Perl script to delete file based on filename character

I had list of random file with the following title :

SQjb2LNl  7XUPq4pE33  BfXleRiBEs  DScVfSTsmp  g98OFxz2Qy  ILAct4iIj6    kwO1CyUMfD      NDooi2dgzK      PPWVzWKSwU  s3nj04fMuG  UIL7ywnzGo      wughd2WRh5  ZAZjFiudHt
39TFHrbdFc  7XUrHjgPq7  BfXM2XVgMp  DScXFGQuYc  g99G9Lk0X0  ILAFJ9iQjH    KwoaLh0EKN      NDOVoveuoE      ppwWQ3w2A1  s3nJj5bnhJ  uILFVt2YHP      wUGhzV43Xk  ZaZlhRXpsp
39toXq0R6p  7xuXcgXcxU  BFXnAsoL5Z  dscZ8LysSH  G99vjNZeks  iLaGbhaCW7    kWob3qoT9n      NDOYO7gbMx      ppWX3JObX7  s3NJUE465L  uiLhd6Sxii      WuGJnRIZR2  zazmXjqYZ7
39U7jTRy8y  7xUyotFrly  BfXp3Q2Two  dSCzDw0byL  g9a0vLKpJv  IlAjkfH8mn    KwoCDNhW5g      NDp0eU0TjO      PpwYC9CqnG  S3NMVcc4va  UilI72Bw0o      wugm2aKMwT  zAZnbyixd5
39Ui9in6xN  7XuZBiDTpA  BFXPrL5Izj  dSD3x3OM43  G9aCZLn44P  IlaJp098s4    kWOCjOfZYp      nDP12tgUXi      Ppx11IGezl  s3noT2ti9q  UilIfElLiB      WugQbXIliR  zazogpQUIZ
39UPFbH1xr  7xUzhUUzE5  bFXq3j1Thx  DSd9tQnfis  g9aiXtwuU5  ilAleaQfgm    kWOkNyRgey      Ndp4uNOeVK      ppX2WtUIEK  S3nXZojsN9  UiLioaP5Vj      WuGtkUd7vo  ZaZoLC9mDU
39uPhykrG6  7XV83jOLLs  bfXTB8pVF8  dSDbuPHqAt  g9AJiNqwjk  ILARXYbcwy    KWOMlpjHhS      NDpa2BkAPi      pPX3TbonIY  S3obC4D7iJ  uILpjtM1bS      wUH0sLrm4w  ZazRQK1ovf
39UsKLZ2uo  7XvCUqHZzE  bFXTRfzmCo  dSDdHuDY4q  G9ARfJIlJX  IlatV1EOvv    kWOnBztryB      NdpE4d2gn7      pPX4bqUSlB  S3ohRIY3cj  uilqxZKS6i      WUh348a8nl  zAZrxJGHZc
39uz22D02M  7xVFhYWHef  bFXuiQ7woi  dsDE4nIeNk  G9ATGzugP0  ilAUZ2zYM5    kwOUdUWQFl      nDPE4JkK85      PpX9S1C11x  S3Oiia6rEU  UiLt3NP012      WUh4bzkzFq  zAztwimlGj
39v4Ix6cAL  7XvPjpZO9R  BFXVgk9cov  dSdJxYq3UC  G9ATP2cZtY  ILax6AuZbF    KWouvkVMO9      ndpFYRNgIw      PPXcDJNc96  s3oKlOzSZs  uILX65VCgG      wUHAsBXLgk  ZB0377Cuhb
39vAFo96h8  7xvPZX4NiS  BFXx9KUgVT  DSdmb63vmo  G9BHWCUfFs  ILay12gaNZ    KwOxWpWR18      Ndpg7TRXaB      ppXdbY9HYl  s3OMKa2TGx  uilzI7gGI3      WUhB1To6eY  Zb0cG66lDq
39VNQKKHoF  7XVRTBUz3E  bFY1hoLDKM  dSdMZBPXoc  G9BJx5LeGc  IlayqNkuWH    KWoXXO4Aem      NdpI4IR4CP      pPXia2ItD9  S3oPA0J1FR  Uilzze3n3p      wuHbhOQAcN  ZB0Cm75ZAt
39W9aHgRoY  7XVVI8F6vf  BfY2y2NAlu  DSDQtPHe9w  g9bM8a171h  iLB5GHaXjy    kWpaQpSvQD      NdPiKJrceD      ppxJmb9cZg  s3OSdZBD1v  uIm8DHfVdq      WuHDPVGVrI  zb0mm1ACMC
39wC6gXShg  7xVWd0JpRS  bfY63S1IbC  DsDsN5R9Ax  g9boByCEzb  ilB6ovam7w

but it had eat upto 20 GB of diskspace..

