCP connection established with [AF_INET]103.28.149.230:1194

Thu Mar 15 22:53:34 2018 TCP_CLIENT link local: (not bound)

Thu Mar 15 22:53:34 2018 TCP_CLIENT link remote: [AF_INET]103.28.149.230:1194

Thu Mar 15 22:53:34 2018 MANAGEMENT: >STATE:1521129214,WAIT,,,,,,

Thu Mar 15 22:53:34 2018 MANAGEMENT: >STATE:1521129214,AUTH,,,,,,

Thu Mar 15 22:53:34 2018 TLS: Initial packet from [AF_INET]103.28.149.230:1194, sid=2fe5798b
e1b63dfd

Thu Mar 15 22:53:34 2018 WARNING: this configuration may cache passwords in memory -- use the
auth-nocache option to prevent this

Thu Mar 15 22:53:35 2018 VERIFY OK: depth=1, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com
Thu Mar 15 22:53:35 2018 VERIFY OK: depth=0, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com

Thu Mar 15 22:53:36 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048
bit RSA

Thu Mar 15 22:53:36 2018 [tcpvpn.com] Peer Connection Initiated with [AF_INET]103.28.149.230:1194

Thu Mar 15 22:53:37 2018 MANAGEMENT: >STATE:1521129217,GET_CONFIG,,,,,,

Thu Mar 15 22:53:37 2018 SENT CONTROL [tcpvpn.com]: 'PUSH_REQUEST' (status=1)

Thu Mar 15 22:53:37 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway


def1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.16.1,topology net30,ping 5,ping-restart
30,ifconfig 10.8.16.18 10.8.16.17'

Thu Mar 15 22:53:37 2018 OPTIONS IMPORT: timers and/or timeouts modified

Thu Mar 15 22:53:37 2018 OPTIONS IMPORT: --ifconfig/up options modified

Thu Mar 15 22:53:37 2018 OPTIONS IMPORT: route options modified

Thu Mar 15 22:53:37 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Thu Mar 15 22:53:37 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

Thu Mar 15 22:53:37 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Thu Mar 15 22:53:37 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Thu Mar 15 22:53:37 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

Thu Mar 15 22:53:37 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Thu Mar 15 22:53:37 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Thu Mar 15 22:53:37 2018 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB
to mitigate SWEET32 attacks.

Thu Mar 15 22:53:37 2018 interactive service msg_channel=624

Thu Mar 15 22:53:37 2018 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=9


HWADDR=02:36:36:02:55:06

Thu Mar 15 22:53:37 2018 open_tun

Thu Mar 15 22:53:37 2018 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C648E52E-3B39-44D2-


8492-F2047865BDA5}.tap

Thu Mar 15 22:53:37 2018 TAP-Windows Driver Version 9.21

Thu Mar 15 22:53:37 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.16.18/255.255.255.252 on interface {C648E52E-3B39-44D2-8492-F2047865BDA5} [DHCP-serv:
10.8.16.17, lease-time: 31536000]

Thu Mar 15 22:53:37 2018 Successful ARP Flush on interface [18] {C648E52E-3B39-44D2-8492-
F2047865BDA5}
Thu Mar 15 22:53:37 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Thu Mar 15 22:53:37 2018 MANAGEMENT: >STATE:1521129217,ASSIGN_IP,,10.8.16.18,,,,

Thu Mar 15 22:53:42 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

Thu Mar 15 22:53:42 2018 C:\Windows\system32\route.exe ADD 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Thu Mar 15 22:53:42 2018 Route addition via service succeeded

Thu Mar 15 22:53:42 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.16.17

Thu Mar 15 22:53:42 2018 Route addition via service succeeded

Thu Mar 15 22:53:42 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.16.17

Thu Mar 15 22:53:42 2018 Route addition via service succeeded

Thu Mar 15 22:53:42 2018 MANAGEMENT: >STATE:1521129222,ADD_ROUTES,,,,,,

Thu Mar 15 22:53:42 2018 C:\Windows\system32\route.exe ADD 10.8.16.1 MASK 255.255.255.255


10.8.16.17

Thu Mar 15 22:53:42 2018 Route addition via service succeeded

Thu Mar 15 22:53:42 2018 Initialization Sequence Completed

Thu Mar 15 22:53:42 2018 MANAGEMENT:


>STATE:1521129222,CONNECTED,SUCCESS,10.8.16.18,103.28.149.230,1194,192.168.42.111,51510

Thu Mar 15 23:01:10 2018 C:\Windows\system32\route.exe DELETE 10.8.16.1 MASK 255.255.255.255


10.8.16.17

Thu Mar 15 23:01:10 2018 Route deletion via service succeeded

Thu Mar 15 23:01:10 2018 C:\Windows\system32\route.exe DELETE 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Thu Mar 15 23:01:10 2018 Route deletion via service succeeded

Thu Mar 15 23:01:10 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.16.17

Thu Mar 15 23:01:10 2018 Route deletion via service succeeded

Thu Mar 15 23:01:10 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0


10.8.16.17

Thu Mar 15 23:01:10 2018 Route deletion via service succeeded

Thu Mar 15 23:01:10 2018 Closing TUN/TAP interface

Thu Mar 15 23:01:10 2018 TAP: DHCP address released

Thu Mar 15 23:01:10 2018 SIGTERM[hard,] received, process exiting

Thu Mar 15 23:01:10 2018 MANAGEMENT: >STATE:1521129670,EXITING,SIGTERM,,,,,

Vous aimerez peut-être aussi