Go to:
Gentoo Home
Documentation
Forums
Lists
Bugs
Planet
Store
Wiki
Get Gentoo!
Gentoo's Bugzilla – Attachment 214497 Details for
Bug 298811
net-misc/openvpn-2.1.0: after upgrading, any communications over vpn does not works
Home
|
New
–
[Ex]
|
Browse
|
Search
|
Privacy Policy
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
messages in /var/log/messages on server for version 2.1-rc21
server-2.1-rc21.log (text/plain), 4.07 KB, created by
tot-to
on 2009-12-29 00:39:45 UTC
(
hide
)
Description:
messages in /var/log/messages on server for version 2.1-rc21
Filename:
MIME Type:
Creator:
tot-to
Created:
2009-12-29 00:39:45 UTC
Size:
4.07 KB
patch
obsolete
>Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: OpenVPN 2.1_rc21 i686-pc-linux-gnu [SSL] [LZO2] [EPOLL] built on Dec 29 2009 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: Diffie-Hellman initialized with 1024 bit key >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: TLS-Auth MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ] >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: TUN/TAP device tap0 opened >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: TUN/TAP TX queue length set to 100 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: /sbin/ifconfig tap0 172.18.0.1 netmask 255.255.255.0 mtu 1500 broadcast 172.18.0.255 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8516]: Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ] >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: GID set to openvpn >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: UID set to openvpn >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: Socket Buffers: R=[108544->131072] S=[108544->131072] >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: UDPv4 link local (bound): [undef]:23 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: UDPv4 link remote: [undef] >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: MULTI: multi_init called, r=256 v=256 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: IFCONFIG POOL: base=172.18.0.2 size=253 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: IFCONFIG POOL LIST >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: integer-double,172.18.0.2 >Dec 29 06:30:29 ofme-ckp42-1 openvpn[8520]: Initialization Sequence Completed >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: MULTI: multi_create_instance called >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Re-using SSL/TLS context >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 LZO compression initialized >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Control Channel MTU parms [ L:1574 D:138 EF:38 EB:0 ET:0 EL:0 ] >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Data Channel MTU parms [ L:1574 D:1450 EF:42 EB:135 ET:32 EL:0 AF:3/1 ] >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Local Options hash (VER=V4): 'f7df56b8' >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Expected Remote Options hash (VER=V4): 'd79ca330' >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 TLS: Initial packet from 212.192.251.30:54431, sid=c2f37b8b cc636ab2 >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 VERIFY OK: depth=1, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=Fort-Funston_CA/emailAddress=me@myhost.mydomain >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 VERIFY OK: depth=0, /C=US/ST=CA/L=SanFrancisco/O=Fort-Funston/CN=integer-double/emailAddress=me@myhost.mydomain >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA >Dec 29 06:32:12 ofme-ckp42-1 openvpn[8520]: 212.192.251.30:54431 [integer-double] Peer Connection Initiated with 212.192.251.30:54431 >Dec 29 06:32:15 ofme-ckp42-1 openvpn[8520]: integer-double/212.192.251.30:54431 PUSH: Received control message: 'PUSH_REQUEST' >Dec 29 06:32:15 ofme-ckp42-1 openvpn[8520]: integer-double/212.192.251.30:54431 SENT CONTROL [integer-double]: 'PUSH_REPLY,route-gateway 172.18.0.1,ping 10,ping-restart 120,ifconfig 172.18.0.2 255.255.255.0' (status=1) >Dec 29 06:32:15 ofme-ckp42-1 openvpn[8520]: integer-double/212.192.251.30:54431 MULTI: Learn: aa:b5:03:14:25:5a -> integer-double/212.192.251.30:54431
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 298811
:
214494
|
214495
| 214497 |
214499
|
214500