Wed Aug 10 12:17:01 2016 OpenVPN 2.3.11 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on May 10 2016
Wed Aug 10 12:17:01 2016 Windows version 6.2 (Windows 8 or greater) 64bit
Wed Aug 10 12:17:01 2016 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.09
Wed Aug 10 12:17:01 2016 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Wed Aug 10 12:17:01 2016 Need hold release from management interface, waiting...
Wed Aug 10 12:17:01 2016 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Wed Aug 10 12:17:01 2016 MANAGEMENT: CMD 'state on'
Wed Aug 10 12:17:01 2016 MANAGEMENT: CMD 'log all on'
Wed Aug 10 12:17:01 2016 MANAGEMENT: CMD 'hold off'
Wed Aug 10 12:17:01 2016 MANAGEMENT: CMD 'hold release'
Wed Aug 10 12:17:08 2016 MANAGEMENT: CMD 'username "Auth" "sebastian.*****"'
Wed Aug 10 12:17:08 2016 MANAGEMENT: CMD 'password [...]'
Wed Aug 10 12:17:08 2016 WARNING: No server certificate verification method has been enabled. See [url]http://openvpn.net/howto.html#mitm[/url] for more info.
Wed Aug 10 12:17:08 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
Wed Aug 10 12:17:08 2016 UDPv4 link local: [undef]
Wed Aug 10 12:17:08 2016 UDPv4 link remote: [AF_INET]***.***.***.***:1194
Wed Aug 10 12:17:08 2016 MANAGEMENT: >STATE:1470824228,WAIT,,,
Wed Aug 10 12:17:08 2016 MANAGEMENT: >STATE:1470824228,AUTH,,,
Wed Aug 10 12:17:08 2016 TLS: Initial packet from [AF_INET]***.***.***.***:1194, sid=7656b559 ec897036
Wed Aug 10 12:17:08 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Aug 10 12:17:08 2016 VERIFY OK: depth=1, C=IT, O=efw, CN=efw CA
Wed Aug 10 12:17:08 2016 VERIFY OK: depth=0, C=IT, O=efw, CN=127.0.0.1
Wed Aug 10 12:17:08 2016 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Aug 10 12:17:08 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Aug 10 12:17:08 2016 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Wed Aug 10 12:17:08 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Wed Aug 10 12:17:08 2016 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
Wed Aug 10 12:17:08 2016 [127.0.0.1] Peer Connection Initiated with [AF_INET]***.***.***.***:1194
Wed Aug 10 12:17:09 2016 MANAGEMENT: >STATE:1470824229,GET_CONFIG,,,
Wed Aug 10 12:17:10 2016 SENT CONTROL [127.0.0.1]: 'PUSH_REQUEST' (status=1)
Wed Aug 10 12:17:10 2016 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.10.1,route-gateway 10.10.10.1,route-gateway 10.10.10.1,ping 8,ping-restart 30,ifconfig 10.10.10.236 255.255.255.0'
Wed Aug 10 12:17:10 2016 OPTIONS IMPORT: timers and/or timeouts modified
Wed Aug 10 12:17:10 2016 OPTIONS IMPORT: --ifconfig/up options modified
Wed Aug 10 12:17:10 2016 OPTIONS IMPORT: route-related options modified
Wed Aug 10 12:17:10 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Aug 10 12:17:10 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Wed Aug 10 12:17:10 2016 MANAGEMENT: >STATE:1470824230,ASSIGN_IP,,10.10.10.236,
Wed Aug 10 12:17:10 2016 open_tun, tt->ipv6=0
Wed Aug 10 12:17:10 2016 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{5698A4C1-463E-48D5-B2C0-1BA9F6ACB356}.tap
Wed Aug 10 12:17:10 2016 TAP-Windows Driver Version 9.21
Wed Aug 10 12:17:10 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.10.10.236/255.255.255.0 on interface {5698A4C1-463E-48D5-B2C0-1BA9F6ACB356} [DHCP-serv: 10.10.10.0, lease-time: 31536000]
Wed Aug 10 12:17:10 2016 Successful ARP Flush on interface [3] {5698A4C1-463E-48D5-B2C0-1BA9F6ACB356}
Wed Aug 10 12:17:15 2016 TEST ROUTES: 0/0 succeeded len=0 ret=1 a=0 u/d=up
Wed Aug 10 12:17:15 2016 Initialization Sequence Completed
Wed Aug 10 12:17:15 2016 MANAGEMENT: >STATE:1470824235,CONNECTED,SUCCESS,10.10.10.236,***.***.***.***