log
Tue Jan 23 21:56:37 2018 OpenVPN 2.4.4 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Sep 26 2017
Tue Jan 23 21:56:37 2018 Windows version 6.2 (Windows 8 or greater) 64bit
Tue Jan 23 21:56:37 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
Enter Management Password:
Tue Jan 23 21:56:37 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Tue Jan 23 21:56:37 2018 Need hold release from management interface, waiting...
Tue Jan 23 21:56:37 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Tue Jan 23 21:56:37 2018 MANAGEMENT: CMD 'state on'
Tue Jan 23 21:56:37 2018 MANAGEMENT: CMD 'log all on'
Tue Jan 23 21:56:37 2018 MANAGEMENT: CMD 'echo all on'
Tue Jan 23 21:56:37 2018 MANAGEMENT: CMD 'hold off'
Tue Jan 23 21:56:37 2018 MANAGEMENT: CMD 'hold release'
Tue Jan 23 21:56:37 2018 NOTE: your local LAN uses the extremely common subnet address 192.168.0.x or 192.168.1.x. Be aware that this might create routing conflicts if you connect to the VPN server from public locations such as internet cafes that use the same subnet.
Tue Jan 23 21:56:37 2018 Note: cannot open openvpn-status.log for WRITE
Tue Jan 23 21:56:37 2018 Note: cannot open ipp.txt for READ/WRITE
Tue Jan 23 21:56:38 2018 Diffie-Hellman initialized with 1024 bit key
Tue Jan 23 21:56:38 2018 interactive service msg_channel=460
Tue Jan 23 21:56:38 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=3 HWADDR=40:f0:2f:25:ce:bf
Tue Jan 23 21:56:38 2018 open_tun
Tue Jan 23 21:56:38 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5758EBA1-FF3F-44DC-8F7F-47F6DB54041F}.tap
Tue Jan 23 21:56:38 2018 TAP-Windows Driver Version 9.21
Tue Jan 23 21:56:38 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.1/255.255.255.252 on interface {5758EBA1-FF3F-44DC-8F7F-47F6DB54041F} [DHCP-serv: 10.8.0.2, lease-time: 31536000]
Tue Jan 23 21:56:38 2018 Sleeping for 10 seconds...
Tue Jan 23 21:56:48 2018 Successful ARP Flush on interface [45] {5758EBA1-FF3F-44DC-8F7F-47F6DB54041F}
Tue Jan 23 21:56:48 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Tue Jan 23 21:56:48 2018 MANAGEMENT: >STATE:1516741008,ASSIGN_IP,,10.8.0.1,,,,
Tue Jan 23 21:56:48 2018 MANAGEMENT: >STATE:1516741008,ADD_ROUTES,,,,,,
Tue Jan 23 21:56:48 2018 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.255.0 10.8.0.2
Tue Jan 23 21:56:48 2018 Route addition via service succeeded
Tue Jan 23 21:56:48 2018 Could not determine IPv4/IPv6 protocol. Using AF_INET6
Tue Jan 23 21:56:48 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
Tue Jan 23 21:56:48 2018 setsockopt(IPV6_V6ONLY=0)
Tue Jan 23 21:56:48 2018 UDPv6 link local (bound): [AF_INET6][undef]:1194
Tue Jan 23 21:56:48 2018 UDPv6 link remote: [AF_UNSPEC]
Tue Jan 23 21:56:48 2018 MULTI: multi_init called, r=256 v=256
Tue Jan 23 21:56:48 2018 IFCONFIG POOL: base=10.8.0.4 size=62, ipv6=0
Tue Jan 23 21:56:48 2018 IFCONFIG POOL LIST
Tue Jan 23 21:56:48 2018 Initialization Sequence Completed
Tue Jan 23 21:56:48 2018 MANAGEMENT: >STATE:1516741008,CONNECTED,SUCCESS,10.8.0.1,,,,
Tue Jan 23 21:56:53 2018 90.174.2.116 TLS: Initial packet from [AF_INET6]::ffff:90.174.2.116:53377, sid=faa339be 354e1d13
Tue Jan 23 21:56:54 2018 90.174.2.116 VERIFY OK: depth=1, C=ES, ST=Malaga, L=Malaga, O=Yomismo, OU=Yomismo, CN=yomismoserver, name=changeme, emailAddress=unofalso@hotmail.es
Tue Jan 23 21:56:54 2018 90.174.2.116 VERIFY OK: depth=0, C=ES, ST=Malaga, L=Malaga, O=Yomismo, OU=Yomismo, CN=pepe, name=changeme, emailAddress=unofalso@hotmail.es
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_GUI_VER=net.openvpn.connect.android_1.1.27-96
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_VER=3.1.2
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_PLAT=android
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_NCP=2
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_TCPNL=1
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_PROTO=2
Tue Jan 23 21:56:54 2018 90.174.2.116 peer info: IV_AUTO_SESS=1
Tue Jan 23 21:56:55 2018 90.174.2.116 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Tue Jan 23 21:56:55 2018 90.174.2.116 [pepe] Peer Connection Initiated with [AF_INET6]::ffff:90.174.2.116:53377
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 MULTI_sva: pool returned IPv4=10.8.0.6, IPv6=(Not enabled)
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 MULTI: Learn: 10.8.0.6 -> pepe/90.174.2.116
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 MULTI: primary virtual IP for pepe/90.174.2.116: 10.8.0.6
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 PUSH: Received control message: 'PUSH_REQUEST'
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 SENT CONTROL [pepe]: 'PUSH_REPLY,redirect-gateway local def1,dhcp-option DNS 208.67.222.222,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5,peer-id 0,cipher AES-256-GCM' (status=1)
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 23 21:56:55 2018 pepe/90.174.2.116 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 23 21:57:21 2018 pepe/90.174.2.116 SIGTERM[soft,remote-exit] received, client-instance exiting
Tue Jan 23 21:57:37 2018 C:\WINDOWS\system32\route.exe DELETE 10.8.0.0 MASK 255.255.255.0 10.8.0.2
Tue Jan 23 21:57:37 2018 Route deletion via service succeeded
Tue Jan 23 21:57:37 2018 Closing TUN/TAP interface
Tue Jan 23 21:57:37 2018 TAP: DHCP address released
Tue Jan 23 21:57:37 2018 SIGTERM[hard,] received, process exiting
Tue Jan 23 21:57:37 2018 MANAGEMENT: >STATE:1516741057,EXITING,SIGTERM,,,,,
Public Last updated: 2018-01-24 05:03:22 AM