• XSS.stack #1 – первый литературный журнал от юзеров форума

VPN

Пожалуйста, обратите внимание, что пользователь заблокирован
А что если на своей впске поднять впн без логов, но так же дать доступ к своему впну еще нескольким людям. Таким образом в логах будет каша, нет?

не бейте палками, если идея так себе : )
 
А что если на своей впске поднять впн без логов, но так же дать доступ к своему впну еще нескольким людям. Таким образом в логах будет каша, нет?

не бейте палками, если идея так себе : )
В момент покупки сервера если запалил свой реальный ip, свой кошелёк которым оплачивал, то идея глупая. Поднимай сервер, на нём весь трафик пропускай в Tor: https://cryptopunks.org/article/vpn_over_tor/. Либо изначально подключайся к VPN через Tor. Например пропускаешь весь трафик на машине в Tor, а дальше на виртуалке запускаешь VPN.
 
Пожалуйста, обратите внимание, что пользователь заблокирован
В момент покупки сервера если запалил свой реальный ip, свой кошелёк которым оплачивал, то идея глупая. Поднимай сервер, на нём весь трафик пропускай в Tor: https://cryptopunks.org/article/vpn_over_tor/. Либо изначально подключайся к VPN через Tor. Например пропускаешь весь трафик на машине в Tor, а дальше на виртуалке запускаешь VPN.
не, ты не понял о чем я :)
 
VPN не даёт защиты. Если нужен хороший, то нужно самостоятельноподходить к изучению каждого фактора самостятельно. СМотря для каких целей тебе нужен ВПН
 
Можно просто использовать Tor, и не думать про VPN. Тоже вариант.
Тоже за Tor. Но по сути это три vpn непонятно кем поднятые, если не посещать onion сайты он слишком палевный и не подходит под безопасный вариант использования, а только как анонимайзер. Там трафик точно сливается, дополнительно надо шифровать. В наше время не все сайты с https признак защищенности, могут понизить шифрование на конце. Поэтому его создавали как браузер, только под анонимность, на большее он не годен.
 
А что из себя представляют логи, которые ведут провайдеры VPN? Кто нибудь знает подробнее все мелочи про эти логи?
лог моего опенвпн сервера
Скрытый контент для зарегистрированных пользователей.

Thu Apr 30 06:49:20 2020 us=99778 Current Parameter Settings:
Thu Apr 30 06:49:20 2020 us=99778 config = 'server.ovpn'
Thu Apr 30 06:49:20 2020 us=99778 mode = 1
Thu Apr 30 06:49:20 2020 us=99778 show_ciphers = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 show_digests = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 show_engines = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 genkey = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 key_pass_file = '[UNDEF]'
Thu Apr 30 06:49:20 2020 us=99778 show_tls_ciphers = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 connect_retry_max = 0
Thu Apr 30 06:49:20 2020 us=99778 Connection profiles [0]:
Thu Apr 30 06:49:20 2020 us=99778 proto = tcp-server
Thu Apr 30 06:49:20 2020 us=99778 local = '[UNDEF]'
Thu Apr 30 06:49:20 2020 us=99778 local_port = '65534'
Thu Apr 30 06:49:20 2020 us=99778 remote = '[UNDEF]'
Thu Apr 30 06:49:20 2020 us=99778 remote_port = '65534'
Thu Apr 30 06:49:20 2020 us=99778 remote_float = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 bind_defined = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 bind_local = ENABLED
Thu Apr 30 06:49:20 2020 us=99778 bind_ipv6_only = DISABLED
Thu Apr 30 06:49:20 2020 us=99778 NOTE: --mute triggered...
Thu Apr 30 06:49:20 2020 us=99778 280 variation(s) on previous 20 message(s) suppressed by --mute
Thu Apr 30 06:49:20 2020 us=99778 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
Thu Apr 30 06:49:20 2020 us=99778 Windows version 6.2 (Windows 8 or greater) 64bit
Thu Apr 30 06:49:20 2020 us=99778 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10
Enter Management Password:
Thu Apr 30 06:49:20 2020 us=115405 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Apr 30 06:49:20 2020 us=115405 Need hold release from management interface, waiting...
