Jump to content

nando

Active Members
  • Content Count

    6
  • Joined

  • Last visited

About nando

  • Rank
    Newbie
  1. format card and write fstab in the GUI.... OR. use fdisk, and make sda1(ext4) and sda2(swap). vi the entries in /etc/fstab use mount and swapon.
  2. write the public key you want to allow (key the box with), to `/root/.ssh/authorized_keys` then ssh in with `ssh -i /path/to/matching/private/key root@172.16.42.1`
  3. if you format the sdcard thru the gui, it will create two partitions, sda1 and sda2. this is ext4 and swap the fdisk configuration is also displayed in the gui, and also lets you save to disk. you may have to log in thru cli after making changes, and run "sync" a few times, before reboot, to make sure changes take. worked for me anyways.
  4. # openvpn seattle.ovpn Sat Jan 25 15:53:00 2020 us=4362 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Sat Jan 25 15:53:00 2020 us=9836 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10 Sat Jan 25 15:53:00 2020 us=35861 LZO compression initializing Sat Jan 25 15:53:00 2020 us=50570 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ] Sat Jan 25 15:53:00 2020 us=194632 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Sat Jan 25 15:53:00 2020 us=196567 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 68 bytes Sat Jan 25 15:53:00 2020 us=198025 calc_options_string_link_mtu: link-mtu 1622 -> 1570 Sat Jan 25 15:53:00 2020 us=203446 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 68 bytes Sat Jan 25 15:53:00 2020 us=204881 calc_options_string_link_mtu: link-mtu 1622 -> 1570 Sat Jan 25 15:53:00 2020 us=207291 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,k eysize 256,key-method 2,tls-client' Sat Jan 25 15:53:00 2020 us=208786 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,aut h SHA256,keysize 256,key-method 2,tls-server' Sat Jan 25 15:53:00 2020 us=213530 TCP/UDP: Preserving recently used remote address: [AF_INET]205.185.223.128:443 Sat Jan 25 15:53:00 2020 us=218910 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 25 15:53:00 2020 us=220332 UDP link local: (not bound) Sat Jan 25 15:53:00 2020 us=222525 UDP link remote: [AF_INET]205.185.223.128:443 Sat Jan 25 15:53:00 2020 us=238997 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=240824 UDP WRITE [14] to [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 sid=34ad198f 26c5beae [ ] pid=0 DATA Sat Jan 25 15:53:00 2020 us=242901 UDP write returned 14 Sat Jan 25 15:53:00 2020 us=360704 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=362206 UDP read returned 26 Sat Jan 25 15:53:00 2020 us=364383 UDP READ [26] from [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 sid=c09026ca e040f1ef [ 0 sid=34ad198f 26c 5beae ] pid=0 DATA Sat Jan 25 15:53:00 2020 us=366971 TLS: Initial packet from [AF_INET]205.185.223.128:443, sid=c09026ca e040f1ef Sat Jan 25 15:53:00 2020 us=369100 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=371034 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 0 sid=c09026ca e040f1ef ] Sat Jan 25 15:53:00 2020 us=373085 UDP write returned 22 Sat Jan 25 15:53:00 2020 us=375458 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 25 15:53:00 2020 us=377573 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=381636 UDP WRITE [255] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ ] pid=1 DATA 16030100 ec010000 e8030 302 c7cee207 35fb7e69 fd65e1e0 ca4e37e6 80f128d[more...] Sat Jan 25 15:53:00 2020 us=383681 UDP write returned 255 Sat Jan 25 15:53:00 