Skip to content

Instantly share code, notes, and snippets.

@that0n3guy
Created March 24, 2014 18:53
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save that0n3guy/9746673 to your computer and use it in GitHub Desktop.
Save that0n3guy/9746673 to your computer and use it in GitHub Desktop.
openvpn no internet Nyr script
Mon Mar 24 13:43:38 2014 OpenVPN 2.3.2 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [eurephia] [IPv6] built on Aug 22 2013
Enter Management Password:
Mon Mar 24 13:43:38 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Mon Mar 24 13:43:38 2014 Need hold release from management interface, waiting...
Mon Mar 24 13:43:38 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Mon Mar 24 13:43:38 2014 MANAGEMENT: CMD 'state on'
Mon Mar 24 13:43:38 2014 MANAGEMENT: CMD 'log all on'
Mon Mar 24 13:43:38 2014 MANAGEMENT: CMD 'hold off'
Mon Mar 24 13:43:38 2014 MANAGEMENT: CMD 'hold release'
Mon Mar 24 13:43:39 2014 Socket Buffers: R=[8192->8192] S=[8192->8192]
Mon Mar 24 13:43:39 2014 MANAGEMENT: >STATE:1395686619,RESOLVE,,,
Mon Mar 24 13:43:39 2014 UDPv4 link local: [undef]
Mon Mar 24 13:43:39 2014 UDPv4 link remote: [AF_INET]72.196.3.30:1194
Mon Mar 24 13:43:39 2014 MANAGEMENT: >STATE:1395686619,WAIT,,,
Mon Mar 24 13:43:39 2014 MANAGEMENT: >STATE:1395686619,AUTH,,,
Mon Mar 24 13:43:39 2014 TLS: Initial packet from [AF_INET]72.196.3.30:1194, sid=d4d66af7 547b5b86
Mon Mar 24 13:43:39 2014 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, CN=Fort-Funston CA, emailAddress=me@myhost.mydomain
Mon Mar 24 13:43:39 2014 VERIFY OK: nsCertType=SERVER
Mon Mar 24 13:43:39 2014 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=Fort-Funston, CN=server, emailAddress=me@myhost.mydomain
Mon Mar 24 13:43:39 2014 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Mar 24 13:43:39 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Mar 24 13:43:39 2014 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Mon Mar 24 13:43:39 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Mar 24 13:43:39 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA
Mon Mar 24 13:43:39 2014 [server] Peer Connection Initiated with [AF_INET]72.196.3.30:1194
Mon Mar 24 13:43:40 2014 MANAGEMENT: >STATE:1395686620,GET_CONFIG,,,
Mon Mar 24 13:43:42 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Mar 24 13:43:42 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 129.250.35.250,dhcp-option DNS 74.82.42.42,route 10.8.0.1,topology net30,ping 10,ping-restart 120,ifconfig 10.8.0.6 10.8.0.5'
Mon Mar 24 13:43:42 2014 OPTIONS IMPORT: timers and/or timeouts modified
Mon Mar 24 13:43:42 2014 OPTIONS IMPORT: --ifconfig/up options modified
Mon Mar 24 13:43:42 2014 OPTIONS IMPORT: route options modified
Mon Mar 24 13:43:42 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Mar 24 13:43:42 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Mar 24 13:43:42 2014 MANAGEMENT: >STATE:1395686622,ASSIGN_IP,,10.8.0.6,
Mon Mar 24 13:43:42 2014 open_tun, tt->ipv6=0
Mon Mar 24 13:43:42 2014 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{8183CA6A-FAF5-4FDA-B773-D8264717FD82}.tap
Mon Mar 24 13:43:42 2014 TAP-Windows Driver Version 9.9
Mon Mar 24 13:43:42 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.6/255.255.255.252 on interface {8183CA6A-FAF5-4FDA-B773-D8264717FD82} [DHCP-serv: 10.8.0.5, lease-time: 31536000]
Mon Mar 24 13:43:42 2014 Successful ARP Flush on interface [31] {8183CA6A-FAF5-4FDA-B773-D8264717FD82}
Mon Mar 24 13:43:47 2014 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
Mon Mar 24 13:43:47 2014 C:\Windows\system32\route.exe ADD 72.196.3.30 MASK 255.255.255.255 192.168.111.1
Mon Mar 24 13:43:47 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Mon Mar 24 13:43:47 2014 Route addition via IPAPI succeeded [adaptive]
Mon Mar 24 13:43:47 2014 C:\Windows\system32\route.exe ADD 192.168.111.1 MASK 255.255.255.255 192.168.111.1 IF 11
Mon Mar 24 13:43:47 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Mon Mar 24 13:43:47 2014 Route addition via IPAPI succeeded [adaptive]
Mon Mar 24 13:43:47 2014 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.5
Mon Mar 24 13:43:47 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Mar 24 13:43:47 2014 Route addition via IPAPI succeeded [adaptive]
Mon Mar 24 13:43:47 2014 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.5
Mon Mar 24 13:43:47 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Mar 24 13:43:47 2014 Route addition via IPAPI succeeded [adaptive]
Mon Mar 24 13:43:47 2014 MANAGEMENT: >STATE:1395686627,ADD_ROUTES,,,
Mon Mar 24 13:43:47 2014 C:\Windows\system32\route.exe ADD 10.8.0.1 MASK 255.255.255.255 10.8.0.5
Mon Mar 24 13:43:47 2014 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
Mon Mar 24 13:43:47 2014 Route addition via IPAPI succeeded [adaptive]
Mon Mar 24 13:43:47 2014 Initialization Sequence Completed
Mon Mar 24 13:43:47 2014 MANAGEMENT: >STATE:1395686627,CONNECTED,SUCCESS,10.8.0.6,72.196.3.30
Mon Mar 24 13:45:48 2014 C:\Windows\system32\route.exe DELETE 10.8.0.1 MASK 255.255.255.255 10.8.0.5
Mon Mar 24 13:45:48 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Mar 24 13:45:48 2014 C:\Windows\system32\route.exe DELETE 72.196.3.30 MASK 255.255.255.255 192.168.111.1
Mon Mar 24 13:45:48 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Mar 24 13:45:48 2014 C:\Windows\system32\route.exe DELETE 192.168.111.1 MASK 255.255.255.255 192.168.111.1
Mon Mar 24 13:45:48 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Mar 24 13:45:48 2014 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.8.0.5
Mon Mar 24 13:45:48 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Mar 24 13:45:48 2014 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.8.0.5
Mon Mar 24 13:45:48 2014 Route deletion via IPAPI succeeded [adaptive]
Mon Mar 24 13:45:48 2014 Closing TUN/TAP interface
Mon Mar 24 13:45:48 2014 SIGTERM[hard,] received, process exiting
Mon Mar 24 13:45:48 2014 MANAGEMENT: >STATE:1395686748,EXITING,SIGTERM,,
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment