2023-11-10 12:55:02 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2023-11-10 12:55:02 Note: --cipher is not set. OpenVPN versions before 2.5 defaulted to BF-CBC as fallback when cipher negotiation failed in this case. If you need this fallback please add '--data-ciphers-fallback BF-CBC' to your configuration and/or add BF-CBC to --data-ciphers.
2023-11-10 12:55:02 Note: '--allow-compression' is not set to 'no', disabling data channel offload.
2023-11-10 12:55:02 OpenVPN 2.6.6 [git:v2.6.6/x] Windows-MSVC [SSL (OpenSSL)] [x] [x] [x] [x] [x] built on Aug 15 2023
2023-11-10 12:55:02 Windows version 10.0 (Windows 10 or greater), amd64 executable
2023-11-10 12:55:02 library versions: OpenSSL 3.1.2 1 Aug 2023, LZO 2.10
2023-11-10 12:55:02 DCO version: v0
2023-11-10 12:55:02 MANAGEMENT: TCP Socket listening on [AF_INET]x.x.x.x:x
2023-11-10 12:55:02 Need hold release from management interface, waiting...
2023-11-10 12:55:03 MANAGEMENT: Client connected from [AF_INET]x.x.x.x:xxxxx
2023-11-10 12:55:03 MANAGEMENT: CMD 'state on'
2023-11-10 12:55:03 MANAGEMENT: CMD 'log on all'
2023-11-10 12:55:03 MANAGEMENT: CMD 'echo on all'
2023-11-10 12:55:03 MANAGEMENT: CMD 'bytecount 5'
2023-11-10 12:55:03 MANAGEMENT: CMD 'state'
2023-11-10 12:55:03 MANAGEMENT: CMD 'hold off'
2023-11-10 12:55:03 NOTE: --mute triggered...
2023-11-10 12:55:04 3 variation(s) on previous 20 message(s) suppressed by --mute
2023-11-10 12:55:04 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2023-11-10 12:55:04 TCP/UDP: Preserving recently used remote address: [AF_INET]x.x.x.x:xxxx
2023-11-10 12:55:04 Socket Buffers: R=[65536->65536] S=[65536->65536]
2023-11-10 12:55:04 Attempting to establish TCP connection with [AF_INET]x.x.x.x:xxxx
2023-11-10 12:55:04 MANAGEMENT: >STATE:x,TCP_CONNECT,,,,,,
2023-11-10 12:55:04 TCP connection established with [AF_INET]x.x.x.x:xxxx
2023-11-10 12:55:04 TCPv4_CLIENT link local: (not bound)
2023-11-10 12:55:04 TCPv4_CLIENT link remote: [AF_INET]x.x.x.x:xxxx
2023-11-10 12:55:04 MANAGEMENT: >STATE:1699617304,WAIT,,,,,,
2023-11-10 12:55:04 MANAGEMENT: >STATE:1699617304,AUTH,,,,,,
2023-11-10 12:55:04 TLS: Initial packet from [AF_INET]x.x.x.x:xxxx, sid=2e564b97 6fb3532a
2023-11-10 12:55:04 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2023-11-10 12:55:04 VERIFY OK: depth=1, O=example, OU=zeroshell f393, CN=ZeroShell
2023-11-10 12:55:04 VERIFY OK: depth=0, OU=Hosts, CN=zeroshell.example.com
2023-11-10 12:55:04 Control Channel: TLSv1.2, cipher TLSv1.2 x, peer certificate: 2048 bit RSA, signature: RSA-SHA256
2023-11-10 12:55:04 [zeroshell.example.com] Peer Connection Initiated with [AF_INET]x.x.x.x:xxxx
2023-11-10 12:55:04 TLS: move_session: dest=TM_ACTIVE src=TM_INITIAL reinit_src=1
2023-11-10 12:55:04 TLS: tls_multi_process: initial untrusted session promoted to trusted
2023-11-10 12:55:05 MANAGEMENT: >STATE:1699617305,GET_CONFIG,,,,,,
2023-11-10 12:55:05 SENT CONTROL [zeroshell.example.com]: 'PUSH_REQUEST' (status=1)
2023-11-10 12:55:06 PUSH: Received control message: 'PUSH_REPLY,route-gateway 192.168.250.254,,dhcp-option DNS 192.168.111.3,route remote_host 255.255.255.255 net_gateway 1,route 192.168.200.0 255.255.255.0,route 192.168.111.0 255.255.255.0,route 10.163.226.192 255.255.255.192,route 10.163.225.224 255.255.255.224,route 10.163.224.32 255.255.255.224,route 192.168.3.0 255.255.255.0,ping 5,ping-restart 60,ifconfig 192.168.250.16 255.255.255.0,peer-id 0,cipher AES-256-GCM'
2023-11-10 12:55:06 OPTIONS IMPORT: --ifconfig/up options modified
2023-11-10 12:55:06 OPTIONS IMPORT: route options modified
2023-11-10 12:55:06 OPTIONS IMPORT: route-related options modified
2023-11-10 12:55:06 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
2023-11-10 12:55:06 interactive service msg_channel=788
2023-11-10 12:55:06 open_tun
2023-11-10 12:55:06 CreateFile failed on tap-windows6 device: \\.\Global\{F8C28A42-24A2-41EE-BF91-AE8A4766E8CF}.tap: General failure (ERROR_GEN_FAILURE) (errno=31)
2023-11-10 12:55:06 tap-windows6 device [OpenVPN TAP-Windows6 #1] opened
2023-11-10 12:55:06 TAP-Windows Driver Version 9.26
2023-11-10 12:55:06 Notified TAP-Windows driver to set a DHCP IP/netmask of 192.168.250.16/255.255.255.0 on interface {6935761A-C4CB-45AE-B0C9-58A4522289DD} [DHCP-serv: 192.168.250.0, lease-time: 31536000]
2023-11-10 12:55:06 Successful ARP Flush on interface [33] {6935761A-C4CB-45AE-B0C9-58A4522289DD}
2023-11-10 12:55:06 MANAGEMENT: >STATE:1699617306,ASSIGN_IP,,192.168.250.16,,,,
2023-11-10 12:55:06 IPv4 MTU set to 1500 on interface 33 using service
2023-11-10 12:55:06 Data Channel: cipher 'AES-256-GCM', peer-id: 0, compression: 'lzo'
2023-11-10 12:55:06 Timers: ping 5, ping-restart 60
2023-11-10 12:55:11 TEST ROUTES: 8/8 succeeded len=8 ret=1 a=0 u/d=up
2023-11-10 12:55:11 MANAGEMENT: >STATE:1699617311,ADD_ROUTES,,,,,,
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 79.135.52.20 MASK 255.255.255.255 192.168.3.2 METRIC 1
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 192.168.200.0 MASK 255.255.255.0 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 192.168.111.0 MASK 255.255.255.0 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 10.163.226.192 MASK 255.255.255.192 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 10.163.225.224 MASK 255.255.255.224 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 10.163.224.32 MASK 255.255.255.224 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 C:\WINDOWS\system32\route.exe ADD 192.168.3.0 MASK 255.255.255.0 192.168.250.254
2023-11-10 12:55:11 Route addition via service succeeded
2023-11-10 12:55:11 Initialization Sequence Completed
2023-11-10 12:55:11 MANAGEMENT: >STATE:1699617311,CONNECTED,SUCCESS,192.168.250.16,79.135.52.20,1205,192.168.3.18,61813
|