Thu Apr 30 06:49:20 2020 us=568531 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Apr 30 06:49:20 2020 us=677919 MANAGEMENT: CMD 'state on'
Thu Apr 30 06:49:20 2020 us=677919 MANAGEMENT: CMD 'log all on'
Thu Apr 30 06:49:20 2020 us=693532 MANAGEMENT: CMD 'echo all on'
Thu Apr 30 06:49:20 2020 us=693532 MANAGEMENT: CMD 'bytecount 5'
Thu Apr 30 06:49:20 2020 us=693532 MANAGEMENT: CMD 'hold off'
Thu Apr 30 06:49:20 2020 us=693532 MANAGEMENT: CMD 'hold release'
Thu Apr 30 06:49:20 2020 us=709599 Diffie-Hellman initialized with 2048 bit key
Thu Apr 30 06:49:20 2020 us=709599 Failed to extract curve from certificate (UNDEF), using secp384r1 instead.
Thu Apr 30 06:49:20 2020 us=709599 ECDH curve secp384r1 added
Thu Apr 30 06:49:20 2020 us=709599 TLS-Auth MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Thu Apr 30 06:49:20 2020 us=709599 interactive service msg_channel=0
Thu Apr 30 06:49:20 2020 us=724777 ROUTE_GATEWAY 10.2.64.1/255.255.192.0 I=13 HWADDR=00:15:5d:01:d5:62
Thu Apr 30 06:49:20 2020 us=724777 open_tun
Thu Apr 30 06:49:20 2020 us=740511 MANAGEMENT: Client disconnected
Thu Apr 30 06:49:20 2020 us=740511 CreateFile failed on TAP device: \\.\Global\{7A4FBE56-1BB0-4645-ACAC-110153947DA2}.tap: No such file or directory (errno=2)
Thu Apr 30 06:49:20 2020 us=740511 Exiting due to fatal error
Thu Apr 30 06:49:24 2020 us=693528 Current Parameter Settings:
Thu Apr 30 06:49:24 2020 us=693528 config = 'server.ovpn'
Thu Apr 30 06:49:24 2020 us=693528 mode = 1
Thu Apr 30 06:49:24 2020 us=693528 show_ciphers = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 show_digests = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 show_engines = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 genkey = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 key_pass_file = '[UNDEF]'
Thu Apr 30 06:49:24 2020 us=693528 show_tls_ciphers = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 connect_retry_max = 0
Thu Apr 30 06:49:24 2020 us=693528 Connection profiles [0]:
Thu Apr 30 06:49:24 2020 us=693528 proto = tcp-server
Thu Apr 30 06:49:24 2020 us=693528 local = '[UNDEF]'
Thu Apr 30 06:49:24 2020 us=693528 local_port = '65534'
Thu Apr 30 06:49:24 2020 us=693528 remote = '[UNDEF]'
Thu Apr 30 06:49:24 2020 us=693528 remote_port = '65534'
Thu Apr 30 06:49:24 2020 us=693528 remote_float = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 bind_defined = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 bind_local = ENABLED
Thu Apr 30 06:49:24 2020 us=693528 bind_ipv6_only = DISABLED
Thu Apr 30 06:49:24 2020 us=693528 NOTE: --mute triggered...
Thu Apr 30 06:49:24 2020 us=693528 280 variation(s) on previous 20 message(s) suppressed by --mute
Thu Apr 30 06:49:24 2020 us=693528 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
Thu Apr 30 06:49:24 2020 us=693528 Windows version 6.2 (Windows 8 or greater) 64bit
Thu Apr 30 06:49:24 2020 us=693528 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10
Enter Management Password:
Thu Apr 30 06:49:24 2020 us=709155 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Apr 30 06:49:24 2020 us=709155 Need hold release from management interface, waiting...
Thu Apr 30 06:49:25 2020 us=199356 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Apr 30 06:49:25 2020 us=302927 MANAGEMENT: CMD 'state on'
Thu Apr 30 06:49:25 2020 us=302927 MANAGEMENT: CMD 'log all on'
Thu Apr 30 06:49:25 2020 us=318527 MANAGEMENT: CMD 'echo all on'
Thu Apr 30 06:49:25 2020 us=318527 MANAGEMENT: CMD 'bytecount 5'
Thu Apr 30 06:49:25 2020 us=318527 MANAGEMENT: CMD 'hold off'
Thu Apr 30 06:49:25 2020 us=334152 MANAGEMENT: CMD 'hold release'
Thu Apr 30 06:49:25 2020 us=334152 Diffie-Hellman initialized with 2048 bit key
Thu Apr 30 06:49:25 2020 us=334152 Failed to extract curve from certificate (UNDEF), using secp384r1 instead.
Thu Apr 30 06:49:25 2020 us=334152 ECDH curve secp384r1 added
Thu Apr 30 06:49:25 2020 us=334152 TLS-Auth MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Thu Apr 30 06:49:25 2020 us=349779 interactive service msg_channel=0
Thu Apr 30 06:49:25 2020 us=349779 ROUTE_GATEWAY 10.2.64.1/255.255.192.0 I=13 HWADDR=00:15:5d:01:d5:62
Thu Apr 30 06:49:25 2020 us=349779 open_tun
Thu Apr 30 06:49:25 2020 us=365401 MANAGEMENT: Client disconnected
Thu Apr 30 06:49:25 2020 us=365401 CreateFile failed on TAP device: \\.\Global\{7A4FBE56-1BB0-4645-ACAC-110153947DA2}.tap: No such file or directory (errno=2)
Thu Apr 30 06:49:25 2020 us=365401 Exiting due to fatal error
Thu Apr 30 06:49:52 2020 us=881219 Current Parameter Settings:
Thu Apr 30 06:49:52 2020 us=881219 config = 'server.ovpn'
Thu Apr 30 06:49:52 2020 us=881219 mode = 1
Thu Apr 30 06:49:52 2020 us=881219 show_ciphers = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 show_digests = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 show_engines = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 genkey = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 key_pass_file = '[UNDEF]'
Thu Apr 30 06:49:52 2020 us=881219 show_tls_ciphers = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 connect_retry_max = 0
Thu Apr 30 06:49:52 2020 us=881219 Connection profiles [0]:
Thu Apr 30 06:49:52 2020 us=881219 proto = tcp-server
Thu Apr 30 06:49:52 2020 us=881219 local = '[UNDEF]'
Thu Apr 30 06:49:52 2020 us=881219 local_port = '65534'
Thu Apr 30 06:49:52 2020 us=881219 remote = '[UNDEF]'
Thu Apr 30 06:49:52 2020 us=881219 remote_port = '65534'
Thu Apr 30 06:49:52 2020 us=881219 remote_float = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 bind_defined = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 bind_local = ENABLED
Thu Apr 30 06:49:52 2020 us=881219 bind_ipv6_only = DISABLED
Thu Apr 30 06:49:52 2020 us=881219 NOTE: --mute triggered...
Thu Apr 30 06:49:52 2020 us=881219 280 variation(s) on previous 20 message(s) suppressed by --mute
Thu Apr 30 06:49:52 2020 us=881219 OpenVPN 2.4.8 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Oct 31 2019
Thu Apr 30 06:49:52 2020 us=881219 Windows version 6.2 (Windows 8 or greater) 64bit
Thu Apr 30 06:49:52 2020 us=881219 library versions: OpenSSL 1.1.0l 10 Sep 2019, LZO 2.10
Enter Management Password:
Thu Apr 30 06:49:52 2020 us=912982 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Thu Apr 30 06:49:52 2020 us=912982 Need hold release from management interface, waiting...
