You are on page 1of 2

Fri Jun 02 03:40:05 2017 NMDVPN 2.1.

4 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built


on Apr 25 2011
Fri Jun 02 03:40:05 2017 WARNING: No server certificate verification method has
been enabled. See http://openvpn.net/howto.html#mitm for more info.
Fri Jun 02 03:40:05 2017 NOTE: the current --script-security setting may allow this
configuration to call user-defined scripts
Fri Jun 02 03:40:05 2017 LZO compression initialized
Fri Jun 02 03:40:05 2017 Control Channel MTU parms [ L:1576 D:140 EF:40 EB:0 ET:0
EL:0 ]
Fri Jun 02 03:40:05 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
Fri Jun 02 03:40:05 2017 Data Channel MTU parms [ L:1576 D:1450 EF:44 EB:135 ET:32
EL:0 AF:3/1 ]
Fri Jun 02 03:40:05 2017 Local Options hash (VER=V4): '2547efd2'
Fri Jun 02 03:40:05 2017 Expected Remote Options hash (VER=V4): '77cf0943'
Fri Jun 02 03:40:05 2017 Attempting to establish TCP connection with 127.0.0.1:8080
Fri Jun 02 03:40:06 2017 TCP connection established with 127.0.0.1:8080
Fri Jun 02 03:40:06 2017 Send to HTTP proxy: 'CONNECT 139.59.107.248:443 HTTP/1.0'
Fri Jun 02 03:40:06 2017 HTTP proxy returned: 'HTTP/1.1 200 Connection established'
Fri Jun 02 03:40:08 2017 TCPv4_CLIENT link local: [undef]
Fri Jun 02 03:40:08 2017 TCPv4_CLIENT link remote: 127.0.0.1:8080
Fri Jun 02 03:40:08 2017 TLS: Initial packet from 127.0.0.1:8080, sid=e1bf5ff8
0b7e4f86
Fri Jun 02 03:40:08 2017 WARNING: this configuration may cache passwords in memory
-- use the auth-nocache option to prevent this
Fri Jun 02 03:40:10 2017 VERIFY OK: depth=1,
/C=PH/ST=NCR/L=Manila/O=Evil_Corporation/OU=10_Unit_2_Blk._5_Evil-
Corp__Tondo__Manila/CN=Evil_Corporation_CA/name=server/emailAddress=root@evil.in
Fri Jun 02 03:40:10 2017 VERIFY OK: depth=0,
/C=PH/ST=NCR/L=Manila/O=Evil_Corporation/OU=10_Unit_2_Blk._5_Evil-
Corp__Tondo__Manila/CN=server/name=server/emailAddress=root@evil.in
Fri Jun 02 03:40:12 2017 WARNING: 'link-mtu' is used inconsistently, local='link-
mtu 1576', remote='link-mtu 1544'
Fri Jun 02 03:40:12 2017 WARNING: 'tun-mtu' is used inconsistently, local='tun-mtu
1532', remote='tun-mtu 1500'
Fri Jun 02 03:40:12 2017 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128
bit key
Fri Jun 02 03:40:12 2017 Data Channel Encrypt: Using 160 bit message hash 'SHA1'
for HMAC authentication
Fri Jun 02 03:40:12 2017 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128
bit key
Fri Jun 02 03:40:12 2017 NOTE: --mute triggered...
Fri Jun 02 03:40:12 2017 2 variation(s) on previous 3 message(s) suppressed by
--mute
Fri Jun 02 03:40:12 2017 [server] Peer Connection Initiated with 127.0.0.1:8080
Fri Jun 02 03:40:14 2017 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Fri Jun 02 03:40:15 2017 PUSH: Received control message: 'PUSH_REPLY,sndbuf
393216,rcvbuf 393216,persist-key,persist-tun,redirect-gateway def1 bypass-
dhcp,dhcp-option DNS 8.8.4.4,dhcp-option DNS 8.8.8.8,route 10.8.0.0
255.255.0.0,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.226 10.8.0.225'
Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: timers and/or timeouts modified
Fri Jun 02 03:40:15 2017 NOTE: --mute triggered...
Fri Jun 02 03:40:15 2017 1 variation(s) on previous 3 message(s) suppressed by
--mute
Fri Jun 02 03:40:15 2017 Socket Buffers: R=[65536->393216] S=[65536->393216]
Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: --persist options modified
Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: --ifconfig/up options modified
Fri Jun 02 03:40:15 2017 OPTIONS IMPORT: route options modified
Fri Jun 02 03:40:15 2017 NOTE: --mute triggered...
Fri Jun 02 03:40:15 2017 1 variation(s) on previous 3 message(s) suppressed by
--mute
Fri Jun 02 03:40:15 2017 ROUTE default_gateway=192.168.8.1
Fri Jun 02 03:40:15 2017 TAP-WIN32 device [Local Area Connection] opened:
\\.\Global\{41B753B9-682B-4FCD-9906-3CA8E28909EF}.tap
Fri Jun 02 03:40:15 2017 TAP-Win32 Driver Version 9.9
Fri Jun 02 03:40:15 2017 TAP-Win32 MTU=1500
Fri Jun 02 03:40:15 2017 Notified TAP-Win32 driver to set a DHCP IP/netmask of
10.8.0.226/255.255.255.252 on interface {41B753B9-682B-4FCD-9906-3CA8E28909EF}
[DHCP-serv: 10.8.0.225, lease-time: 31536000]
Fri Jun 02 03:40:15 2017 Successful ARP Flush on interface [9] {41B753B9-682B-4FCD-
9906-3CA8E28909EF}
Fri Jun 02 03:40:17 2017 TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up
Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK
255.255.255.255 192.168.8.1
Fri Jun 02 03:40:17 2017 ROUTE: route addition failed using CreateIpForwardEntry:
The object already exists. [status=5010 if_index=3]
Fri Jun 02 03:40:17 2017 Route addition via IPAPI failed [adaptive]
Fri Jun 02 03:40:17 2017 Route addition fallback to route.exe
The route addition failed: The object already exists.

Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0


10.8.0.225
Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with
dwForwardMetric1=30 and dwForwardType=4
Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive]
Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0
10.8.0.225
Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with
dwForwardMetric1=30 and dwForwardType=4
Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive]
Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 139.59.107.248 MASK
255.255.255.255 192.168.8.1
Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with
dwForwardMetric1=20 and dwForwardType=4
Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive]
Fri Jun 02 03:40:17 2017 C:\WINDOWS\system32\route.exe ADD 10.8.0.0 MASK
255.255.0.0 10.8.0.225
Fri Jun 02 03:40:17 2017 ROUTE: CreateIpForwardEntry succeeded with
dwForwardMetric1=30 and dwForwardType=4
Fri Jun 02 03:40:17 2017 Route addition via IPAPI succeeded [adaptive]
Fri Jun 02 03:40:17 2017 Initialization Sequence Completed

You might also like