one of similiarities is the count of character used in filename..

so , I did the following to delete it.. few thousand of them..

my $dir = "/tmp";
opendir (DH,$dir);
while (my $f = readdir (DH)) {
 my $char = split ("",$f);
 print scalar $char . " : $f \n";
 if ( $char = 10 ) {
 #system ( "rm -rf /tmp/".$f);
 $file = $dir."/".$f;
 unlink $file or warn "Could not unlink $file: $!";
 print "deleted : $file"."\n";
 }
};
closedir(DH)

Get Free Email Updates!

Signup now and receive an email once I publish new content.

I will never give away, trade or sell your email address. You can unsubscribe at any time.

Like

Related Post

4 Responses

  1. aminbaik says:

    Hello,
    I installed openvpn access server on centos
    when i tried to connect through sstp is work and when i tried to connect normally it’s not.
    when i tried to connect through private tunnel company it’s work normal without sstp.
    in this case the problem is with my server configuration.
    private tunnel company work under port tcp 443 and me two but i not that the they use a certifcate regarding the log.
    now there is the log when i am try to connect to my server:
    ====
    Tue Feb 21 15:51:21 2012 OpenVPNAS 2.1.8OAS Win32-MSVC++ [SSL] [LZO2] built on Aug 4 2011
    Tue Feb 21 15:51:21 2012 MANAGEMENT: Connected to management server at 127.0.0.1:36981
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘state on’
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘echo on’
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘bytecount 5?
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘hold off’
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘hold release’
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘username “Auth” “openvpn”‘
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘password […]‘
    Tue Feb 21 15:51:21 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 15:51:22 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 15:51:23 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 15:51:23 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:51:23 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:51:23 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 15:51:23 2012 UDPv4 link local: [undef]
    Tue Feb 21 15:51:23 2012 UDPv4 link remote: 208.67.18.35:1194
    Tue Feb 21 15:51:23 2012 MANAGEMENT: >STATE:1329832283,WAIT,,,
    Tue Feb 21 15:51:23 2012 MANAGEMENT: >STATE:1329832283,AUTH,,,
    Tue Feb 21 15:51:23 2012 TLS: Initial packet from 208.67.18.35:1194, sid=f0dd7fe9 8dc9f0df
    Tue Feb 21 15:52:23 2012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Tue Feb 21 15:52:23 2012 TLS Error: TLS handshake failed
    Tue Feb 21 15:52:23 2012 SIGUSR1[soft,tls-error] received, process restarting
    Tue Feb 21 15:52:23 2012 MANAGEMENT: >STATE:1329832343,RECONNECTING,tls-error,,
    Tue Feb 21 15:52:23 2012 Restart pause, 2 second(s)
    Tue Feb 21 15:52:25 2012 MANAGEMENT: CMD ‘username “Auth” “openvpn”‘
    Tue Feb 21 15:52:25 2012 MANAGEMENT: CMD ‘password […]‘
    Tue Feb 21 15:52:25 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 15:52:26 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 15:52:26 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 15:52:26 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:52:26 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:52:26 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 15:52:26 2012 UDPv4 link local: [undef]
    Tue Feb 21 15:52:26 2012 UDPv4 link remote: 208.67.18.35:1194
    Tue Feb 21 15:52:26 2012 MANAGEMENT: >STATE:1329832346,WAIT,,,
    Tue Feb 21 15:52:26 2012 MANAGEMENT: >STATE:1329832346,AUTH,,,
    Tue Feb 21 15:52:26 2012 TLS: Initial packet from 208.67.18.35:1194, sid=38a690ba dc3e5627
    Tue Feb 21 15:53:26 2012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Tue Feb 21 15:53:26 2012 TLS Error: TLS handshake failed
