0% found this document useful (0 votes)
88 views2 pages

Network Open VPN 2

The document contains log output from OpenVPN showing the initialization and connection process. OpenVPN starts on the system and establishes a management connection on port 25342. It then connects to a VPN server at 103.65.236.93 port 443, negotiates authentication which fails, and exits after receiving a SIGTERM signal.

Uploaded by

wwtmbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
88 views2 pages

Network Open VPN 2

The document contains log output from OpenVPN showing the initialization and connection process. OpenVPN starts on the system and establishes a management connection on port 25342. It then connects to a VPN server at 103.65.236.93 port 443, negotiates authentication which fails, and exits after receiving a SIGTERM signal.

Uploaded by

wwtmbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Fri Jun 15 14:01:24 2018 OpenVPN 2.4.

3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11]


[AEAD] built on Jul 14 2017

Fri Jun 15 14:01:24 2018 Windows version 6.2 (Windows 8 or greater) 64bit

Fri Jun 15 14:01:24 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10

Enter Management Password:

Fri Jun 15 14:01:24 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25342

Fri Jun 15 14:01:24 2018 Need hold release from management interface, waiting...

Fri Jun 15 14:01:25 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25342

Fri Jun 15 14:01:25 2018 MANAGEMENT: CMD 'state on'

Fri Jun 15 14:01:25 2018 MANAGEMENT: CMD 'log all on'

Fri Jun 15 14:01:25 2018 MANAGEMENT: CMD 'echo all on'

Fri Jun 15 14:01:25 2018 MANAGEMENT: CMD 'hold off'

Fri Jun 15 14:01:25 2018 MANAGEMENT: CMD 'hold release'

Fri Jun 15 14:01:27 2018 MANAGEMENT: CMD 'username "Auth" "kiki1-freevpn.us"'

Fri Jun 15 14:01:27 2018 MANAGEMENT: CMD 'password [...]'

Fri Jun 15 14:01:27 2018 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.

Fri Jun 15 14:01:27 2018 MANAGEMENT: >STATE:1529046087,RESOLVE,,,,,,

Fri Jun 15 14:01:27 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.65.236.93:443

Fri Jun 15 14:01:27 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]

Fri Jun 15 14:01:27 2018 Attempting to establish TCP connection with [AF_INET]103.65.236.93:443
[nonblock]

Fri Jun 15 14:01:27 2018 MANAGEMENT: >STATE:1529046087,TCP_CONNECT,,,,,,

Fri Jun 15 14:01:28 2018 TCP connection established with [AF_INET]103.65.236.93:443

Fri Jun 15 14:01:28 2018 TCP_CLIENT link local: (not bound)

Fri Jun 15 14:01:28 2018 TCP_CLIENT link remote: [AF_INET]103.65.236.93:443

Fri Jun 15 14:01:28 2018 MANAGEMENT: >STATE:1529046088,WAIT,,,,,,

Fri Jun 15 14:01:28 2018 MANAGEMENT: >STATE:1529046088,AUTH,,,,,,

Fri Jun 15 14:01:28 2018 TLS: Initial packet from [AF_INET]103.65.236.93:443, sid=f1dc9619 763d05ef
Fri Jun 15 14:01:28 2018 WARNING: this configuration may cache passwords in memory -- use the auth-
nocache option to prevent this

Fri Jun 15 14:01:29 2018 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston,
OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain

Fri Jun 15 14:01:29 2018 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston,
OU=changeme, CN=server01, name=changeme, emailAddress=mail@host.domain

Fri Jun 15 14:01:33 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit
RSA

Fri Jun 15 14:01:33 2018 [server01] Peer Connection Initiated with [AF_INET]103.65.236.93:443

Fri Jun 15 14:01:34 2018 MANAGEMENT: >STATE:1529046094,GET_CONFIG,,,,,,

Fri Jun 15 14:01:34 2018 SENT CONTROL [server01]: 'PUSH_REQUEST' (status=1)

Fri Jun 15 14:01:35 2018 AUTH: Received control message: AUTH_FAILED

Fri Jun 15 14:01:35 2018 SIGUSR1[soft,auth-failure] received, process restarting

Fri Jun 15 14:01:35 2018 MANAGEMENT: >STATE:1529046095,RECONNECTING,auth-failure,,,,,

Fri Jun 15 14:01:35 2018 Restart pause, 5 second(s)

Fri Jun 15 14:01:37 2018 SIGTERM[hard,init_instance] received, process exiting

Fri Jun 15 14:01:37 2018 MANAGEMENT: >STATE:1529046097,EXITING,init_instance,,,,,

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy