You are on page 1of 2

Wed Feb 11 21:49:06 2015 OpenVPN 2.3.

6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO]


[PKCS11] [IPv6] built on Dec 1 2014
Wed Feb 11 21:49:06 2015 library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.08
Enter Management Password:
Wed Feb 11 21:49:06 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:
25340
Wed Feb 11 21:49:06 2015 Need hold release from management interface, waiting...
Wed Feb 11 21:49:07 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25
340
Wed Feb 11 21:49:07 2015 MANAGEMENT: CMD 'state on'
Wed Feb 11 21:49:07 2015 MANAGEMENT: CMD 'log all on'
Wed Feb 11 21:49:07 2015 MANAGEMENT: CMD 'hold off'
Wed Feb 11 21:49:07 2015 MANAGEMENT: CMD 'hold release'
Wed Feb 11 21:49:07 2015 WARNING: No server certificate verification method has
been enabled. See http://openvpn.net/howto.html#mitm for more info.
Wed Feb 11 21:49:07 2015 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Feb 11 21:49:07 2015 Attempting to establish TCP connection with [AF_INET]10
.1.89.130:8000 [nonblock]
Wed Feb 11 21:49:07 2015 MANAGEMENT: >STATE:1423666147,TCP_CONNECT,,,
Wed Feb 11 21:49:08 2015 TCP connection established with [AF_INET]10.1.89.130:80
00
Wed Feb 11 21:49:08 2015 Send to HTTP proxy: 'CONNECT a.buzzmechat.com.sgdo.delt
acompt.com:1194 HTTP/1.0'
Wed Feb 11 21:49:08 2015 HTTP proxy returned: 'HTTP/1.1 200 OK'
Wed Feb 11 21:49:10 2015 TCPv4_CLIENT link local: [undef]
Wed Feb 11 21:49:10 2015 TCPv4_CLIENT link remote: [AF_INET]10.1.89.130:8000
Wed Feb 11 21:49:10 2015 MANAGEMENT: >STATE:1423666150,WAIT,,,
Wed Feb 11 21:49:10 2015 MANAGEMENT: >STATE:1423666150,AUTH,,,
Wed Feb 11 21:49:10 2015 TLS: Initial packet from [AF_INET]10.1.89.130:8000, sid
=fa4cb8bf 86518a82
Wed Feb 11 21:49:10 2015 WARNING: this configuration may cache passwords in memo
ry -- use the auth-nocache option to prevent this
Wed Feb 11 21:49:11 2015 VERIFY OK: depth=0, CN=DELTA SSH VPN, O=DELTA COMPUTER,
C=ID, ST=Indonesia, L=East Java
Wed Feb 11 21:49:11 2015 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized
with 128 bit key
Wed Feb 11 21:49:11 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1'
for HMAC authentication
Wed Feb 11 21:49:11 2015 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized
with 128 bit key
Wed Feb 11 21:49:11 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1'
for HMAC authentication
Wed Feb 11 21:49:11 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES2
56-SHA, 2048 bit RSA
Wed Feb 11 21:49:11 2015 [DELTA SSH VPN] Peer Connection Initiated with [AF_INET
]10.1.89.130:8000
Wed Feb 11 21:49:12 2015 MANAGEMENT: >STATE:1423666152,GET_CONFIG,,,
Wed Feb 11 21:49:14 2015 SENT CONTROL [DELTA SSH VPN]: 'PUSH_REQUEST' (status=1)
Wed Feb 11 21:49:14 2015 PUSH: Received control message: 'PUSH_REPLY,ping 3,ping
-restart 10'
Wed Feb 11 21:49:14 2015 OPTIONS IMPORT: timers and/or timeouts modified
Wed Feb 11 21:49:14 2015 OpenVPN ROUTE: OpenVPN needs a gateway parameter for a
--route option and no default was specified by either --route-gateway or --ifcon
fig options
Wed Feb 11 21:49:14 2015 OpenVPN ROUTE: failed to parse/resolve route for host/n
etwork: 0.0.0.0
Wed Feb 11 21:49:14 2015 open_tun, tt->ipv6=0
Wed Feb 11 21:49:14 2015 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{309C0
139-67E2-4635-8012-CDFC925C35B2}.tap
Wed Feb 11 21:49:14 2015 TAP-Windows Driver Version 9.21

Wed Feb 11 21:49:14 2015


635-8012-CDFC925C35B2}
Wed Feb 11 21:49:19 2015
Wed Feb 11 21:49:19 2015
Wed Feb 11 21:49:19 2015
9.130

Successful ARP Flush on interface [18] {309C0139-67E2-4


TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Initialization Sequence Completed
MANAGEMENT: >STATE:1423666159,CONNECTED,SUCCESS,,10.1.8

You might also like