    Tue Feb 21 15:53:26 2012 SIGUSR1[soft,tls-error] received, process restarting
    Tue Feb 21 15:53:26 2012 MANAGEMENT: >STATE:1329832406,RECONNECTING,tls-error,,
    Tue Feb 21 15:53:26 2012 Restart pause, 2 second(s)
    Tue Feb 21 15:53:28 2012 MANAGEMENT: CMD ‘username “Auth” “openvpn”‘
    Tue Feb 21 15:53:28 2012 MANAGEMENT: CMD ‘password […]‘
    Tue Feb 21 15:53:28 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 15:53:29 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 15:53:29 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 15:53:29 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:53:29 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:53:29 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 15:53:29 2012 Attempting to establish TCP connection with 208.67.18.35:443
    Tue Feb 21 15:53:29 2012 MANAGEMENT: >STATE:1329832409,TCP_CONNECT,,,
    Tue Feb 21 15:53:29 2012 TCP connection established with 208.67.18.35:443
    Tue Feb 21 15:53:29 2012 TCPv4_CLIENT link local: [undef]
    Tue Feb 21 15:53:29 2012 TCPv4_CLIENT link remote: 208.67.18.35:443
    Tue Feb 21 15:53:29 2012 MANAGEMENT: >STATE:1329832409,WAIT,,,
    Tue Feb 21 15:53:29 2012 MANAGEMENT: >STATE:1329832409,AUTH,,,
    Tue Feb 21 15:53:29 2012 TLS: Initial packet from 208.67.18.35:443, sid=a3f67d87 22e47db4
    Tue Feb 21 15:54:18 2012 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
    Tue Feb 21 15:54:18 2012 Connection reset, restarting [-1]
    Tue Feb 21 15:54:18 2012 SIGUSR1[soft,connection-reset] received, process restarting
    Tue Feb 21 15:54:18 2012 MANAGEMENT: >STATE:1329832458,RECONNECTING,connection-reset,,
    Tue Feb 21 15:54:18 2012 Restart pause, 5 second(s)
    Tue Feb 21 15:54:23 2012 MANAGEMENT: CMD ‘username “Auth” “openvpn”‘
    Tue Feb 21 15:54:23 2012 MANAGEMENT: CMD ‘password […]‘
    Tue Feb 21 15:54:23 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 15:54:24 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 15:54:24 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 15:54:24 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:54:24 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:54:24 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 15:54:24 2012 UDPv4 link local: [undef]
    Tue Feb 21 15:54:24 2012 UDPv4 link remote: 208.67.18.35:1194
    Tue Feb 21 15:54:24 2012 MANAGEMENT: >STATE:1329832464,WAIT,,,
    Tue Feb 21 15:54:25 2012 MANAGEMENT: >STATE:1329832465,AUTH,,,
    Tue Feb 21 15:54:25 2012 TLS: Initial packet from 208.67.18.35:1194, sid=5d7efec5 d86fdf83
    Tue Feb 21 15:55:24 2012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Tue Feb 21 15:55:24 2012 TLS Error: TLS handshake failed
    Tue Feb 21 15:55:24 2012 SIGUSR1[soft,tls-error] received, process restarting
    Tue Feb 21 15:55:24 2012 MANAGEMENT: >STATE:1329832524,RECONNECTING,tls-error,,
    Tue Feb 21 15:55:24 2012 Restart pause, 2 second(s)
    Tue Feb 21 15:55:26 2012 MANAGEMENT: CMD ‘username “Auth” “openvpn”‘
    Tue Feb 21 15:55:26 2012 MANAGEMENT: CMD ‘password […]‘
    Tue Feb 21 15:55:26 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 15:55:27 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 15:55:27 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 15:55:27 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:55:27 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 15:55:27 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 15:55:27 2012 UDPv4 link local: [undef]
    Tue Feb 21 15:55:27 2012 UDPv4 link remote: 208.67.18.35:1194
    Tue Feb 21 15:55:27 2012 MANAGEMENT: >STATE:1329832527,WAIT,,,
    Tue Feb 21 15:55:28 2012 MANAGEMENT: >STATE:1329832528,AUTH,,,
    Tue Feb 21 15:55:28 2012 TLS: Initial packet from 208.67.18.35:1194, sid=a27753c0 fb1c2706
    ====
    and this when i try to connect to private-tunnel server:
    =====
    Tue Feb 21 18:54:58 2012 OpenVPNAS 2.1.18OAS Win32-MSVC++ [SSL] [LZO2] built on Nov 12 2011