Thu Apr 30 06:49:53 2020 us=318536 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Thu Apr 30 06:49:53 2020 us=427914 MANAGEMENT: CMD 'state on'
Thu Apr 30 06:49:53 2020 us=427914 MANAGEMENT: CMD 'log all on'
Thu Apr 30 06:49:53 2020 us=443524 MANAGEMENT: CMD 'echo all on'
Thu Apr 30 06:49:53 2020 us=443524 MANAGEMENT: CMD 'bytecount 5'
Thu Apr 30 06:49:53 2020 us=443524 MANAGEMENT: CMD 'hold off'
Thu Apr 30 06:49:53 2020 us=443524 MANAGEMENT: CMD 'hold release'
Thu Apr 30 06:49:53 2020 us=443524 Diffie-Hellman initialized with 2048 bit key
Thu Apr 30 06:49:53 2020 us=459152 Failed to extract curve from certificate (UNDEF), using secp384r1 instead.
Thu Apr 30 06:49:53 2020 us=459152 ECDH curve secp384r1 added
Thu Apr 30 06:49:53 2020 us=459152 TLS-Auth MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Thu Apr 30 06:49:53 2020 us=459152 interactive service msg_channel=0
Thu Apr 30 06:49:53 2020 us=459152 ROUTE_GATEWAY 10.2.64.1/255.255.192.0 I=13 HWADDR=00:15:5d:01:d5:62
Thu Apr 30 06:49:53 2020 us=459152 open_tun
Thu Apr 30 06:49:53 2020 us=459152 TAP-WIN32 device [vpnadapter] opened: \\.\Global\{7A4FBE56-1BB0-4645-ACAC-110153947DA2}.tap
Thu Apr 30 06:49:53 2020 us=459152 TAP-Windows Driver Version 9.24
Thu Apr 30 06:49:53 2020 us=459152 TAP-Windows MTU=1500
Thu Apr 30 06:49:53 2020 us=474788 Notified TAP-Windows driver to set a DHCP IP/netmask of 172.1.1.1/255.255.255.252 on interface {7A4FBE56-1BB0-4645-ACAC-110153947DA2} [DHCP-serv: 172.1.1.2, lease-time: 31536000]
Thu Apr 30 06:49:53 2020 us=474788 Sleeping for 10 seconds...
Thu Apr 30 06:50:03 2020 us=632120 Successful ARP Flush on interface [12] {7A4FBE56-1BB0-4645-ACAC-110153947DA2}
Thu Apr 30 06:50:03 2020 us=632120 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
Thu Apr 30 06:50:03 2020 us=632120 MANAGEMENT: >STATE:1588215003,ASSIGN_IP,,172.1.1.1,,,,
Thu Apr 30 06:50:03 2020 us=632120 MANAGEMENT: >STATE:1588215003,ADD_ROUTES,,,,,,
Thu Apr 30 06:50:03 2020 us=646656 C:\Windows\system32\route.exe ADD 172.1.1.0 MASK 255.255.255.0 172.1.1.2
Thu Apr 30 06:50:03 2020 us=646656 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Thu Apr 30 06:50:03 2020 us=646656 Route addition via IPAPI succeeded [adaptive]
Thu Apr 30 06:50:03 2020 us=646656 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:50:03 2020 us=646656 Could not determine IPv4/IPv6 protocol. Using AF_INET6
Thu Apr 30 06:50:03 2020 us=646656 Socket Buffers: R=[65536->65536] S=[65536->65536]
Thu Apr 30 06:50:03 2020 us=646656 setsockopt(IPV6_V6ONLY=0)
Thu Apr 30 06:50:03 2020 us=646656 Listening for incoming TCP connection on [AF_INET6][undef]:65534
Thu Apr 30 06:50:03 2020 us=646656 TCPv6_SERVER link local (bound): [AF_INET6][undef]:65534
Thu Apr 30 06:50:03 2020 us=646656 TCPv6_SERVER link remote: [AF_UNSPEC]
Thu Apr 30 06:50:03 2020 us=662278 MULTI: multi_init called, r=256 v=256
Thu Apr 30 06:50:03 2020 us=662278 IFCONFIG POOL: base=172.1.1.4 size=62, ipv6=0
Thu Apr 30 06:50:03 2020 us=662278 MULTI: TCP INIT maxclients=1 maxevents=5
Thu Apr 30 06:50:03 2020 us=662278 Initialization Sequence Completed
Thu Apr 30 06:50:03 2020 us=662278 MANAGEMENT: >STATE:1588215003,CONNECTED,SUCCESS,172.1.1.1,,,,
Thu Apr 30 06:51:35 2020 us=146668 MULTI: multi_create_instance called
Thu Apr 30 06:51:35 2020 us=146668 Re-using SSL/TLS context
Thu Apr 30 06:51:35 2020 us=146668 LZO compression initializing
