Florent42 | rebonjour,
en réponse voici mes logs (desole j ai été un peu absent ces temps-ci)
coté client:
Code :
- Fri May 25 16:03:31 2007 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006
- Fri May 25 16:03:31 2007 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.
- Fri May 25 16:03:31 2007 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Fri May 25 16:03:31 2007 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:31 2007 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:31 2007 LZO compression initialized
- Fri May 25 16:03:31 2007 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
- Fri May 25 16:03:31 2007 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Fri May 25 16:03:31 2007 Local Options hash (VER=V4): '504e774e'
- Fri May 25 16:03:31 2007 Expected Remote Options hash (VER=V4): '14168603'
- Fri May 25 16:03:31 2007 UDPv4 link local: [undef]
- Fri May 25 16:03:31 2007 UDPv4 link remote: 192.168.120.2:1194
- Fri May 25 16:03:31 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:33 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:35 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:37 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:39 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:41 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:43 2007 read UDPv4: Connection reset by peer (WSAECONNRESET) (code=10054)
- Fri May 25 16:03:54 2007 TLS: Initial packet from 192.168.120.2:1194, sid=df22680d f46551ac
- Fri May 25 16:03:54 2007 VERIFY OK: depth=1, /C=FR/ST=RA/L=Sane/O=Tele/CN=telat/emailAddress=mail@host.domain
- Fri May 25 16:03:54 2007 VERIFY OK: nsCertType=SERVER
- Fri May 25 16:03:54 2007 VERIFY OK: depth=0, /C=FR/ST=RA/O=Telephoniedupilat/CN=server/emailAddress=mail@host.domain
- Fri May 25 16:03:54 2007 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:03:54 2007 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:54 2007 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:03:54 2007 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:54 2007 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri May 25 16:03:54 2007 [server] Peer Connection Initiated with 192.168.120.2:1194
- Fri May 25 16:03:55 2007 TCP/UDP: Closing socket
- Fri May 25 16:03:55 2007 SIGTERM[hard,] received, process exiting
- Fri May 25 16:03:55 2007 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006
- Fri May 25 16:03:55 2007 IMPORTANT: OpenVPN's default port number is now 1194, based on an official port number assignment by IANA. OpenVPN 2.0-beta16 and earlier used 5000 as the default port.
- Fri May 25 16:03:55 2007 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Fri May 25 16:03:55 2007 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:55 2007 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:55 2007 LZO compression initialized
- Fri May 25 16:03:55 2007 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
- Fri May 25 16:03:55 2007 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Fri May 25 16:03:55 2007 Local Options hash (VER=V4): '504e774e'
- Fri May 25 16:03:55 2007 Expected Remote Options hash (VER=V4): '14168603'
- Fri May 25 16:03:55 2007 UDPv4 link local: [undef]
- Fri May 25 16:03:55 2007 UDPv4 link remote: 192.168.120.2:1194
- Fri May 25 16:03:55 2007 TLS: Initial packet from 192.168.120.2:1194, sid=708cd168 e10bfac9
- Fri May 25 16:03:55 2007 VERIFY OK: depth=1, /C=FR/ST=RA/L=Sane/O=Telet/CN=teat/emailAddress=mail@host.domain
- Fri May 25 16:03:55 2007 VERIFY OK: nsCertType=SERVER
- Fri May 25 16:03:55 2007 VERIFY OK: depth=0, /C=FR/ST=RA/O=Teleat/CN=server/emailAddress=mail@host.domain
- Fri May 25 16:03:55 2007 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:03:55 2007 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:55 2007 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:03:55 2007 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:03:55 2007 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri May 25 16:03:55 2007 [server] Peer Connection Initiated with 192.168.120.2:1194
- Fri May 25 16:03:57 2007 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- Fri May 25 16:03:57 2007 PUSH: Received control message: 'PUSH_REPLY,route 10.8.0.0 255.255.255.0,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
- Fri May 25 16:03:57 2007 OPTIONS IMPORT: timers and/or timeouts modified
- Fri May 25 16:03:57 2007 OPTIONS IMPORT: --ifconfig/up options modified
- Fri May 25 16:03:57 2007 OPTIONS IMPORT: route options modified
- Fri May 25 16:03:57 2007 TAP-WIN32 device [Connexion au réseau local 3] opened: \\.\Global\{18D28907-2879-49BD-B947-088EC44C6877}.tap
- Fri May 25 16:03:57 2007 TAP-Win32 Driver Version 8.4
- Fri May 25 16:03:57 2007 TAP-Win32 MTU=1500
- Fri May 25 16:03:57 2007 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {18D28907-2879-49BD-B947-088EC44C6877} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
- Fri May 25 16:03:57 2007 Successful ARP Flush on interface [4] {18D28907-2879-49BD-B947-088EC44C6877}
- Fri May 25 16:03:57 2007 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
- Fri May 25 16:03:57 2007 Route: Waiting for TUN/TAP interface to come up...
