Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- pavel@🐧:~$ sudo openvpn --config my_config.ovpn
- Mon Jun 8 14:14:34 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2019
- Mon Jun 8 14:14:34 2020 library versions: OpenSSL 1.1.1f 31 Mar 2020, LZO 2.10
- Mon Jun 8 14:14:34 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Mon Jun 8 14:14:34 2020 Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Mon Jun 8 14:14:34 2020 Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mon Jun 8 14:14:34 2020 Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key
- Mon Jun 8 14:14:34 2020 Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication
- Mon Jun 8 14:14:34 2020 TCP/UDP: Preserving recently used remote address: [AF_INET][XXX.XXX.XXX.XXX]:1194
- Mon Jun 8 14:14:34 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Mon Jun 8 14:14:34 2020 UDP link local: (not bound)
- Mon Jun 8 14:14:34 2020 UDP link remote: [AF_INET][XXX.XXX.XXX.XXX]:1194
- Mon Jun 8 14:14:34 2020 TLS: Initial packet from [AF_INET][XXX.XXX.XXX.XXX]:1194, sid=e787acf4 4186e973
- Mon Jun 8 14:14:34 2020 VERIFY OK: depth=1, CN=ChangeMe
- Mon Jun 8 14:14:34 2020 VERIFY KU OK
- Mon Jun 8 14:14:34 2020 Validating certificate extended key usage
- Mon Jun 8 14:14:34 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon Jun 8 14:14:34 2020 VERIFY EKU OK
- Mon Jun 8 14:14:34 2020 VERIFY OK: depth=0, CN=server
- Mon Jun 8 14:14:34 2020 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 2048 bit RSA
- Mon Jun 8 14:14:34 2020 [server] Peer Connection Initiated with [AF_INET][XXX.XXX.XXX.XXX]:1194
- Mon Jun 8 14:14:36 2020 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Mon Jun 8 14:14:36 2020 PUSH: Received control message: 'PUSH_REPLY,route 10.0.9.0 255.255.255.0,dhcp-option DNS 10.0.9.2,route-gateway 10.0.12.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.0.12.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: timers and/or timeouts modified
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: --ifconfig/up options modified
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: route options modified
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: route-related options modified
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: peer-id set
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: adjusting link_mtu to 1624
- Mon Jun 8 14:14:36 2020 OPTIONS IMPORT: data channel crypto options modified
- Mon Jun 8 14:14:36 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon Jun 8 14:14:36 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Jun 8 14:14:36 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon Jun 8 14:14:36 2020 ROUTE_GATEWAY 192.168.88.1/255.255.255.0 IFACE=wlo1 HWADDR=50:e0:85:fb:fa:40
- Mon Jun 8 14:14:36 2020 TUN/TAP device tun0 opened
- Mon Jun 8 14:14:36 2020 TUN/TAP TX queue length set to 100
- Mon Jun 8 14:14:36 2020 /sbin/ip link set dev tun0 up mtu 1500
- Mon Jun 8 14:14:36 2020 /sbin/ip addr add dev tun0 10.0.12.2/24 broadcast 10.0.12.255
- Mon Jun 8 14:14:36 2020 /etc/openvpn/update-resolv-conf tun0 1500 1552 10.0.12.2 255.255.255.0 init
- dhcp-option DNS 10.0.9.2
- Mon Jun 8 14:14:36 2020 /sbin/ip route add 10.0.9.0/24 via 10.0.12.1
- Mon Jun 8 14:14:36 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Mon Jun 8 14:14:36 2020 Initialization Sequence Completed
Add Comment
Please, Sign In to add comment