Mon Apr 23 16:07:43 2018 OpenV*P*N 2.4.5 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar  1 2018

Mon Apr 23 16:07:43 2018 Windows version 6.1 (Windows 7) 64bit

Mon Apr 23 16:07:43 2018 library versions: OpenSSL 1.1.0f  25 May 2017, LZO 2.10

Enter Management Password:

Mon Apr 23 16:07:43 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341

Mon Apr 23 16:07:43 2018 Need hold release from management interface, waiting...

Mon Apr 23 16:07:44 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'state on'

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'log all on'

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'echo all on'

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'bytecount 5'

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'hold off'

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'hold release'

Mon Apr 23 16:07:44 2018 MANAGEMENT: CMD 'password [...]'

Mon Apr 23 16:07:44 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this

Mon Apr 23 16:07:44 2018 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

Mon Apr 23 16:07:44 2018 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

Mon Apr 23 16:07:44 2018 MANAGEMENT: >STATE:1524470864,RESOLVE,,,,,,

Mon Apr 23 16:07:44 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]123.8.218.45:1194

Mon Apr 23 16:07:44 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]

Mon Apr 23 16:07:44 2018 UDP link local: (not bound)

Mon Apr 23 16:07:44 2018 UDP link remote: [AF_INET]123.8.218.45:1194

Mon Apr 23 16:07:44 2018 MANAGEMENT: >STATE:1524470864,WAIT,,,,,,

Mon Apr 23 16:07:44 2018 MANAGEMENT: >STATE:1524470864,AUTH,,,,,,

Mon Apr 23 16:07:44 2018 TLS: Initial packet from [AF_INET]192.168.1.1:1194, sid=e83cc83f 27275027

Mon Apr 23 16:07:44 2018 VERIFY OK: depth=1, CN=changjian

Mon Apr 23 16:07:44 2018 VERIFY KU OK

Mon Apr 23 16:07:44 2018 Validating certificate extended key usage

Mon Apr 23 16:07:44 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

Mon Apr 23 16:07:44 2018 VERIFY EKU OK

Mon Apr 23 16:07:44 2018 VERIFY OK: depth=0, CN=server

Mon Apr 23 16:07:44 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA

Mon Apr 23 16:07:44 2018 [server] Peer Connection Initiated with [AF_INET]192.168.1.1:1194

Mon Apr 23 16:07:45 2018 MANAGEMENT: >STATE:1524470865,GET_CONFIG,,,,,,

Mon Apr 23 16:07:45 2018 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

Mon Apr 23 16:07:45 2018 PUSH: Received control message: 'PUSH_REPLY,route 192.168.1.0 255.255.255.0,dhcp-option DNS 8.8.8.8,route 10.9.0.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 10.9.0.6 10.9.0.5,peer-id 0,cipher AES-256-GCM'

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: timers and/or timeouts modified

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: --ifconfig/up options modified

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: route options modified

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: peer-id set

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: adjusting link_mtu to 1625

Mon Apr 23 16:07:45 2018 OPTIONS IMPORT: data channel crypto options modified

Mon Apr 23 16:07:45 2018 Data Channel: using negotiated cipher 'AES-256-GCM'

Mon Apr 23 16:07:45 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

Mon Apr 23 16:07:45 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key

Mon Apr 23 16:07:45 2018 interactive service msg_channel=0

Mon Apr 23 16:07:45 2018 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=18 HWADDR=34:13:e8:28:7d:0a

Mon Apr 23 16:07:45 2018 open_tun

Mon Apr 23 16:07:45 2018 TAP-WIN32 device [本地连接 2] opened: \\.\Global\{96D61DFF-7EE2-4A6F-8CCB-C8018D5DB869}.tap

Mon Apr 23 16:07:45 2018 TAP-Windows Driver Version 9.21

Mon Apr 23 16:07:45 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.9.0.6/255.255.255.252 on interface {96D61DFF-7EE2-4A6F-8CCB-C8018D5DB869} [DHCP-serv: 10.9.0.5, lease-time: 31536000]

Mon Apr 23 16:07:45 2018 Successful ARP Flush on interface [17] {96D61DFF-7EE2-4A6F-8CCB-C8018D5DB869}

Mon Apr 23 16:07:45 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0

Mon Apr 23 16:07:45 2018 MANAGEMENT: >STATE:1524470865,ASSIGN_IP,,10.9.0.6,,,,

Mon Apr 23 16:07:50 2018 TEST ROUTES: 2/2 succeeded len=2 ret=1 a=0 u/d=up

Mon Apr 23 16:07:50 2018 MANAGEMENT: >STATE:1524470870,ADD_ROUTES,,,,,,

Mon Apr 23 16:07:50 2018 C:\Windows\system32\route.exe ADD 192.168.1.0 MASK 255.255.255.0 10.9.0.5

Mon Apr 23 16:07:50 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

Mon Apr 23 16:07:50 2018 Route addition via IPAPI succeeded [adaptive]

Mon Apr 23 16:07:50 2018 C:\Windows\system32\route.exe ADD 10.9.0.0 MASK 255.255.255.0 10.9.0.5

Mon Apr 23 16:07:50 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

Mon Apr 23 16:07:50 2018 Route addition via IPAPI succeeded [adaptive]

Mon Apr 23 16:07:50 2018 Initialization Sequence Completed

Mon Apr 23 16:07:50 2018 MANAGEMENT: >STATE:1524470870,CONNECTED,SUCCESS,10.9.0.6,192.168.1.1,1194,,

Logo

魔乐社区(Modelers.cn) 是一个中立、公益的人工智能社区,提供人工智能工具、模型、数据的托管、展示与应用协同服务,为人工智能开发及爱好者搭建开放的学习交流平台。社区通过理事会方式运作,由全产业链共同建设、共同运营、共同享有,推动国产AI生态繁荣发展。

更多推荐