- Fri May 25 16:03:58 2007 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
- Fri May 25 16:03:58 2007 Route: Waiting for TUN/TAP interface to come up...
- Fri May 25 16:03:59 2007 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
- Fri May 25 16:03:59 2007 Route: Waiting for TUN/TAP interface to come up...
- Fri May 25 16:04:00 2007 TEST ROUTES: 0/0 succeeded len=1 ret=0 a=0 u/d=down
- Fri May 25 16:04:00 2007 Route: Waiting for TUN/TAP interface to come up...
- Fri May 25 16:04:01 2007 TEST ROUTES: 1/1 succeeded len=1 ret=1 a=0 u/d=up
- Fri May 25 16:04:01 2007 route ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.5
- Fri May 25 16:04:01 2007 Route addition via IPAPI succeeded
- Fri May 25 16:04:01 2007 Initialization Sequence Completed
|
coté serveur:
Code :
- Fri May 25 16:08:39 2007 OpenVPN 2.0.9 Win32-MinGW [SSL] [LZO] built on Oct 1 2006
- Fri May 25 16:08:39 2007 Diffie-Hellman initialized with 1024 bit key
- Fri May 25 16:08:39 2007 Control Channel Authentication: using 'ta.key' as a OpenVPN static key file
- Fri May 25 16:08:39 2007 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:08:39 2007 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:08:39 2007 TLS-Auth MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
- Fri May 25 16:08:39 2007 TAP-WIN32 device [Connexion au réseau local 2] opened: \\.\Global\{528FDC5A-E0F4-4508-8B60-15BF2BB56EF4}.tap
- Fri May 25 16:08:39 2007 TAP-Win32 Driver Version 8.4
- Fri May 25 16:08:39 2007 TAP-Win32 MTU=1500
- Fri May 25 16:08:39 2007 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.252 on interface {528FDC5A-E0F4-4508-8B60-15BF2BB56EF4} [DHCP-serv: 10.8.0.2, lease-time: 31536000]
- Fri May 25 16:08:39 2007 Sleeping for 10 seconds...
- Fri May 25 16:08:49 2007 NOTE: FlushIpNetTable failed on interface [2] {528FDC5A-E0F4-4508-8B60-15BF2BB56EF4} (status=1413) : Index incorrect.
- Fri May 25 16:08:49 2007 route ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.2
- Fri May 25 16:08:49 2007 Route addition via IPAPI succeeded
- Fri May 25 16:08:49 2007 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Fri May 25 16:08:49 2007 UDPv4 link local (bound): [undef]:1194
- Fri May 25 16:08:49 2007 UDPv4 link remote: [undef]
- Fri May 25 16:08:49 2007 MULTI: multi_init called, r=256 v=256
- Fri May 25 16:08:49 2007 IFCONFIG POOL: base=10.8.0.4 size=62
- Fri May 25 16:08:49 2007 IFCONFIG POOL LIST
- Fri May 25 16:08:49 2007 client,10.8.0.4
- Fri May 25 16:08:49 2007 Initialization Sequence Completed
- Fri May 25 16:08:49 2007 MULTI: multi_create_instance called
- Fri May 25 16:08:49 2007 192.168.120.13:1217 Re-using SSL/TLS context
- Fri May 25 16:08:49 2007 192.168.120.13:1217 LZO compression initialized
- Fri May 25 16:08:49 2007 192.168.120.13:1217 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
- Fri May 25 16:08:49 2007 192.168.120.13:1217 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Fri May 25 16:08:49 2007 192.168.120.13:1217 Local Options hash (VER=V4): '14168603'
- Fri May 25 16:08:49 2007 192.168.120.13:1217 Expected Remote Options hash (VER=V4): '504e774e'
- Fri May 25 16:08:49 2007 192.168.120.13:1217 TLS: Initial packet from 192.168.120.13:1217, sid=d8c3b147 e2c03dbe
- Fri May 25 16:08:50 2007 192.168.120.13:1217 VERIFY OK: depth=1, /C=FR/ST=RA/L=Sane/O=Telilat/CN=teat/emailAddress=mail@host.domain
