0% found this document useful (0 votes)
73 views

Network Open VPN 1

The document summarizes the log of an OpenVPN session on Windows. It shows OpenVPN initializing and establishing a TCP connection to a server. It then configures routes and interfaces, establishes an encrypted tunnel, and finally tears down the connection and cleans up routes when terminating.

Uploaded by

wwtmbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
73 views

Network Open VPN 1

The document summarizes the log of an OpenVPN session on Windows. It shows OpenVPN initializing and establishing a TCP connection to a server. It then configures routes and interfaces, establishes an encrypted tunnel, and finally tears down the connection and cleans up routes when terminating.

Uploaded by

wwtmbu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Sun Jul 29 08:34:26 2018 OpenVPN 2.4.

3 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11]


[AEAD] built on Jul 14 2017

Sun Jul 29 08:34:26 2018 Windows version 6.2 (Windows 8 or greater) 64bit

Sun Jul 29 08:34:26 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10

Enter Management Password:

Sun Jul 29 08:34:26 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

Sun Jul 29 08:34:26 2018 Need hold release from management interface, waiting...

Sun Jul 29 08:34:27 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340

Sun Jul 29 08:34:27 2018 MANAGEMENT: CMD 'state on'

Sun Jul 29 08:34:27 2018 MANAGEMENT: CMD 'log all on'

Sun Jul 29 08:34:27 2018 MANAGEMENT: CMD 'echo all on'

Sun Jul 29 08:34:27 2018 MANAGEMENT: CMD 'hold off'

Sun Jul 29 08:34:27 2018 MANAGEMENT: CMD 'hold release'

Sun Jul 29 08:34:28 2018 MANAGEMENT: CMD 'username "Auth" "tcpvpn.com-kiki2"'

Sun Jul 29 08:34:28 2018 MANAGEMENT: CMD 'password [...]'

Sun Jul 29 08:34:28 2018 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.

Sun Jul 29 08:34:28 2018 TCP/UDP: Preserving recently used remote address:
[AF_INET]103.28.149.230:1194

Sun Jul 29 08:34:28 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]

Sun Jul 29 08:34:28 2018 Attempting to establish TCP connection with [AF_INET]103.28.149.230:1194
[nonblock]

Sun Jul 29 08:34:28 2018 MANAGEMENT: >STATE:1532828068,TCP_CONNECT,,,,,,

Sun Jul 29 08:34:29 2018 TCP connection established with [AF_INET]103.28.149.230:1194

Sun Jul 29 08:34:29 2018 TCP_CLIENT link local: (not bound)

Sun Jul 29 08:34:29 2018 TCP_CLIENT link remote: [AF_INET]103.28.149.230:1194

Sun Jul 29 08:34:29 2018 MANAGEMENT: >STATE:1532828069,WAIT,,,,,,

Sun Jul 29 08:34:29 2018 MANAGEMENT: >STATE:1532828069,AUTH,,,,,,

Sun Jul 29 08:34:29 2018 TLS: Initial packet from [AF_INET]103.28.149.230:1194, sid=625c3de1
197d7e42
Sun Jul 29 08:34:29 2018 WARNING: this configuration may cache passwords in memory -- use the auth-
nocache option to prevent this

Sun Jul 29 08:34:30 2018 VERIFY OK: depth=1, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, [email protected]

Sun Jul 29 08:34:30 2018 VERIFY OK: depth=0, C=id, ST=id, L=tcpvpn.com, O=tcpvpn.com,
OU=tcpvpn.com, CN=tcpvpn.com, name=tcpvpn.com, [email protected]

Sun Jul 29 08:34:31 2018 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit
RSA

Sun Jul 29 08:34:31 2018 [tcpvpn.com] Peer Connection Initiated with [AF_INET]103.28.149.230:1194

Sun Jul 29 08:34:32 2018 MANAGEMENT: >STATE:1532828072,GET_CONFIG,,,,,,

Sun Jul 29 08:34:32 2018 SENT CONTROL [tcpvpn.com]: 'PUSH_REQUEST' (status=1)

Sun Jul 29 08:34:33 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-
option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route 10.8.16.1,topology net30,ping 5,ping-restart
30,ifconfig 10.8.16.18 10.8.16.17'

Sun Jul 29 08:34:33 2018 OPTIONS IMPORT: timers and/or timeouts modified

Sun Jul 29 08:34:33 2018 OPTIONS IMPORT: --ifconfig/up options modified

Sun Jul 29 08:34:33 2018 OPTIONS IMPORT: route options modified

Sun Jul 29 08:34:33 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Sun Jul 29 08:34:33 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key

Sun Jul 29 08:34:33 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Sun Jul 29 08:34:33 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Sun Jul 29 08:34:33 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key

Sun Jul 29 08:34:33 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This
allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC).

