Vous êtes sur la page 1sur 4

Wed Sep 26 21:31:54 2018 OpenVPN 2.4.

3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11]


[AEAD] built on Jul 14 2017

Wed Sep 26 21:31:54 2018 Windows version 6.2 (Windows 8 or greater) 64bit

Wed Sep 26 21:31:54 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10

Enter Management Password:

Wed Sep 26 21:31:54 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342

Wed Sep 26 21:31:54 2018 Need hold release from management interface, waiting...

Wed Sep 26 21:31:54 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25342

Wed Sep 26 21:31:54 2018 MANAGEMENT: CMD 'state on'

Wed Sep 26 21:31:54 2018 MANAGEMENT: CMD 'log all on'

Wed Sep 26 21:31:54 2018 MANAGEMENT: CMD 'echo all on'

Wed Sep 26 21:31:54 2018 MANAGEMENT: CMD 'hold off'

Wed Sep 26 21:31:54 2018 MANAGEMENT: CMD 'hold release'

Wed Sep 26 21:31:55 2018 MANAGEMENT: CMD 'username "Auth" "tcpvpn.com-kiki2"'

Wed Sep 26 21:31:55 2018 MANAGEMENT: CMD 'password [...]'

Wed Sep 26 21:31:55 2018 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.

Wed Sep 26 21:31:55 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.28.149.230:443

Wed Sep 26 21:31:55 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]

Wed Sep 26 21:31:55 2018 Attempting to establish TCP connection with [AF_INET]103.28.149.230:443
[nonblock]

Wed Sep 26 21:31:55 2018 MANAGEMENT: >STATE:1537972315,TCP_CONNECT,,,,,,

Wed Sep 26 21:31:56 2018 TCP connection established with [AF_INET]103.28.149.230:443

Wed Sep 26 21:31:56 2018 TCP_CLIENT link local: (not bound)

Wed Sep 26 21:31:56 2018 TCP_CLIENT link remote: [AF_INET]103.28.149.230:443

Wed Sep 26 21:31:56 2018 MANAGEMENT: >STATE:1537972316,WAIT,,,,,,

Wed Sep 26 21:31:56 2018 MANAGEMENT: >STATE:1537972316,AUTH,,,,,,

Wed Sep 26 21:31:56 2018 TLS: Initial packet from [AF_INET]103.28.149.230:443, sid=dd646072
0c2eab32
Wed Sep 26 21:31:56 2018 WARNING: this configuration may cache passwords in memory -- use the
auth-nocache option to prevent this

Wed Sep 26 21:31:58 2018 VERIFY OK: depth=1, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com

Wed Sep 26 21:31:58 2018 VERIFY OK: depth=0, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com

Wed Sep 26 21:31:59 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit
RSA

Wed Sep 26 21:31:59 2018 [tcpvpn.com] Peer Connection Initiated with [AF_INET]103.28.149.230:443

Wed Sep 26 21:32:00 2018 MANAGEMENT: >STATE:1537972320,GET_CONFIG,,,,,,

Wed Sep 26 21:32:00 2018 SENT CONTROL [tcpvpn.com]: 'PUSH_REQUEST' (status=1)

Wed Sep 26 21:32:00 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-
option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig
10.8.0.74 10.8.0.73'

Wed Sep 26 21:32:00 2018 OPTIONS IMPORT: timers and/or timeouts modified

Wed Sep 26 21:32:00 2018 OPTIONS IMPORT: --ifconfig/up options modified

Wed Sep 26 21:32:00 2018 OPTIONS IMPORT: route options modified

Wed Sep 26 21:32:00 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Wed Sep 26 21:32:00 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

Wed Sep 26 21:32:00 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Wed Sep 26 21:32:00 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Wed Sep 26 21:32:00 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

Wed Sep 26 21:32:00 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Wed Sep 26 21:32:00 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Wed Sep 26 21:32:00 2018 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB
to mitigate SWEET32 attacks.

Wed Sep 26 21:32:00 2018 interactive service msg_channel=624

Wed Sep 26 21:32:00 2018 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=5


HWADDR=02:36:36:02:55:06
Wed Sep 26 21:32:00 2018 open_tun

Wed Sep 26 21:32:00 2018 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C0BB32D0-9C0B-4590-


8393-C215F6B62A98}.tap

Wed Sep 26 21:32:00 2018 TAP-Windows Driver Version 9.21

Wed Sep 26 21:32:00 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.0.74/255.255.255.252 on interface {C0BB32D0-9C0B-4590-8393-C215F6B62A98} [DHCP-serv:
10.8.0.73, lease-time: 31536000]

Wed Sep 26 21:32:00 2018 Successful ARP Flush on interface [14] {C0BB32D0-9C0B-4590-8393-
C215F6B62A98}

Wed Sep 26 21:32:00 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Wed Sep 26 21:32:00 2018 MANAGEMENT: >STATE:1537972320,ASSIGN_IP,,10.8.0.74,,,,

Wed Sep 26 21:32:05 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

Wed Sep 26 21:32:05 2018 C:\Windows\system32\route.exe ADD 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Wed Sep 26 21:32:05 2018 Route addition via service succeeded

Wed Sep 26 21:32:05 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.73

Wed Sep 26 21:32:05 2018 Route addition via service succeeded

Wed Sep 26 21:32:05 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.73

Wed Sep 26 21:32:05 2018 Route addition via service succeeded

Wed Sep 26 21:32:05 2018 MANAGEMENT: >STATE:1537972325,ADD_ROUTES,,,,,,

Wed Sep 26 21:32:05 2018 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255


10.8.0.73

Wed Sep 26 21:32:05 2018 Route addition via service succeeded

Wed Sep 26 21:32:05 2018 Initialization Sequence Completed

Wed Sep 26 21:32:05 2018 MANAGEMENT:


>STATE:1537972325,CONNECTED,SUCCESS,10.8.0.74,103.28.149.230,443,192.168.42.111,51606

Wed Sep 26 21:32:30 2018 C:\Windows\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255


10.8.0.73

Wed Sep 26 21:32:30 2018 Route deletion via service succeeded

Wed Sep 26 21:32:30 2018 C:\Windows\system32\route.exe DELETE 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Wed Sep 26 21:32:30 2018 Route deletion via service succeeded


Wed Sep 26 21:32:30 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.73

Wed Sep 26 21:32:30 2018 Route deletion via service succeeded

Wed Sep 26 21:32:30 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0


10.8.0.73

Wed Sep 26 21:32:30 2018 Route deletion via service succeeded

Wed Sep 26 21:32:30 2018 Closing TUN/TAP interface

Wed Sep 26 21:32:30 2018 TAP: DHCP address released

Wed Sep 26 21:32:30 2018 SIGTERM[hard,] received, process exiting

Wed Sep 26 21:32:30 2018 MANAGEMENT: >STATE:1537972350,EXITING,SIGTERM,,,,,

Vous aimerez peut-être aussi