2020 us=520202 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=521971 UDP read returned 1200 Sat Jan 25 15:53:00 2020 us=534966 UDP READ [1200] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 1 sid=34ad198f 26c5beae ] pid=1 DA TA 16030300 31020000 2d03032b 39d927c4 5037e10a fc710863 71834341 ca6cf4d[more...] Sat Jan 25 15:53:00 2020 us=537811 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=539802 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 1 sid=c09026ca e040f1ef ] Sat Jan 25 15:53:00 2020 us=541804 UDP write returned 22 Sat Jan 25 15:53:00 2020 us=543774 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=545281 UDP read returned 1188 Sat Jan 25 15:53:00 2020 us=558736 UDP READ [1188] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=2 DATA 37382572 aa9dd862 93d 8ef94 42d79001 bacf844a 4879f899 aa72c283 12f4356[more...] Sat Jan 25 15:53:00 2020 us=560889 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=562804 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 2 sid=c09026ca e040f1ef ] Sat Jan 25 15:53:00 2020 us=564826 UDP write returned 22 Sat Jan 25 15:53:00 2020 us=566965 event_wait returned 1 Sat Jan 25 15:53:00 2020 us=568661 UDP read returned 1044 Sat Jan 25 15:53:00 2020 us=581288 UDP READ [1044] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=3 DATA 027b3d08 bce98b78 b1b 3a30f 84392ad8 e74f28ca 361e34fe 152448c0 a6aa343[more...] Sat Jan 25 15:53:00 2020 us=592632 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com Sat Jan 25 15:53:00 2020 us=605366 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvan ish.com Sat Jan 25 15:53:00 2020 us=606944 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvan ish.com Sat Jan 25 15:53:02 2020 us=198583 event_wait returned 1 Sat Jan 25 15:53:02 2020 us=203528 UDP WRITE [368] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ 3 sid=c09026ca e040f1ef ] pid=2 DATA 16030301 06100001 0201007f 0b1859e2 61d3e105 24438cb1 e324b3bf 4f4ac15[more...] Sat Jan 25 15:53:02 2020 us=205608 UDP write returned 368 Sat Jan 25 15:53:02 2020 us=340406 event_wait returned 1 Sat Jan 25 15:53:02 2020 us=341931 UDP read returned 101 Sat Jan 25 15:53:02 2020 us=344851 UDP READ [101] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 2 sid=34ad198f 26c5beae ] pid=4 DAT A 14030300 01011603 03004097 d5d8ae0b 25b9d097 a933a2f3 503a947b 3b0e3ee[more...] Sat Jan 25 15:53:02 2020 us=349037 event_wait returned 1 Sat Jan 25 15:53:02 2020 us=354920 UDP WRITE [479] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ 4 sid=c09026ca e040f1ef ] pid=3 DATA 17030301 c00ed566 45e6fb97 3fa8e09c 2b5ab9fa 1e15944f 4d1db5fc dbf1287[more...] Sat Jan 25 15:53:02 2020 us=357208 UDP write returned 479 Sat Jan 25 15:53:02 2020 us=485918 event_wait returned 1 Sat Jan 25 15:53:02 2020 us=487489 UDP read returned 287 Sat Jan 25 15:53:02 2020 us=491867 UDP READ [287] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ 3 sid=34ad198f 26c5beae ] pid=5 DAT A 17030301 0072278a 8f50eb8d 62c96784 b14b3207 50327212 865ff232 8f9c1be[more...] Sat Jan 25 15:53:02 2020 us=494402 event_wait returned 1 Sat Jan 25 15:53:02 2020 us=496399 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=34ad198f 26c5beae [ 5 sid=c09026ca e040f1ef ] Sat Jan 25 15:53:02 2020 us=498527 UDP write returned 22 Sat Jan 25 15:53:02 2020 us=500181 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Sat Jan 25 15:53:02 2020 us=502272 [sea-a26.ipvanish.com] Peer Connection Initiated with [AF_INET]205.185.223.128:443 Sat Jan 25 15:53:03 2020 