+1 323 268 0395 kmw@caltek.net

ed mailing list archives

demo@mx1:~ $ sudo openvpn kmw. [...]

by
Kenneth Wyrick
- 12/07/2018 21:34:27

demo@mx1:~
$ sudo openvpn kmw.ovpn
Fri Dec  7 16:32:47 2018 Unrecognized option or missing or extra parameter(s) in kmw.ovpn:14: block-outside-dns (2.4.0)
Fri Dec  7 16:32:47 2018 OpenVPN 2.4.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
Fri Dec  7 16:32:47 2018 library versions: OpenSSL 1.0.2l  25 May 2017, LZO 2.08
Fri Dec  7 16:32:47 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Dec  7 16:32:47 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Fri Dec  7 16:32:47 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]45.62.232.151:1194
Fri Dec  7 16:32:47 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
Fri Dec  7 16:32:47 2018 UDP link local: (not bound)
Fri Dec  7 16:32:47 2018 UDP link remote: [AF_INET]45.62.232.151:1194
Fri Dec  7 16:32:47 2018 TLS: Initial packet from [AF_INET]45.62.232.151:1194, sid=1ba168cc d0f891d9
Fri Dec  7 16:32:47 2018 VERIFY OK: depth=1, CN=ChangeMe
Fri Dec  7 16:32:47 2018 Validating certificate key usage
Fri Dec  7 16:32:47 2018 ++ Certificate has key usage  00a0, expects 00a0
Fri Dec  7 16:32:47 2018 VERIFY KU OK
Fri Dec  7 16:32:47 2018 Validating certificate extended key usage
Fri Dec  7 16:32:47 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Fri Dec  7 16:32:47 2018 VERIFY EKU OK
Fri Dec  7 16:32:47 2018 VERIFY OK: depth=0, CN=server
Fri Dec  7 16:32:47 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Dec  7 16:32:47 2018 [server] Peer Connection Initiated with [AF_INET]45.62.232.151:1194
Fri Dec  7 16:32:48 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Dec  7 16:32:48 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,route-gateway 10.8.0.1,topology subnet,ping 10,ping-restart 120,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: timers and/or timeouts modified
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: --ifconfig/up options modified
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: route options modified
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: route-related options modified
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: peer-id set
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: adjusting link_mtu to 1624
Fri Dec  7 16:32:48 2018 OPTIONS IMPORT: data channel crypto options modified
Fri Dec  7 16:32:48 2018 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Dec  7 16:32:48 2018 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
Fri Dec  7 16:32:48 2018 ROUTE_GATEWAY 172.31.98.1/255.255.254.0 IFACE=wlan0 HWADDR=00:24:d6:58:19:10
Fri Dec  7 16:32:48 2018 TUN/TAP device tun0 opened
Fri Dec  7 16:32:48 2018 TUN/TAP TX queue length set to 100
Fri Dec  7 16:32:48 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Fri Dec  7 16:32:48 2018 /sbin/ip link set dev tun0 up mtu 1500
Fri Dec  7 16:32:48 2018 /sbin/ip addr add dev tun0 10.8.0.2/24 broadcast 10.8.0.255
Fri Dec  7 16:32:48 2018 /sbin/ip route add 45.62.232.151/32 via 172.31.98.1
Fri Dec  7 16:32:48 2018 /sbin/ip route add 0.0.0.0/1 via 10.8.0.1
Fri Dec  7 16:32:48 2018 /sbin/ip route add 128.0.0.0/1 via 10.8.0.1
Fri Dec  7 16:32:48 2018 Initialization Sequence Completed