- Fri May 25 16:08:50 2007 192.168.120.13:1217 VERIFY OK: depth=0, /C=FR/ST=RA/O=Telilat/CN=client/emailAddress=mail@host.domain
- Fri May 25 16:08:50 2007 192.168.120.13:1217 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:08:50 2007 192.168.120.13:1217 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:08:50 2007 192.168.120.13:1217 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:08:50 2007 192.168.120.13:1217 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:08:50 2007 192.168.120.13:1217 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri May 25 16:08:50 2007 192.168.120.13:1217 [client] Peer Connection Initiated with 192.168.120.13:1217
- Fri May 25 16:08:50 2007 client/192.168.120.13:1217 MULTI: Learn: 10.8.0.6 -> client/192.168.120.13:1217
- Fri May 25 16:08:50 2007 client/192.168.120.13:1217 MULTI: primary virtual IP for client/192.168.120.13:1217: 10.8.0.6
- Fri May 25 16:08:51 2007 MULTI: multi_create_instance called
- Fri May 25 16:08:51 2007 192.168.120.13:1226 Re-using SSL/TLS context
- Fri May 25 16:08:51 2007 192.168.120.13:1226 LZO compression initialized
- Fri May 25 16:08:51 2007 192.168.120.13:1226 Control Channel MTU parms [ L:1542 D:166 EF:66 EB:0 ET:0 EL:0 ]
- Fri May 25 16:08:51 2007 192.168.120.13:1226 Data Channel MTU parms [ L:1542 D:1450 EF:42 EB:135 ET:0 EL:0 AF:3/1 ]
- Fri May 25 16:08:51 2007 192.168.120.13:1226 Local Options hash (VER=V4): '14168603'
- Fri May 25 16:08:51 2007 192.168.120.13:1226 Expected Remote Options hash (VER=V4): '504e774e'
- Fri May 25 16:08:51 2007 192.168.120.13:1226 TLS: Initial packet from 192.168.120.13:1226, sid=1433a985 8d60081c
- Fri May 25 16:08:52 2007 192.168.120.13:1226 VERIFY OK: depth=1, /C=FR/ST=RA/L=Sane/O=Tellat/CN=telat/emailAddress=mail@host.domain
- Fri May 25 16:08:52 2007 192.168.120.13:1226 VERIFY OK: depth=0, /C=FR/ST=RA/O=Telat/CN=client/emailAddress=mail@host.domain
- Fri May 25 16:08:52 2007 192.168.120.13:1226 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:08:52 2007 192.168.120.13:1226 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:08:52 2007 192.168.120.13:1226 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Fri May 25 16:08:52 2007 192.168.120.13:1226 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Fri May 25 16:08:52 2007 192.168.120.13:1226 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
- Fri May 25 16:08:52 2007 192.168.120.13:1226 [client] Peer Connection Initiated with 192.168.120.13:1226
- Fri May 25 16:08:52 2007 MULTI: new connection by client 'client' will cause previous active sessions by this client to be dropped. Remember to use the --duplicate-cn option if you want multiple clients using the same certificate or username to concurrently connect.
- Fri May 25 16:08:52 2007 MULTI: Learn: 10.8.0.6 -> client/192.168.120.13:1226
- Fri May 25 16:08:52 2007 MULTI: primary virtual IP for client/192.168.120.13:1226: 10.8.0.6
- Fri May 25 16:08:53 2007 client/192.168.120.13:1226 PUSH: Received control message: 'PUSH_REQUEST'
- Fri May 25 16:08:53 2007 client/192.168.120.13:1226 SENT CONTROL [client]: 'PUSH_REPLY,route 10.8.0.0 255.255.255.0,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
|
merci Message édité par Florent42 le 25-05-2007 à 16:11:42
|