Thu Jan 04 14:16:30 2018 OpenVPN 2.3.18 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 26 2017 Thu Jan 04 14:16:30 2018 Windows version 6.2 (Windows 8 or greater) 64bit Thu Jan 04 14:16:30 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10 Enter Management Password: Thu Jan 04 14:16:30 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341 Thu Jan 04 14:16:30 2018 Need hold release from management interface, waiting... Thu Jan 04 14:16:30 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341 Thu Jan 04 14:16:30 2018 MANAGEMENT: CMD 'state on' Thu Jan 04 14:16:30 2018 MANAGEMENT: CMD 'log all on' Thu Jan 04 14:16:30 2018 MANAGEMENT: CMD 'hold off' Thu Jan 04 14:16:30 2018 MANAGEMENT: CMD 'hold release' Thu Jan 04 14:16:30 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Thu Jan 04 14:16:36 2018 MANAGEMENT: CMD 'password [...]' Thu Jan 04 14:16:36 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Thu Jan 04 14:16:36 2018 WARNING: normally if you use --mssfix and/or --fragment, you should also set --tun-mtu 1500 (currently it is 1400) Thu Jan 04 14:16:36 2018 Socket Buffers: R=[65536->65536] S=[65536->65536] Thu Jan 04 14:16:36 2018 MANAGEMENT: >STATE:1515071796,RESOLVE,,, Thu Jan 04 14:16:36 2018 UDPv4 link local (bound): [undef] Thu Jan 04 14:16:36 2018 UDPv4 link remote: [AF_INET]141.10.75.146:1194 Thu Jan 04 14:16:36 2018 MANAGEMENT: >STATE:1515071796,WAIT,,, Thu Jan 04 14:16:36 2018 MANAGEMENT: >STATE:1515071796,AUTH,,, Thu Jan 04 14:16:36 2018 TLS: Initial packet from [AF_INET]141.10.75.146:1194, sid=7331f6b4 e0b576bd Thu Jan 04 14:16:36 2018 VERIFY OK: depth=1, C=DE, ST=BW, L=Untergroeningen, O=Grundschule, OU=linuxmuster.net, CN=Grundschule Thu Jan 04 14:16:36 2018 VERIFY OK: nsCertType=SERVER Thu Jan 04 14:16:36 2018 VERIFY OK: depth=0, C=DE, ST=BW, O=Grundschule, OU=linuxmuster.net, CN=server.gs-untergroeningen.aa.schule-bw.de Thu Jan 04 14:16:37 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key Thu Jan 04 14:16:37 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Thu Jan 04 14:16:37 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jan 04 14:16:37 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key Thu Jan 04 14:16:37 2018 WARNING: INSECURE cipher with block size less than 128 bit (64 bit). This allows attacks like SWEET32. Mitigate by using a --cipher with a larger block size (e.g. AES-256-CBC). Thu Jan 04 14:16:37 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication Thu Jan 04 14:16:37 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA Thu Jan 04 14:16:37 2018 [server.gs-untergroeningen.aa.schule-bw.de] Peer Connection Initiated with [AF_INET]141.10.75.146:1194 Thu Jan 04 14:16:38 2018 MANAGEMENT: >STATE:1515071798,GET_CONFIG,,, Thu Jan 04 14:16:39 2018 SENT CONTROL [server.gs-untergroeningen.aa.schule-bw.de]: 'PUSH_REQUEST' (status=1) Thu Jan 04 14:16:39 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DOMAIN gs-untergroeningen.aa.schule-bw.de,dhcp-option DNS 10.16.1.1,dhcp-option WINS 10.16.1.1,route 172.16.18.1,topology net30,ping 10,ping-restart 60,ifconfig 172.16.18.6 172.16.18.5' Thu Jan 04 14:16:39 2018 OPTIONS IMPORT: timers and/or timeouts modified Thu Jan 04 14:16:39 2018 OPTIONS IMPORT: --ifconfig/up options modified Thu Jan 04 14:16:39 2018 OPTIONS IMPORT: route options modified Thu Jan 04 14:16:39 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Thu Jan 04 14:16:39 2018 ROUTE_GATEWAY 192.168.2.1/255.255.255.0 I=5 HWADDR=00:24:d7:54:55:5c Thu Jan 04 14:16:39 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0 Thu Jan 04 14:16:39 2018 MANAGEMENT: >STATE:1515071799,ASSIGN_IP,,172.16.18.6, Thu Jan 04 14:16:39 2018 open_tun, tt->ipv6=0 Thu Jan 04 14:16:39 2018 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{D732B046-0AA8-4F6D-AB56-CA3704437B7F}.tap Thu Jan 04 14:16:39 2018 TAP-Windows Driver Version 9.21 Thu Jan 04 14:16:39 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 172.16.18.6/255.255.255.252 on interface {D732B046-0AA8-4F6D-AB56-CA3704437B7F} [DHCP-serv: 172.16.18.5, lease-time: 31536000] Thu Jan 04 14:16:39 2018 Successful ARP Flush on interface [32] {D732B046-0AA8-4F6D-AB56-CA3704437B7F} Thu Jan 04 14:16:44 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up Thu Jan 04 14:16:44 2018 C:\WINDOWS\system32\route.exe ADD 141.10.75.146 MASK 255.255.255.255 192.168.2.1 Thu Jan 04 14:16:44 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=45 and dwForwardType=4 Thu Jan 04 14:16:44 2018 Route addition via IPAPI succeeded [adaptive] Thu Jan 04 14:16:44 2018 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 172.16.18.5 Thu Jan 04 14:16:44 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Thu Jan 04 14:16:44 2018 Route addition via IPAPI succeeded [adaptive] Thu Jan 04 14:16:44 2018 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 172.16.18.5 Thu Jan 04 14:16:44 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Thu Jan 04 14:16:44 2018 Route addition via IPAPI succeeded [adaptive] Thu Jan 04 14:16:44 2018 MANAGEMENT: >STATE:1515071804,ADD_ROUTES,,, Thu Jan 04 14:16:44 2018 C:\WINDOWS\system32\route.exe ADD 172.16.18.1 MASK 255.255.255.255 172.16.18.5 Thu Jan 04 14:16:44 2018 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 Thu Jan 04 14:16:44 2018 Route addition via IPAPI succeeded [adaptive] Thu Jan 04 14:16:44 2018 Initialization Sequence Completed Thu Jan 04 14:16:44 2018 MANAGEMENT: >STATE:1515071804,CONNECTED,SUCCESS,172.16.18.6,141.10.75.146