Fri Oct 27 09:14:46 2017 OpenVPN 2.4.3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jul 14 2017
Fri Oct 27 09:14:46 2017 Windows version 6.2 (Windows 8 or greater) 64bit
Fri Oct 27 09:14:46 2017 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Fri Oct 27 09:14:46 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25344
Fri Oct 27 09:14:46 2017 Need hold release from management interface, waiting...
Fri Oct 27 09:14:46 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25344
Fri Oct 27 09:14:46 2017 MANAGEMENT: CMD 'state on'
Fri Oct 27 09:14:46 2017 MANAGEMENT: CMD 'log all on'
Fri Oct 27 09:14:46 2017 MANAGEMENT: CMD 'echo all on'
Fri Oct 27 09:14:46 2017 MANAGEMENT: CMD 'hold off'
Fri Oct 27 09:14:46 2017 MANAGEMENT: CMD 'hold release'
Fri Oct 27 09:14:47 2017 Diffie-Hellman initialized with 4096 bit key
Fri Oct 27 09:14:47 2017 interactive service msg_channel=0
Fri Oct 27 09:14:47 2017 ROUTE_GATEWAY 192.168.5.1/255.255.255.0 I=3 HWADDR=f8:0f:41:b0:4d:ab
Fri Oct 27 09:14:47 2017 open_tun
Fri Oct 27 09:14:47 2017 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{51E7DECF-2563-49C7-A243-4F8AAEE82602}.tap
Fri Oct 27 09:14:47 2017 TAP-Windows Driver Version 9.21 Fri Oct 27 09:14:47 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.252 on interface {51E7DECF-2563-49C7-A243-4F8AAEE82602} [DHCP-serv: 10.8.0.2, lease-time: 31536000]
Fri Oct 27 09:14:47 2017 Sleeping for 10 seconds...
Fri Oct 27 09:14:57 2017 Successful ARP Flush on interface [16] {51E7DECF-2563-49C7-A243-4F8AAEE82602}
Fri Oct 27 09:14:57 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Oct 27 09:14:57 2017 MANAGEMENT: >STATE:1509088497,ASSIGN_IP,,10.8.0.1,,,,
Fri Oct 27 09:14:57 2017 MANAGEMENT: >STATE:1509088497,ADD_ROUTES,,,,,,
Fri Oct 27 09:14:57 2017 C:\Windows\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.2
Fri Oct 27 09:14:57 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Fri Oct 27 09:14:57 2017 Route addition via IPAPI succeeded [adaptive]
Fri Oct 27 09:14:57 2017 Could not determine IPv4/IPv6 protocol. Using AF_INET6
Fri Oct 27 09:14:57 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Fri Oct 27 09:14:57 2017 setsockopt(IPV6_V6ONLY=0)
Fri Oct 27 09:14:57 2017 UDPv6 link local (bound): [AF_INET6][undef]:1723
Fri Oct 27 09:14:57 2017 UDPv6 link remote: [AF_UNSPEC]
Fri Oct 27 09:14:57 2017 MULTI: multi_init called, r=256 v=256
Fri Oct 27 09:14:57 2017 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Fri Oct 27 09:14:57 2017 ifconfig_pool_read(), in='DELL,10.8.0.4', TODO: IPv6
Fri Oct 27 09:14:57 2017 succeeded -> ifconfig_pool_set()
Fri Oct 27 09:14:57 2017 IFCONFIG POOL LIST
Fri Oct 27 09:14:57 2017 DELL,10.8.0.4
Fri Oct 27 09:14:57 2017 Initialization Sequence Completed
Fri Oct 27 09:14:57 2017 MANAGEMENT: >STATE:1509088497,CONNECTED,SUCCESS,10.8.0.1,,,,
Fri Oct 27 09:15:07 2017 91.161.20.10 TLS: Initial packet from [AF_INET6]::ffff:91.161.20.10:43095, sid=b76b6bcb f7602aad
Fri Oct 27 09:15:13 2017 91.161.20.10 VERIFY OK: depth=1, C=FR, ST=44, L=LaMar, O=OpenVPN, OU=MeMer, CN=FabMer, name=MeMer, emailAddress=a.b@c.com
Fri Oct 27 09:15:13 2017 91.161.20.10 VERIFY OK: depth=0, C=FR, ST=44, L=LaMar, O=OpenVPN, OU=MeMer, CN=DELL, name=MeMer, emailAddress=a.b@c.com
Fri Oct 27 09:15:14 2017 91.161.20.10 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Oct 27 09:15:14 2017 91.161.20.10 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Fri Oct 27 09:15:14 2017 91.161.20.10 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 27 09:15:14 2017 91.161.20.10 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Fri Oct 27 09:15:14 2017 91.161.20.10 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).
Fri Oct 27 09:15:14 2017 91.161.20.10 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Fri Oct 27 09:15:14 2017 91.161.20.10 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB to mitigate SWEET32 attacks.
Fri Oct 27 09:15:14 2017 91.161.20.10 Control Channel: TLSv1, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-SHA, 4096 bit RSA
Fri Oct 27 09:15:14 2017 91.161.20.10 [DELL] Peer Connection Initiated with [AF_INET6]::ffff:91.161.20.10:43095
Fri Oct 27 09:15:14 2017 DELL/91.161.20.10 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Fri Oct 27 09:15:14 2017 DELL/91.161.20.10 MULTI: Learn: 10.8.0.6 -> DELL/91.161.20.10
Fri Oct 27 09:15:14 2017 DELL/91.161.20.10 MULTI: primary virtual IP for DELL/91.161.20.10: 10.8.0.6
Fri Oct 27 09:15:17 2017 DELL/91.161.20.10 PUSH: Received control message: 'PUSH_REQUEST'
Fri Oct 27 09:15:17 2017 DELL/91.161.20.10 SENT CONTROL [DELL]: 'PUSH_REPLY,route 192.168.5.0 255.255.255.0,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5' (status=1)
|