us=512745 event_wait returned 0 Sat Jan 25 15:53:03 2020 us=513952 SENT CONTROL [sea-a26.ipvanish.com]: 'PUSH_REQUEST' (status=1) Sat Jan 25 15:53:03 2020 us=514740 event_wait returned 1 Sat Jan 25 15:53:03 2020 us=516170 UDP WRITE [83] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=34ad198f 26c5beae [ ] pid=4 DATA 17030300 408463c3 16c423 a6 3dd2a75f efde5dea 3e8b0a1e 36ddd438 11aac62[more...] Sat Jan 25 15:53:03 2020 us=519284 UDP write returned 83 Sat Jan 25 15:53:03 2020 us=721303 event_wait returned 1 Sat Jan 25 15:53:03 2020 us=722872 UDP read returned 22 Sat Jan 25 15:53:03 2020 us=724974 UDP READ [22] from [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 sid=c09026ca e040f1ef [ 4 sid=34ad198f 26c5beae ] Sat Jan 25 15:53:03 2020 us=727235 event_wait returned 1 Sat Jan 25 15:53:03 2020 us=728718 UDP read returned 355 Sat Jan 25 15:53:03 2020 us=734735 UDP READ [355] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 sid=c09026ca e040f1ef [ ] pid=6 DATA 17030301 5017e17d be47 dd42 45b9baa2 45e83c40 b9e902cf d73c160e 953423e[more...] Sat Jan 25 15:53:03 2020 us=740234 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 198.18.0.1,dhcp-option DNS 198.18. 0.2,rcvbuf 493216,sndbuf 493216,explicit-exit-notify 5,comp-lzo no,route-gateway 172.21.24.1,topology subnet,ping 20,ping-restart 40,ifconfig 172.21.24.173 255.255 .254.0,peer-id 33,cipher AES-256-GCM' Sat Jan 25 15:53:03 2020 us=743323 OPTIONS IMPORT: timers and/or timeouts modified Sat Jan 25 15:53:03 2020 us=744735 OPTIONS IMPORT: explicit notify parm(s) modified Sat Jan 25 15:53:03 2020 us=746950 OPTIONS IMPORT: compression parms modified Sat Jan 25 15:53:03 2020 us=748792 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified Sat Jan 25 15:53:03 2020 us=750464 Socket Buffers: R=[163840->327680] S=[163840->327680] Sat Jan 25 15:53:03 2020 us=752138 OPTIONS IMPORT: --ifconfig/up options modified Sat Jan 25 15:53:03 2020 us=753776 OPTIONS IMPORT: route options modified Sat Jan 25 15:53:03 2020 us=755408 OPTIONS IMPORT: route-related options modified Sat Jan 25 15:53:03 2020 us=757145 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Sat Jan 25 15:53:03 2020 us=758786 OPTIONS IMPORT: peer-id set Sat Jan 25 15:53:03 2020 us=760576 OPTIONS IMPORT: adjusting link_mtu to 1625 Sat Jan 25 15:53:03 2020 us=762158 OPTIONS IMPORT: data channel crypto options modified Sat Jan 25 15:53:03 2020 us=763782 Data Channel: using negotiated cipher 'AES-256-GCM' Sat Jan 25 15:53:03 2020 us=765573 crypto_adjust_frame_parameters: Adjusting frame parameters for crypto by 48 bytes Sat Jan 25 15:53:03 2020 us=767770 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ] Sat Jan 25 15:53:03 2020 us=772946 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key Sat Jan 25 15:53:03 2020 us=774561 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key packet_write_wait: Connection to 172.16.42.1 port 22: Broken pipe # cat seattle.ovpn client dev tun proto udp remote sea-a26.ipvanish.com 443 resolv-retry infinite nobind persist-key persist-tun persist-remote-ip ca ca.ipvanish.com.crt verify-x509-name sea-a26.ipvanish.com name auth-user-pass creds.txt #comp-lzo link-mtu 1570 verb 3 auth SHA256 cipher AES-256-CBC keysize 256 tls-cipher TLS-DHE-RSA-WITH-AES-256-CBC-SHA:TLS-DHE-DSS-WITH-AES-256-CBC-SHA:TLS-RSA-WITH-AES-256-CBC-SHA
