on Apr 25 2011 Fri Jun 02 03:40:05 2017 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Fri Jun 02 03:40:05 2017 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Fri Jun 02 03:40:05 2017 LZO compression initialized Fri Jun 02 03:40:05 2017 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0 EL:0 ] Fri Jun 02 03:40:05 2017 Socket Buffers: R=[65536->65536] S=[65536->65536] Fri Jun 02 03:40:05 2017 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32 EL:0 AF:3/1 ] Fri Jun 02 03:40:05 2017 Local Options hash (VER=V4): '2547efd2' Fri Jun 02 03:40:05 2017 Expected Remote Options hash (VER=V4): '77cf0943' Fri Jun 02 03:40:05 2017 Attempting to establish TCP connection with 127.0.0.1:8080 Fri Jun 02 03:40:06 2017 TCP connection established with 127.0.0.1:8080 Fri Jun 02 03:40:06 2017 Send to HTTP proxy: 'CONNECT 139.59.107.248:443 HTTP/1.0' Fri Jun 02 03:40:06 2017 HTTP proxy returned: 'HTTP/1.1 200 Connection established' Fri Jun 02 03:40:08 2017 TCPv4_CLIENT link local: [undef] Fri Jun 02 03:40:08 2017 TCPv4_CLIENT link remote: 127.0.0.1:8080 Fri Jun 02 03:40:08 2017 TLS: Initial packet from 127.0.0.1:8080, sid=e1bf5ff8 0b7e4f86 Fri Jun 02 03:40:08 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Fri Jun 02 03:40:10 2017 VERIFY OK: depth=1, /C=PH/ST=NCR/L=Manila/O=Evil_Corporation/OU=10_Unit_2_Blk._5_Evil- Corp__Tondo__Manila/CN=Evil_Corporation_CA/name=server/emailAddress=root@evil.in Fri Jun 02 03:40:10 2017 VERIFY OK: depth=0, /C=PH/ST=NCR/L=Manila/O=Evil_Corporation/OU=10_Unit_2_Blk._5_Evil- Corp__Tondo__Manila/CN=server/name=server/emailAddress=root@evil.in Fri Jun 02 03:40:12 2017 WARNING: 'link-mtu' is used inconsistently, local='link- mtu 1576', remote='link-mtu 1544' Fri Jun 02 03:40:12 2017 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu 1532', remote='tun-mtu 1500' Fri Jun 02 03:40:12 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Fri Jun 02 03:40:12 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Fri Jun 02 03:40:12 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Fri Jun 02 03:40:12 2017 NOTE: --mute triggered... Fri Jun 02 03:40:12 2017 2 variation(s) on previous 3 message(s) suppressed by --mute Fri Jun 02 03:40:12 2017 [server] Peer Connection Initiated with 127.0.0.1:8080 Fri Jun 02 03:40:14 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Fri Jun 02 03:40:15 2017 PUSH: Received control message: 'PUSH_REPLY,sndbuf 393216,rcvbuf 393216,persist-key,persist-tun,redirect-gateway def1 bypass- dhcp,dhcp-option DNS 8.8.4.4,dhcp-option DNS 8.8.8.8,route 10.8.0.0 255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.226 10.8.0.225' Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: timers and/or timeouts modified Fri Jun 02 03:40:15 2017 NOTE: --mute triggered... Fri Jun 02 03:40:15 2017 1 variation(s) on previous 3 message(s) suppressed by --mute Fri Jun 02 03:40:15 2017 Socket Buffers: R=[65536->393216] S=[65536->393216] Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: --persist options modified Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: --ifconfig/up options modified Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: route options modified Fri Jun 02 03:40:15 2017 NOTE: --mute triggered... Fri Jun 02 03:40:15 2017 1 variation(s) on previous 3 message(s) suppressed by --mute Fri Jun 02 03:40:15 2017 ROUTE default_gateway=192.168.8.1 Fri Jun 02 03:40:15 2017 TAP-WIN32 device [Local Area Connection] opened: \\.\Global\{41B753B9-682B-4FCD-9906-3CA8E28909EF}.tap Fri Jun 02 03:40:15 2017 TAP-Win32 Driver Version 9.9 Fri Jun 02 03:40:15 2017 TAP-Win32 MTU=1500 Fri Jun 02 03:40:15 2017 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.8.0.226/255.255.255.252 on interface {41B753B9-682B-4FCD-9906-3CA8E28909EF} [DHCP-serv: 10.8.0.225, lease-time: 31536000] Fri Jun 02 03:40:15 2017 Successful ARP Flush on interface [9] {41B753B9-682B-4FCD- 9906-3CA8E28909EF} Fri Jun 02 03:40:17 2017 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.8.1 Fri Jun 02 03:40:17 2017 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=3] Fri Jun 02 03:40:17 2017 Route addition via IPAPI failed [adaptive] Fri Jun 02 03:40:17 2017 Route addition fallback to route.exe The route addition failed: The object already exists.
Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0
10.8.0.225 Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive] Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.225 Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive] Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 139.59.107.248 MASK 255.255.255.255 192.168.8.1 Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4 Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive] Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK 255.255.0.0 10.8.0.225 Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4 Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive] Fri Jun 02 03:40:17 2017 Initialization Sequence Completed