Tue Oct 02 23:00:09 2012 OpenVPN 2.2.2 Win32-MSVC++ [SSL] [LZO2] [PKCS11] built on Dec 15 2011 Tue Oct 02 23:00:09 2012 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Tue Oct 02 23:00:09 2012 LZO compression initialized Tue Oct 02 23:00:09 2012 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ] Tue Oct 02 23:00:09 2012 Socket Buffers: R=[8192->8192] S=[8192->8192] Tue Oct 02 23:00:10 2012 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ] Tue Oct 02 23:00:10 2012 Local Options hash (VER=V4): 'd79ca330' Tue Oct 02 23:00:10 2012 Expected Remote Options hash (VER=V4): 'f7df56b8' Tue Oct 02 23:00:10 2012 UDPv4 link local: [undef] Tue Oct 02 23:00:10 2012 UDPv4 link remote: 91.56.163.143:1194 Tue Oct 02 23:00:10 2012 TLS: Initial packet from 91.56.163.143:1194, sid=1bb0cfb9 c516995b Tue Oct 02 23:00:10 2012 VERIFY OK: depth=1, /C=DE/ST=NRW/L=Eudahausen/O=EudaVPN/CN=EudaVPN_CA/emailAddress=mrshadowtux@googlemail.com Tue Oct 02 23:00:10 2012 VERIFY OK: nsCertType=SERVER Tue Oct 02 23:00:10 2012 Validating certificate key usage Tue Oct 02 23:00:10 2012 ++ Certificate has key usage 00a0, expects 00a0 Tue Oct 02 23:00:10 2012 VERIFY KU OK Tue Oct 02 23:00:10 2012 Validating certificate extended key usage Tue Oct 02 23:00:10 2012 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Tue Oct 02 23:00:10 2012 VERIFY EKU OK Tue Oct 02 23:00:10 2012 VERIFY OK: depth=0, /C=DE/ST=NRW/L=Eudahausen/O=EudaVPN/CN=stuart.shadowtux.tk/emailAddress=mrshadowtux@googlemail.com Tue Oct 02 23:00:10 2012 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Tue Oct 02 23:00:10 2012 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Oct 02 23:00:10 2012 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Tue Oct 02 23:00:10 2012 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Tue Oct 02 23:00:10 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Tue Oct 02 23:00:10 2012 [stuart.shadowtux.tk] Peer Connection Initiated with 91.56.163.143:1194 Tue Oct 02 23:00:13 2012 SENT CONTROL [stuart.shadowtux.tk]: 'PUSH_REQUEST' (status=1) Tue Oct 02 23:00:13 2012 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.23.1.1,route-gateway 10.23.1.1,ping 10,ping-restart 120,ifconfig 10.23.5.16 255.255.0.0' Tue Oct 02 23:00:13 2012 OPTIONS IMPORT: timers and/or timeouts modified Tue Oct 02 23:00:13 2012 OPTIONS IMPORT: --ifconfig/up options modified Tue Oct 02 23:00:13 2012 OPTIONS IMPORT: route-related options modified Tue Oct 02 23:00:13 2012 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Tue Oct 02 23:00:13 2012 TAP-WIN32 device [LAN-Verbindung 2] opened: \\.\Global\{3DB04F44-C2E5-4A99-862F-502B829E6069}.tap Tue Oct 02 23:00:13 2012 TAP-Win32 Driver Version 9.9 Tue Oct 02 23:00:13 2012 TAP-Win32 MTU=1500 Tue Oct 02 23:00:13 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 10.23.5.16/255.255.0.0 on interface {3DB04F44-C2E5-4A99-862F-502B829E6069} [DHCP-serv: 10.23.0.0, lease-time: 31536000] Tue Oct 02 23:00:13 2012 Successful ARP Flush on interface [65540] {3DB04F44-C2E5-4A99-862F-502B829E6069} Tue Oct 02 23:00:18 2012 TEST ROUTES: 0/0 succeeded len=-1 ret=1 a=0 u/d=up Tue Oct 02 23:00:18 2012 Initialization Sequence Completed