Script started on Thu 22 Jun 2017 08:05:13 AM UTC ]0;robbat2@oystercatcher:~/eurobbat2@oystercatcher ~/eu $ bash fetch.sh * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 80 (#0) > GET /community/releases/openvpn-2.4.3.tar.gz HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:16 GMT < Content-Type: application/octet-stream < Content-Length: 1397306 < Connection: keep-alive < Set-Cookie: __cfduid=d5ad25edecea95c24661ac762389ebe8a1498118716; expires=Fri, 22-Jun-18 08:05:16 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Tue, 20 Jun 2017 13:11:10 GMT < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:16 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db398175964c3-FRA < { [6789 bytes data] 100 1364k 100 1364k 0 0 10.7M 0 --:--:-- --:--:-- --:--:-- 10.8M * Connection #0 to host swupdate.openvpn.net left intact * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 80 (#0) > GET /community/releases/openvpn-2.4.3.tar.gz.asc HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:16 GMT < Content-Type: application/octet-stream < Content-Length: 819 < Connection: keep-alive < Set-Cookie: __cfduid=d8c38ef3f211f215c70b9f7293dec86bb1498118716; expires=Fri, 22-Jun-18 08:05:16 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 10:19:35 GMT < ETag: "594a4837-333" < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:16 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db398e4a1647b-FRA < { [819 bytes data] 100 819 100 819 0 0 39027 0 --:--:-- --:--:-- --:--:-- 40950 * Connection #0 to host swupdate.openvpn.net left intact * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 443 (#0) * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [110 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2519 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate Status (22): { [479 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Client hello (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Client hello (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=US; ST=California; L=Pleasanton; O=OpenVPN Technologies, Inc.; CN=*.openvpn.net * start date: Mar 6 00:00:00 2017 GMT * expire date: May 13 12:00:00 2020 GMT * subjectAltName: host "swupdate.openvpn.net" matched cert's "*.openvpn.net" * issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA * SSL certificate verify ok. * SSL certificate status: good (0) } [5 bytes data] > GET /community/releases/openvpn-2.4.3.tar.gz HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > { [5 bytes data] < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:16 GMT < Content-Type: application/octet-stream < Content-Length: 1422692 < Connection: keep-alive < Set-Cookie: __cfduid=dbdc385d14f74ac056e2bbcfc9865d9c61498118716; expires=Fri, 22-Jun-18 08:05:16 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 13:06:20 GMT < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:16 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db3993a9663eb-FRA < { [858 bytes data] 100 1389k 100 1389k 0 0 11.9M 0 --:--:-- --:--:-- --:--:-- 12.0M * Connection #0 to host swupdate.openvpn.net left intact * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 443 (#0) * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [110 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2519 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate Status (22): { [479 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Client hello (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* TLSv1.2 (IN), TLS change cipher, Client hello (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=US; ST=California; L=Pleasanton; O=OpenVPN Technologies, Inc.; CN=*.openvpn.net * start date: Mar 6 00:00:00 2017 GMT * expire date: May 13 12:00:00 2020 GMT * subjectAltName: host "swupdate.openvpn.net" matched cert's "*.openvpn.net" * issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA * SSL certificate verify ok. * SSL certificate status: good (0) } [5 bytes data] > GET /community/releases/openvpn-2.4.3.tar.gz.asc HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > { [5 bytes data] < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:16 GMT < Content-Type: application/octet-stream < Content-Length: 819 < Connection: keep-alive < Set-Cookie: __cfduid=d864c2d32fb03c714d09a55416b8798231498118716; expires=Fri, 22-Jun-18 08:05:16 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 10:19:35 GMT < ETag: "594a4837-333" < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:16 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db399ea090f81-FRA < { [819 bytes data] 100 819 100 819 0 0 16787 0 --:--:-- --:--:-- --:--:-- 16714 * Connection #0 to host swupdate.openvpn.net left intact total 2804 drwxr-xr-x 2 robbat2 users 4096 Jun 22 08:05 . drwxr-xr-x 12 robbat2 users 4096 Jun 22 08:02 .. -rwxr-xr-x 1 robbat2 users 460 Jun 22 08:04 fetch.sh -rw-r--r-- 1 robbat2 users 1397306 Jun 22 08:05 http-openvpn-2.4.3.tar.gz -rw-r--r-- 1 robbat2 users 819 Jun 22 08:05 http-openvpn-2.4.3.tar.gz.asc -rw-r--r-- 1 robbat2 users 529 Jun 22 08:05 http-openvpn-2.4.3.tar.gz.asc.headers -rw-r--r-- 1 robbat2 users 511 Jun 22 08:05 http-openvpn-2.4.3.tar.gz.headers -rw-r--r-- 1 robbat2 users 1422692 Jun 22 08:05 https-openvpn-2.4.3.tar.gz -rw-r--r-- 1 robbat2 users 819 Jun 22 08:05 https-openvpn-2.4.3.tar.gz.asc -rw-r--r-- 1 robbat2 users 529 Jun 22 08:05 https-openvpn-2.4.3.tar.gz.asc.headers -rw-r--r-- 1 robbat2 users 511 Jun 22 08:05 https-openvpn-2.4.3.tar.gz.headers -rw-r--r-- 1 robbat2 users 8192 Jun 22 08:05 log.txt 177673c5e3f7d3433bb9c5f7728e5734 http-openvpn-2.4.3.tar.gz 5f482e4c16bd6762d6fc8897eb0ae498 http-openvpn-2.4.3.tar.gz.asc adabee5ee952d871933162d1aafdc880 http-openvpn-2.4.3.tar.gz.asc.headers 2d3ae8565fe550c9c5def6be337b2a28 http-openvpn-2.4.3.tar.gz.headers e1929f82aff40f3d105e5f72aacff9c1 https-openvpn-2.4.3.tar.gz 5f482e4c16bd6762d6fc8897eb0ae498 https-openvpn-2.4.3.tar.gz.asc 6febdf4aed2fc3b8ac4c8e6f02ffacf0 https-openvpn-2.4.3.tar.gz.asc.headers ad9e51b1a8d78e73e700066026fbf1ae https-openvpn-2.4.3.tar.gz.headers gpg: Signature made Wed Jun 21 10:19:19 2017 UTC gpg: using RSA key D72AF3448CC2B034 gpg: Can't check signature: No public key gpg: Signature made Wed Jun 21 10:19:19 2017 UTC gpg: using RSA key D72AF3448CC2B034 gpg: Can't check signature: No public key ]0;robbat2@oystercatcher:~/eurobbat2@oystercatcher ~/eu $ exit Script done on Thu 22 Jun 2017 08:07:02 AM UTC