# OpenVPN 2.1 Config, Mon Mar 29 18:09:59 CEST 2010 proto udp dev tap0 ca /tmp/flash/ca.crt cert /tmp/flash/box.crt key /tmp/flash/box.key dh /tmp/flash/dh.pem tls-server port 443 mode server ifconfig-pool 192.168.179.10 192.168.179.20 push "route 192.168.179.0 " ifconfig 192.168.179.0 255.255.255.0 push "route-gateway 192.168.179.0" max-clients 10 tun-mtu 1500 mssfix verb 3 daemon cipher AES-256-CBC comp-lzo keepalive 10 120
Mon Mar 29 18:17:18 2010 OpenVPN 2.1_rc20 arm-unknown-linux-gnueabi [SSL] [LZO2] [EPOLL] [MH] [PF_INET6] built on Nov 29 2009 Mon Mar 29 18:17:18 2010 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. Mon Mar 29 18:17:18 2010 NOTE: OpenVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables Mon Mar 29 18:17:18 2010 WARNING: file '/home/user/MyDocs/client01.key' is group or others accessible Mon Mar 29 18:17:18 2010 /usr/bin/openssl-vulnkey -q -b 1024 -m <modulus omitted> Mon Mar 29 18:17:18 2010 ******* WARNING *******: '/home/user/MyDocs/client01.key' cannot be verified as a non-vulnerable key. See 'man openssl-vulnkey' for details. Mon Mar 29 18:17:18 2010 LZO compression initialized Mon Mar 29 18:17:18 2010 Control Channel MTU parms [ L:1590 D:138 EF:38 EB:0 ET:0 EL:0 ] Mon Mar 29 18:17:18 2010 Data Channel MTU parms [ L:1590 D:1450 EF:58 EB:135 ET:32 EL:0 AF:3/1 ] Mon Mar 29 18:17:18 2010 Local Options hash (VER=V4): 'c6c7c21a' Mon Mar 29 18:17:18 2010 Expected Remote Options hash (VER=V4): '1a6d5c5d' Mon Mar 29 18:17:18 2010 Socket Buffers: R=[65536->131072] S=[16384->131072] Mon Mar 29 18:17:18 2010 UDPv4 link local: [undef] Mon Mar 29 18:17:18 2010 UDPv4 link remote: [AF_INET]85.177.145.128:443 Mon Mar 29 18:17:18 2010 TLS: Initial packet from [AF_INET]85.177.145.128:443, sid=2bef8764 02f530d7 Mon Mar 29 18:17:19 2010 VERIFY OK: depth=1, /C=DE/ST=Hamburg/L=Hamburg/O=Fort-Funston/CN=Fort-Funston_CA/emailAddress=me@myhost.mydomain Mon Mar 29 18:17:19 2010 VERIFY OK: depth=0, /C=DE/ST=CA/L=Hamburg/O=Fort-Funston/CN=fritzbox/emailAddress=me@myhost.mydomain Mon Mar 29 18:17:20 2010 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Mar 29 18:17:20 2010 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Mar 29 18:17:20 2010 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key Mon Mar 29 18:17:20 2010 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Mon Mar 29 18:17:20 2010 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA Mon Mar 29 18:17:20 2010 [fritzbox] Peer Connection Initiated with [AF_INET]85.177.145.128:443 Mon Mar 29 18:17:22 2010 SENT CONTROL [fritzbox]: 'PUSH_REQUEST' (status=1) Mon Mar 29 18:17:23 2010 PUSH: Received control message: 'PUSH_REPLY,route 192.168.179.0 ,route-gateway 192.168.179.0,ping 10,ping-restart 120,ifconfig 192.168.179.10 255.255.255.0' Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: timers and/or timeouts modified Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: --ifconfig/up options modified Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: route options modified Mon Mar 29 18:17:23 2010 OPTIONS IMPORT: route-related options modified Mon Mar 29 18:17:23 2010 ROUTE default_gateway=192.168.178.1 Mon Mar 29 18:17:23 2010 TUN/TAP device tap0 opened Mon Mar 29 18:17:23 2010 TUN/TAP TX queue length set to 100 Mon Mar 29 18:17:23 2010 /sbin/ifconfig tap0 192.168.179.10 netmask 255.255.255.0 mtu 1500 broadcast 192.168.179.255 Mon Mar 29 18:17:23 2010 OpenVPN ROUTE: omitted no-op route: 192.168.179.0/255.255.255.255 -> 192.168.179.0 Mon Mar 29 18:17:23 2010 Initialization Sequence Completed
tap0 Link encap:Ethernet HWaddr XX:XX:XX:XX:XX:XX inet addr:192.168.179.10 Bcast:192.168.179.255 Mask:255.255.255.0 UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:386 errors:0 dropped:0 overruns:0 frame:0 TX packets:9 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:100 RX bytes:20180 (19.7 KiB) TX bytes:1341 (1.3 KiB)