Thu Apr 30 06:51:35 2020 us=146668 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Thu Apr 30 06:51:35 2020 us=146668 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:51:35 2020 us=146668 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Thu Apr 30 06:51:35 2020 us=146668 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Thu Apr 30 06:51:35 2020 us=146668 TCP connection established with [AF_INET6]::ffff:192.168.11.100:55284
Thu Apr 30 06:51:35 2020 us=146668 TCPv6_SERVER link local: (not bound)
Thu Apr 30 06:51:35 2020 us=146668 TCPv6_SERVER link remote: [AF_INET6]::ffff:192.168.11.100:55284
Thu Apr 30 06:51:36 2020 us=131026 192.168.11.100:55284 TLS: Initial packet from [AF_INET6]::ffff:192.168.11.100:55284, sid=3649c79e d67b7c8b
Thu Apr 30 06:51:36 2020 us=177918 192.168.11.100:55284 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=OpenVPN, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Apr 30 06:51:36 2020 us=177918 192.168.11.100:55284 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=OpenVPN, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_VER=2.4.4
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_PLAT=win
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_PROTO=2
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_NCP=2
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_LZ4=1
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_LZ4v2=1
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_LZO=1
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_COMP_STUB=1
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_COMP_STUBv2=1
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_TCPNL=1
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 peer info: IV_GUI_VER=OpenVPN_GUI_11
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Apr 30 06:51:36 2020 us=490410 192.168.11.100:55284 [changeme] Peer Connection Initiated with [AF_INET6]::ffff:192.168.11.100:55284
Thu Apr 30 06:51:36 2020 us=490410 changeme/192.168.11.100:55284 MULTI_sva: pool returned IPv4=172.1.1.6, IPv6=(Not enabled)
Thu Apr 30 06:51:36 2020 us=490410 changeme/192.168.11.100:55284 MULTI: Learn: 172.1.1.6 -> changeme/192.168.11.100:55284
Thu Apr 30 06:51:36 2020 us=490410 changeme/192.168.11.100:55284 MULTI: primary virtual IP for changeme/192.168.11.100:55284: 172.1.1.6
Thu Apr 30 06:51:37 2020 us=662296 changeme/192.168.11.100:55284 PUSH: Received control message: 'PUSH_REQUEST'
Thu Apr 30 06:51:37 2020 us=662296 changeme/192.168.11.100:55284 SENT CONTROL [changeme]: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 172.1.1.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 172.1.1.6 172.1.1.5,peer-id 0,cipher AES-256-GCM' (status=1)
Thu Apr 30 06:51:37 2020 us=662296 changeme/192.168.11.100:55284 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Apr 30 06:51:37 2020 us=662296 changeme/192.168.11.100:55284 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:51:37 2020 us=662296 changeme/192.168.11.100:55284 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Apr 30 06:51:37 2020 us=662296 changeme/192.168.11.100:55284 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Apr 30 06:51:37 2020 us=912288 changeme/192.168.11.100:55284 Connection reset, restarting [-1]
Thu Apr 30 06:51:37 2020 us=912288 changeme/192.168.11.100:55284 SIGUSR1[soft,connection-reset] received, client-instance restarting
Thu Apr 30 06:51:37 2020 us=912288 TCP/UDP: Closing socket
Thu Apr 30 06:52:04 2020 us=68527 MULTI: multi_create_instance called
Thu Apr 30 06:52:04 2020 us=68527 Re-using SSL/TLS context
Thu Apr 30 06:52:04 2020 us=68527 LZO compression initializing
