Is there a way to suppress logging when running an OpenVPN client?
I get these messages every hour or so:
Apr 25 09:52:01 openvpn[13527]: TLS: tls_process: killed expiring key
Apr 25 09:52:03 openvpn[13527]: TLS: soft reset sec=-1 bytes=71210/0 pkts=1356/0
Apr 25 09:52:03 openvpn[13527]: VERIFY OK
Apr 25 09:52:03 openvpn[13527]: Validating certificate key usage
Apr 25 09:52:03 openvpn[13527]: ++ Certificate has key usage 00a0, expects 00a0
Apr 25 09:52:03 openvpn[13527]: VERIFY KU OK
Apr 25 09:52:03 openvpn[13527]: Validating certificate extended key usage
Apr 25 09:52:03 openvpn[13527]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Apr 25 09:52:03 openvpn[13527]: VERIFY EKU OK
Apr 25 09:52:03 openvpn[13527]: VERIFY OK
Apr 25 09:52:04 openvpn[13527]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 25 09:52:04 openvpn[13527]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 25 09:52:04 openvpn[13527]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 25 09:52:04 openvpn[13527]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 25 09:52:04 openvpn[13527]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
I get these messages every hour or so:
Apr 25 09:52:01 openvpn[13527]: TLS: tls_process: killed expiring key
Apr 25 09:52:03 openvpn[13527]: TLS: soft reset sec=-1 bytes=71210/0 pkts=1356/0
Apr 25 09:52:03 openvpn[13527]: VERIFY OK
Apr 25 09:52:03 openvpn[13527]: Validating certificate key usage
Apr 25 09:52:03 openvpn[13527]: ++ Certificate has key usage 00a0, expects 00a0
Apr 25 09:52:03 openvpn[13527]: VERIFY KU OK
Apr 25 09:52:03 openvpn[13527]: Validating certificate extended key usage
Apr 25 09:52:03 openvpn[13527]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Apr 25 09:52:03 openvpn[13527]: VERIFY EKU OK
Apr 25 09:52:03 openvpn[13527]: VERIFY OK
Apr 25 09:52:04 openvpn[13527]: Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 25 09:52:04 openvpn[13527]: Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 25 09:52:04 openvpn[13527]: Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
Apr 25 09:52:04 openvpn[13527]: Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Apr 25 09:52:04 openvpn[13527]: Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA