keyliaran keyliaran-desktop Downloads sudo openvpn config client-garda

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
keyliaran@keyliaran-desktop:~/Downloads$ sudo openvpn —config client-garda-external.ovpn
[sudo] password for keyliaran:
Sorry, try again.
[sudo] password for keyliaran:
Wed May 15 12:15:05 2019 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018
Wed May 15 12:15:05 2019 library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08
Enter Auth Username: dvivanov
Enter Auth Password: **********
Wed May 15 12:15:18 2019 Outgoing Control Channel Authentication: Using 128 bit message hash 'MD5' for HMAC authentication
Wed May 15 12:15:18 2019 Incoming Control Channel Authentication: Using 128 bit message hash 'MD5' for HMAC authentication
Wed May 15 12:15:18 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]192.162.88.135:443
Wed May 15 12:15:18 2019 Socket Buffers: R=[87380->87380] S=[16384->16384]
Wed May 15 12:15:18 2019 Attempting to establish TCP connection with [AF_INET]192.162.88.135:443 [nonblock]
Wed May 15 12:15:19 2019 TCP connection established with [AF_INET]192.162.88.135:443
Wed May 15 12:15:19 2019 TCP_CLIENT link local: (not bound)
Wed May 15 12:15:19 2019 TCP_CLIENT link remote: [AF_INET]192.162.88.135:443
Wed May 15 12:15:19 2019 TLS: Initial packet from [AF_INET]192.162.88.135:443, sid=3e730305 34836520
Wed May 15 12:15:19 2019 WARNING: this configuration may cache passwords in memory — use the auth-nocache option to prevent this
Wed May 15 12:15:20 2019 VERIFY OK: depth=1, CN=vpn-ext.gardatech.ru
Wed May 15 12:15:20 2019 VERIFY KU OK
Wed May 15 12:15:20 2019 Validating certificate extended key usage
Wed May 15 12:15:20 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed May 15 12:15:20 2019 VERIFY EKU OK
Wed May 15 12:15:20 2019 VERIFY OK: depth=0, CN=server
Wed May 15 12:15:20 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed May 15 12:15:20 2019 [server] Peer Connection Initiated with [AF_INET]192.162.88.135:443
Wed May 15 12:15:21 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed May 15 12:15:21 2019 AUTH: Received control message: AUTH_FAILED
Wed May 15 12:15:21 2019 SIGTERM[soft,auth-failure] received, process exiting