freetz-devel-11197M
Freetz – Rudi(mentär)-Shell
Wiederholungsintervall ms Historie Download (.tar .gz )
Quelldatei
Zieldatei
Rudi-Edit
Sun Nov 30 13:56:56 2014 OpenVPN 2.2.2 mips-linux [SSL] [LZO2] [PF_INET6] [IPv6 payload 20110424-2 (2.2RC2)] built on Sep 29 2013
Sun Nov 30 13:56:56 2014 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Sun Nov 30 13:56:56 2014 Diffie-Hellman initialized with 1024 bit key
Sun Nov 30 13:56:56 2014 WARNING: file '/tmp/flash/openvpn/server_static.key' is group or others accessible
Sun Nov 30 13:56:56 2014 Control Channel Authentication: using '/tmp/flash/openvpn/server_static.key' as a OpenVPN static key file
Sun Nov 30 13:56:56 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 30 13:56:56 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 30 13:56:56 2014 TLS-Auth MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sun Nov 30 13:56:56 2014 Socket Buffers: R=[204800->131072] S=[204800->131072]
Sun Nov 30 13:56:56 2014 TUN/TAP device tap1 opened
Sun Nov 30 13:56:56 2014 TUN/TAP TX queue length set to 100
Sun Nov 30 13:56:56 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sun Nov 30 13:56:56 2014 /sbin/ifconfig tap1 10.10.0.1 netmask 255.255.255.0 mtu 1500 broadcast 10.10.0.255
Sun Nov 30 13:56:56 2014 /sbin/route add -net 192.168.178.0 netmask 255.255.255.0 gw 10.10.0.10
Sun Nov 30 13:56:56 2014 /sbin/route add -net 192.168.10.0 netmask 255.255.255.0 gw 10.10.0.11
Sun Nov 30 13:56:56 2014 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Sun Nov 30 13:56:56 2014 chroot to '/var/tmp/openvpn' and cd to '/' succeeded
Sun Nov 30 13:56:56 2014 GID set to openvpn
Sun Nov 30 13:56:56 2014 UID set to openvpn
Sun Nov 30 13:56:56 2014 UDPv4 link local (bound): [undef]
Sun Nov 30 13:56:56 2014 UDPv4 link remote: [undef]
Sun Nov 30 13:56:56 2014 MULTI: multi_init called, r=256 v=256
Sun Nov 30 13:56:56 2014 IFCONFIG POOL: base=10.10.0.100 size=101, ipv6=0
Sun Nov 30 13:56:56 2014 Initialization Sequence Completed
Sun Nov 30 13:58:57 2014 MULTI: multi_create_instance called
Sun Nov 30 13:58:57 2014 xx.xxx.xx.xx:49844 Re-using SSL/TLS context
Sun Nov 30 13:58:57 2014 xx.xxx.xx.xx:49844 LZO compression initialized
Sun Nov 30 13:58:57 2014 xx.xxx.xx.xx:49844 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sun Nov 30 13:58:57 2014 xx.xxx.xx.xx:49844 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Sun Nov 30 13:58:57 2014 xx.xxx.xx.xx:49844 TLS: Initial packet from [AF_INET]xx.xxx.xx.xx:49844, sid=05624625 393aa13c
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=OpenVPN/CN=tc_querfurt/[email protected]
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 VERIFY OK: depth=0, /C=US/ST=CA/O=OpenVPN/CN=vpnclient03/[email protected]
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:49844 [vpnclient03] Peer Connection Initiated with [AF_INET]84.175.18.49:49844
Sun Nov 30 13:58:58 2014 vpnclient03/xx.xxx.xx.xx:49844 MULTI_sva: pool returned IPv4=10.10.0.100, IPv6=2acf:b470::47:2a38:47:29b0
Sun Nov 30 13:58:58 2014 MULTI: multi_create_instance called
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:2052 Re-using SSL/TLS context
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:2052 LZO compression initialized
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:2052 Control Channel MTU parms [ L:1590 D:166 EF:66 EB:0 ET:0 EL:0 ]
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:2052 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ]
Sun Nov 30 13:58:58 2014 xx.xxx.xx.xx:2052 TLS: Initial packet from [AF_INET]xx.xxx.xx.xx:2052, sid=649434a9 04c0fe16
Sun Nov 30 13:58:59 2014 vpnclient03/xx.xxx.xx.xx:49844 MULTI: Learn: 00:ff:93:9c:c0:d0 -> vpnclient03/xx.xxx.xx.xx:49844
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=OpenVPN/CN=tc_querfurt/[email protected]
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 VERIFY OK: depth=0, /C=US/ST=CA/O=OpenVPN/CN=vpnclient02/[email protected]
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Sun Nov 30 13:59:00 2014 xx.xxx.xx.xx:2052 [vpnclient02] Peer Connection Initiated with [AF_INET]xx.xxx.xx.xx:2052
Sun Nov 30 13:59:00 2014 vpnclient02/xx.xxx.xx.xx:2052 OPTIONS IMPORT: reading client specific options from: clients_openvpn_server/vpnclient02
Sun Nov 30 13:59:01 2014 vpnclient03/xx.xxx.xx.xx:49844 PUSH: Received control message: 'PUSH_REQUEST'
Sun Nov 30 13:59:01 2014 vpnclient03/xx.xxx.xx.xx:49844 send_push_reply(): safe_cap=960
Sun Nov 30 13:59:01 2014 vpnclient03/xx.xxx.xx.xx:49844 SENT CONTROL [vpnclient03]: 'PUSH_REPLY,route-gateway 10.10.0.1,route 192.168.11.0 255.255.255.0,route 10.10.0.0 255.255.255.0,ping 10,ping-restart 120,ifconfig 10.10.0.100 255.255.255.0' (status=1)
Sun Nov 30 13:59:02 2014 vpnclient02/xx.xxx.xx.xx:2052 PUSH: Received control message: 'PUSH_REQUEST'
Sun Nov 30 13:59:02 2014 vpnclient02/xx.xxx.xx.xx:2052 send_push_reply(): safe_cap=960
Sun Nov 30 13:59:02 2014 vpnclient02/xx.xxx.xx.xx:2052 SENT CONTROL [vpnclient02]: 'PUSH_REPLY,route-gateway 10.10.0.1,route 192.168.11.0 255.255.255.0,route 10.10.0.0 255.255.255.0,ping 10,ping-restart 120,route 192.168.10.0 255.255.255.0 10.10.0.11,ifconfig 10.10.0.10 255.255.255.0' (status=1)
Sun Nov 30 14:00:29 2014 vpnclient02/xx.xxx.xx.xx:2052 MULTI: Learn: c6:2a:fb:9a:4e:7c -> vpnclient02/xx.xxx.xx.xx:2052
30.11.2014 13:59 – up 14 days, 1:22 – optimiert für Mozilla Firefox