Académique Documents
Professionnel Documents
Culture Documents
Wed Sep 26 21:31:54 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Sep 26 21:31:54 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Wed Sep 26 21:31:54 2018 Need hold release from management interface, waiting...
Wed Sep 26 21:31:55 2018 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
Wed Sep 26 21:31:55 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.28.149.230:443
Wed Sep 26 21:31:55 2018 Attempting to establish TCP connection with [AF_INET]103.28.149.230:443
[nonblock]
Wed Sep 26 21:31:56 2018 TLS: Initial packet from [AF_INET]103.28.149.230:443, sid=dd646072
0c2eab32
Wed Sep 26 21:31:56 2018 WARNING: this configuration may cache passwords in memory -- use the
auth-nocache option to prevent this
Wed Sep 26 21:31:58 2018 VERIFY OK: depth=1, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com
Wed Sep 26 21:31:58 2018 VERIFY OK: depth=0, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, emailAddress=contact@tcpvpn.com
Wed Sep 26 21:31:59 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit
RSA
Wed Sep 26 21:31:59 2018 [tcpvpn.com] Peer Connection Initiated with [AF_INET]103.28.149.230:443
Wed Sep 26 21:32:00 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-
option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.0.1,topology net30,ping 5,ping-restart 30,ifconfig
10.8.0.74 10.8.0.73'
Wed Sep 26 21:32:00 2018 OPTIONS IMPORT: timers and/or timeouts modified
Wed Sep 26 21:32:00 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Sep 26 21:32:00 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Sep 26 21:32:00 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Wed Sep 26 21:32:00 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication
Wed Sep 26 21:32:00 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Sep 26 21:32:00 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Wed Sep 26 21:32:00 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication
Wed Sep 26 21:32:00 2018 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB
to mitigate SWEET32 attacks.
Wed Sep 26 21:32:00 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.0.74/255.255.255.252 on interface {C0BB32D0-9C0B-4590-8393-C215F6B62A98} [DHCP-serv:
10.8.0.73, lease-time: 31536000]
Wed Sep 26 21:32:00 2018 Successful ARP Flush on interface [14] {C0BB32D0-9C0B-4590-8393-
C215F6B62A98}
Wed Sep 26 21:32:05 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Wed Sep 26 21:32:05 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.73
Wed Sep 26 21:32:05 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.73