  5. Sat Jan 25 15:34:04 2020 us=633305 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6 Sat Jan 25 15:34:04 2020 us=637739 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] Sat Jan 25 15:34:04 2020 us=642340 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10 Sat Jan 25 15:34:04 2020 us=665287 LZO compression initializing Sat Jan 25 15:34:04 2020 us=679053 Control Channel MTU parms [ L:1622 D:1212 EF:38 EB:0 ET:0 EL:3 ] Sat Jan 25 15:34:04 2020 us=760381 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ] Sat Jan 25 15:34:04 2020 us=765358 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,auth SHA256,k eysize 256,key-method 2,tls-client' Sat Jan 25 15:34:04 2020 us=766623 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1570,tun-mtu 1500,proto UDPv4,comp-lzo,cipher AES-256-CBC,aut h SHA256,keysize 256,key-method 2,tls-server' Sat Jan 25 15:34:04 2020 us=771294 TCP/UDP: Preserving recently used remote address: [AF_INET]205.185.223.128:443 Sat Jan 25 15:34:04 2020 us=776186 Socket Buffers: R=[163840->163840] S=[163840->163840] Sat Jan 25 15:34:04 2020 us=777333 UDP link local: (not bound) Sat Jan 25 15:34:04 2020 us=778921 UDP link remote: [AF_INET]205.185.223.128:443 Sat Jan 25 15:34:04 2020 us=794278 UDP WRITE [14] to [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_CLIENT_V2 kid=0 [ ] pid=0 DATA len=0 Sat Jan 25 15:34:04 2020 us=906590 UDP READ [26] from [AF_INET]205.185.223.128:443: P_CONTROL_HARD_RESET_SERVER_V2 kid=0 [ 0 ] pid=0 DATA len=0 Sat Jan 25 15:34:04 2020 us=908372 TLS: Initial packet from [AF_INET]205.185.223.128:443, sid=10449987 74033af9 Sat Jan 25 15:34:04 2020 us=911457 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 0 ] Sat Jan 25 15:34:04 2020 us=914250 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jan 25 15:34:04 2020 us=916623 UDP WRITE [255] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=1 DATA len=241 Sat Jan 25 15:34:05 2020 us=57595 UDP READ [1200] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 1 ] pid=1 DATA len=1174 Sat Jan 25 15:34:05 2020 us=60635 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 1 ] Sat Jan 25 15:34:05 2020 us=63529 UDP READ [1188] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=2 DATA len=1174 Sat Jan 25 15:34:05 2020 us=66019 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 2 ] Sat Jan 25 15:34:05 2020 us=68942 UDP READ [1044] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ ] pid=3 DATA len=1030 Sat Jan 25 15:34:05 2020 us=83312 VERIFY OK: depth=1, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA, emailAddress=support@ipvanish.com Sat Jan 25 15:34:05 2020 us=96649 VERIFY X509NAME OK: C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvani sh.com Sat Jan 25 15:34:05 2020 us=98316 VERIFY OK: depth=0, C=US, ST=FL, L=Winter Park, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com, emailAddress=support@ipvani sh.com Sat Jan 25 15:34:06 2020 us=816027 UDP WRITE [368] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 3 ] pid=2 DATA len=342 Sat Jan 25 15:34:06 2020 us=951786 UDP READ [101] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 2 ] pid=4 DATA len=75 Sat Jan 25 15:34:06 2020 us=956195 UDP WRITE [479] to [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 4 ] pid=3 DATA len=453 Sat Jan 25 15:34:07 2020 us=131095 UDP READ [287] from [AF_INET]205.185.223.128:443: P_CONTROL_V1 kid=0 [ 3 ] pid=5 DATA len=261 Sat Jan 25 15:34:07 2020 us=134048 UDP WRITE [22] to [AF_INET]205.185.223.128:443: P_ACK_V1 kid=0 [ 5 ] Sat Jan 25 15:34:07 2020 us=136143 Control Channel: TLSv1.2, cipher SSLv3 DHE-RSA-AES256-SHA, 2048 bit RSA Sat Jan 25 15:34:07 2020 us=138464 [sea-a26.ipvanish.com] Peer Connection Initiated with [AF_INET]205.185.223.128:443 packet_write_poll: Connection to 172.16.42.1 port 22: Host is down