Thu Apr 30 06:52:04 2020 us=68527 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Thu Apr 30 06:52:04 2020 us=68527 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:52:04 2020 us=68527 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Thu Apr 30 06:52:04 2020 us=68527 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Thu Apr 30 06:52:04 2020 us=68527 TCP connection established with [AF_INET6]::ffff:192.168.11.1:54863
Thu Apr 30 06:52:04 2020 us=68527 TCPv6_SERVER link local: (not bound)
Thu Apr 30 06:52:04 2020 us=68527 TCPv6_SERVER link remote: [AF_INET6]::ffff:192.168.11.1:54863
Thu Apr 30 06:52:05 2020 us=21667 192.168.11.1:54863 TLS: Initial packet from [AF_INET6]::ffff:192.168.11.1:54863, sid=73edb793 ba6b2b0c
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=OpenVPN, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=OpenVPN, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_VER=2.4.4
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_PLAT=win
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_PROTO=2
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_NCP=2
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_LZ4=1
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_LZ4v2=1
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_LZO=1
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_COMP_STUB=1
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_COMP_STUBv2=1
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_TCPNL=1
Thu Apr 30 06:52:05 2020 us=52901 192.168.11.1:54863 peer info: IV_GUI_VER=OpenVPN_GUI_11
Thu Apr 30 06:52:05 2020 us=68539 192.168.11.1:54863 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Apr 30 06:52:05 2020 us=68539 192.168.11.1:54863 [changeme] Peer Connection Initiated with [AF_INET6]::ffff:192.168.11.1:54863
Thu Apr 30 06:52:05 2020 us=68539 changeme/192.168.11.1:54863 MULTI_sva: pool returned IPv4=172.1.1.6, IPv6=(Not enabled)
Thu Apr 30 06:52:05 2020 us=68539 changeme/192.168.11.1:54863 MULTI: Learn: 172.1.1.6 -> changeme/192.168.11.1:54863
Thu Apr 30 06:52:05 2020 us=68539 changeme/192.168.11.1:54863 MULTI: primary virtual IP for changeme/192.168.11.1:54863: 172.1.1.6
Thu Apr 30 06:52:06 2020 us=115417 changeme/192.168.11.1:54863 PUSH: Received control message: 'PUSH_REQUEST'
Thu Apr 30 06:52:06 2020 us=115417 changeme/192.168.11.1:54863 SENT CONTROL [changeme]: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 172.1.1.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 172.1.1.6 172.1.1.5,peer-id 0,cipher AES-256-GCM' (status=1)
Thu Apr 30 06:52:06 2020 us=115417 changeme/192.168.11.1:54863 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Apr 30 06:52:06 2020 us=115417 changeme/192.168.11.1:54863 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:52:06 2020 us=115417 changeme/192.168.11.1:54863 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Apr 30 06:52:06 2020 us=115417 changeme/192.168.11.1:54863 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Apr 30 06:52:06 2020 us=146670 changeme/192.168.11.1:54863 Connection reset, restarting [0]
Thu Apr 30 06:52:06 2020 us=146670 changeme/192.168.11.1:54863 SIGUSR1[soft,connection-reset] received, client-instance restarting
Thu Apr 30 06:52:06 2020 us=146670 TCP/UDP: Closing socket
Thu Apr 30 06:52:28 2020 us=834172 MULTI: multi_create_instance called
Thu Apr 30 06:52:28 2020 us=834172 Re-using SSL/TLS context
Thu Apr 30 06:52:28 2020 us=834172 LZO compression initializing
Thu Apr 30 06:52:28 2020 us=834172 Control Channel MTU parms [ L:1624 D:1210 EF:40 EB:0 ET:0 EL:3 ]