Sun Jul 29 08:34:33 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC
authentication

Sun Jul 29 08:34:33 2018 WARNING: cipher with small block size in use, reducing reneg-bytes to 64MB
to mitigate SWEET32 attacks.

Sun Jul 29 08:34:33 2018 interactive service msg_channel=624

Sun Jul 29 08:34:33 2018 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=5


HWADDR=02:36:36:02:55:06
Sun Jul 29 08:34:33 2018 open_tun

Sun Jul 29 08:34:33 2018 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{C0BB32D0-9C0B-4590-


8393-C215F6B62A98}.tap

Sun Jul 29 08:34:33 2018 TAP-Windows Driver Version 9.21

Sun Jul 29 08:34:33 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of
10.8.16.18/255.255.255.252 on interface {C0BB32D0-9C0B-4590-8393-C215F6B62A98} [DHCP-serv:
10.8.16.17, lease-time: 31536000]

Sun Jul 29 08:34:33 2018 Successful ARP Flush on interface [13] {C0BB32D0-9C0B-4590-8393-
C215F6B62A98}

Sun Jul 29 08:34:33 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Sun Jul 29 08:34:33 2018 MANAGEMENT: >STATE:1532828073,ASSIGN_IP,,10.8.16.18,,,,

Sun Jul 29 08:34:38 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

Sun Jul 29 08:34:38 2018 C:\Windows\system32\route.exe ADD 103.28.149.230 MASK 255.255.255.255


192.168.42.129

Sun Jul 29 08:34:38 2018 Route addition via service succeeded

Sun Jul 29 08:34:38 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.16.17

Sun Jul 29 08:34:38 2018 Route addition via service succeeded

Sun Jul 29 08:34:38 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.16.17

Sun Jul 29 08:34:38 2018 Route addition via service succeeded

Sun Jul 29 08:34:38 2018 MANAGEMENT: >STATE:1532828078,ADD_ROUTES,,,,,,

Sun Jul 29 08:34:38 2018 C:\Windows\system32\route.exe ADD 10.8.16.1 MASK 255.255.255.255


10.8.16.17

Sun Jul 29 08:34:38 2018 Route addition via service succeeded

Sun Jul 29 08:34:38 2018 Initialization Sequence Completed

Sun Jul 29 08:34:38 2018 MANAGEMENT:


>STATE:1532828078,CONNECTED,SUCCESS,10.8.16.18,103.28.149.230,1194,192.168.42.111,49702

Sun Jul 29 09:01:35 2018 C:\Windows\system32\route.exe DELETE 10.8.16.1 MASK 255.255.255.255


10.8.16.17

Sun Jul 29 09:01:35 2018 Route deletion via service succeeded

Sun Jul 29 09:01:35 2018 C:\Windows\system32\route.exe DELETE 103.28.149.230 MASK


255.255.255.255 192.168.42.129

Sun Jul 29 09:01:35 2018 Route deletion via service succeeded


Sun Jul 29 09:01:35 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.16.17

Sun Jul 29 09:01:35 2018 Route deletion via service succeeded

Sun Jul 29 09:01:35 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.16.17

Sun Jul 29 09:01:35 2018 Route deletion via service succeeded

Sun Jul 29 09:01:35 2018 Closing TUN/TAP interface

Sun Jul 29 09:01:35 2018 TAP: DHCP address released

Sun Jul 29 09:01:35 2018 SIGTERM[hard,] received, process exiting

Sun Jul 29 09:01:35 2018 MANAGEMENT: >STATE:1532829695,EXITING,SIGTERM,,,,,

You might also like