  6. openvpn appears to connect, and then the nano resets. full command output below: ================================================ root@Pineapple:~# openvpn seattle.ovpnSat Jan 25 14:21:38 2020 WARNING: --keysize is DEPRECATED and will beremoved in OpenVPN 2.6Sat Jan 25 14:21:38 2020 OpenVPN 2.4.7 mips-openwrt-linux-gnu [SSL(OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]Sat Jan 25 14:21:38 2020 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10Sat Jan 25 14:21:38 2020 TCP/UDP: Preserving recently used remoteaddress: [AF_INET]205.185.223.128:443Sat Jan 25 14:21:38 2020 Socket Buffers: R=[163840->163840] S=[163840->163840]Sat Jan 25 14:21:38 2020 UDP link local: (not bound)Sat Jan 25 14:21:38 2020 UDP link remote: [AF_INET]205.185.223.128:443Sat Jan 25 14:21:38 2020 TLS: Initial packet from[AF_INET]205.185.223.128:443, sid=0cfa6744 0674b9afSat Jan 25 14:21:38 2020 WARNING: this configuration may cachepasswords in memory -- use the auth-nocache option to prevent thisSat Jan 25 14:21:38 2020 VERIFY OK: depth=1, C=US, ST=FL, L=WinterPark, O=IPVanish, OU=IPVanish VPN, CN=IPVanish CA,emailAddress=support@ipvanish.comSat Jan 25 14:21:38 2020 VERIFY X509NAME OK: C=US, ST=FL, L=WinterPark, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com,emailAddress=support@ipvanish.comSat Jan 25 14:21:38 2020 VERIFY OK: depth=0, C=US, ST=FL, L=WinterPark, O=IPVanish, OU=IPVanish VPN, CN=sea-a26.ipvanish.com,emailAddress=support@ipvanish.comSat Jan 25 14:21:40 2020 Control Channel: TLSv1.2, cipher SSLv3DHE-RSA-AES256-SHA, 2048 bit RSASat Jan 25 14:21:40 2020 [sea-a26.ipvanish.com] Peer ConnectionInitiated with [AF_INET]205.185.223.128:443Sat Jan 25 14:21:42 2020 SENT CONTROL [sea-a26.ipvanish.com]:'PUSH_REQUEST' (status=1)Sat Jan 25 14:21:42 2020 PUSH: Received control message:'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS198.18.0.1,dhcp-option DNS 198.18.0.2,rcvbuf 493216,sndbuf493216,explicit-exit-notify 5,comp-lzo no,route-gateway172.21.20.1,topology subnet,ping 20,ping-restart 40,ifconfig172.21.20.136 255.255.254.0,peer-id 0,cipher AES-256-GCM'Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: timers and/or timeouts modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: explicit notify parm(s) modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: compression parms modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modifiedSat Jan 25 14:21:42 2020 Socket Buffers: R=[163840->327680] S=[163840->327680]Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: --ifconfig/up options modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: route options modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: route-related options modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: --ip-win32 and/or--dhcp-option options modifiedSat Jan 25 14:21:42 2020 OPTIONS IMPORT: peer-id setSat Jan 25 14:21:42 2020 OPTIONS IMPORT: adjusting link_mtu to 1625Sat Jan 25 14:21:42 2020 OPTIONS IMPORT: data channel crypto options modifiedSat Jan 25 14:21:42 2020 Data Channel: using negotiated cipher 'AES-256-GCM'Sat Jan 25 14:21:42 2020 NCP: overriding user-set keysize with defaultSat Jan 25 14:21:42 2020 Outgoing Data Channel: Cipher 'AES-256-GCM'initialized with 256 bit keySat Jan 25 14:21:42 2020 Incoming Data Channel: Cipher 'AES-256-GCM'initialized with 256 bit keypacket_write_wait: Connection to 172.16.42.1 port 22: Broken pipe
×
×
  • Create New...