Thu Apr 30 06:52:28 2020 us=834172 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:52:28 2020 us=834172 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
Thu Apr 30 06:52:28 2020 us=834172 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
Thu Apr 30 06:52:28 2020 us=834172 TCP connection established with [AF_INET6]::ffff:192.168.11.1:54864
Thu Apr 30 06:52:28 2020 us=834172 TCPv6_SERVER link local: (not bound)
Thu Apr 30 06:52:28 2020 us=834172 TCPv6_SERVER link remote: [AF_INET6]::ffff:192.168.11.1:54864
Thu Apr 30 06:52:29 2020 us=802918 192.168.11.1:54864 TLS: Initial packet from [AF_INET6]::ffff:192.168.11.1:54864, sid=e0712351 bd1eac6d
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 VERIFY OK: depth=1, C=US, ST=CA, L=SanFrancisco, O=OpenVPN, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 VERIFY OK: depth=0, C=US, ST=CA, L=SanFrancisco, O=OpenVPN, OU=changeme, CN=changeme, name=changeme, emailAddress=mail@host.domain
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_VER=2.4.4
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_PLAT=win
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_PROTO=2
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_NCP=2
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_LZ4=1
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_LZ4v2=1
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_LZO=1
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_COMP_STUB=1
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_COMP_STUBv2=1
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_TCPNL=1
Thu Apr 30 06:52:29 2020 us=849789 192.168.11.1:54864 peer info: IV_GUI_VER=OpenVPN_GUI_11
Thu Apr 30 06:52:29 2020 us=865400 192.168.11.1:54864 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Apr 30 06:52:29 2020 us=865400 192.168.11.1:54864 [changeme] Peer Connection Initiated with [AF_INET6]::ffff:192.168.11.1:54864
Thu Apr 30 06:52:29 2020 us=865400 changeme/192.168.11.1:54864 MULTI_sva: pool returned IPv4=172.1.1.6, IPv6=(Not enabled)
Thu Apr 30 06:52:29 2020 us=865400 changeme/192.168.11.1:54864 MULTI: Learn: 172.1.1.6 -> changeme/192.168.11.1:54864
Thu Apr 30 06:52:29 2020 us=865400 changeme/192.168.11.1:54864 MULTI: primary virtual IP for changeme/192.168.11.1:54864: 172.1.1.6
Thu Apr 30 06:52:30 2020 us=881044 changeme/192.168.11.1:54864 PUSH: Received control message: 'PUSH_REQUEST'
Thu Apr 30 06:52:30 2020 us=881044 changeme/192.168.11.1:54864 SENT CONTROL [changeme]: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 8.8.8.8,route 172.1.1.0 255.255.255.0,topology net30,ping 10,ping-restart 120,ifconfig 172.1.1.6 172.1.1.5,peer-id 0,cipher AES-256-GCM' (status=1)
Thu Apr 30 06:52:30 2020 us=881044 changeme/192.168.11.1:54864 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Apr 30 06:52:30 2020 us=881044 changeme/192.168.11.1:54864 Data Channel MTU parms [ L:1552 D:1450 EF:52 EB:406 ET:0 EL:3 ]
Thu Apr 30 06:52:30 2020 us=881044 changeme/192.168.11.1:54864 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Apr 30 06:52:30 2020 us=881044 changeme/192.168.11.1:54864 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Apr 30 06:52:31 2020 us=396664 changeme/192.168.11.1:54864 MULTI: bad source address from client [::], packet dropped
 
Пожалуйста, обратите внимание, что пользователь заблокирован
Только свой собственный VPN если поднимать, никаких сторонних сервисов по возможности, либо только в контексте своей схемы.
На пальцах так просто не расскажешь.
 


Напишите ответ...
  • Вставить:
Прикрепить файлы
Верх