    Tue Feb 21 18:54:58 2012 MANAGEMENT: Connected to management server at 127.0.0.1:33050
    Tue Feb 21 18:54:58 2012 MANAGEMENT: CMD ‘state on’
    Tue Feb 21 18:54:58 2012 MANAGEMENT: CMD ‘echo on’
    Tue Feb 21 18:54:58 2012 MANAGEMENT: CMD ‘bytecount 1?
    Tue Feb 21 18:54:58 2012 MANAGEMENT: CMD ‘hold off’
    Tue Feb 21 18:54:58 2012 MANAGEMENT: CMD ‘hold release’
    Tue Feb 21 18:54:58 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 18:54:59 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 18:54:59 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 18:54:59 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:54:59 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:54:59 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 18:54:59 2012 MANAGEMENT: >STATE:1329843299,RESOLVE,,,
    Tue Feb 21 18:54:59 2012 UDPv4 link local: [undef]
    Tue Feb 21 18:54:59 2012 UDPv4 link remote: 69.46.69.194:1194
    Tue Feb 21 18:54:59 2012 MANAGEMENT: >STATE:1329843299,WAIT,,,
    Tue Feb 21 18:55:00 2012 MANAGEMENT: >STATE:1329843300,AUTH,,,
    Tue Feb 21 18:55:00 2012 TLS: Initial packet from 69.46.69.194:1194, sid=5dfc45c7 256914a7
    Tue Feb 21 18:55:59 2012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Tue Feb 21 18:55:59 2012 TLS Error: TLS handshake failed
    Tue Feb 21 18:55:59 2012 SIGUSR1[soft,tls-error] received, process restarting
    Tue Feb 21 18:55:59 2012 MANAGEMENT: >STATE:1329843359,RECONNECTING,tls-error,,
    Tue Feb 21 18:55:59 2012 Restart pause, 10 second(s)
    Tue Feb 21 18:56:09 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 18:56:10 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 18:56:10 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 18:56:10 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:56:10 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:56:10 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 18:56:10 2012 MANAGEMENT: >STATE:1329843370,RESOLVE,,,
    Tue Feb 21 18:56:10 2012 UDPv4 link local: [undef]
    Tue Feb 21 18:56:10 2012 UDPv4 link remote: 69.46.69.194:1194
    Tue Feb 21 18:56:10 2012 MANAGEMENT: >STATE:1329843370,WAIT,,,
    Tue Feb 21 18:56:12 2012 MANAGEMENT: >STATE:1329843372,AUTH,,,
    Tue Feb 21 18:56:12 2012 TLS: Initial packet from 69.46.69.194:1194, sid=dbc6ba57 5a135245
    Tue Feb 21 18:57:10 2012 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
    Tue Feb 21 18:57:10 2012 TLS Error: TLS handshake failed
    Tue Feb 21 18:57:10 2012 SIGUSR1[soft,tls-error] received, process restarting
    Tue Feb 21 18:57:10 2012 MANAGEMENT: >STATE:1329843430,RECONNECTING,tls-error,,
    Tue Feb 21 18:57:10 2012 Restart pause, 10 second(s)
    Tue Feb 21 18:57:20 2012 MANAGEMENT: CMD ‘remote ACCEPT’
    Tue Feb 21 18:57:21 2012 NOTE: OpenVPNAS 2.1 requires ‘–script-security 2? or higher to call user-defined scripts or executables
    Tue Feb 21 18:57:21 2012 Control Channel Authentication: tls-auth using INLINE static key file
    Tue Feb 21 18:57:21 2012 Outgoing Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:57:21 2012 Incoming Control Channel Authentication: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:57:21 2012 Socket Buffers: R=[8192->100000] S=[8192->100000]
    Tue Feb 21 18:57:21 2012 MANAGEMENT: >STATE:1329843441,RESOLVE,,,
    Tue Feb 21 18:57:21 2012 Attempting to establish TCP connection with 69.46.69.194:443
    Tue Feb 21 18:57:21 2012 MANAGEMENT: >STATE:1329843441,TCP_CONNECT,,,
    Tue Feb 21 18:57:23 2012 TCP connection established with 69.46.69.194:443
    Tue Feb 21 18:57:23 2012 TCPv4_CLIENT link local: [undef]
    Tue Feb 21 18:57:23 2012 TCPv4_CLIENT link remote: 69.46.69.194:443
    Tue Feb 21 18:57:23 2012 MANAGEMENT: >STATE:1329843443,WAIT,,,
    Tue Feb 21 18:57:25 2012 MANAGEMENT: >STATE:1329843445,AUTH,,,
    Tue Feb 21 18:57:25 2012 TLS: Initial packet from 69.46.69.194:443, sid=6aa870f3 be15f13d
    Tue Feb 21 18:57:30 2012 VERIFY OK: depth=1, /CN=OpenVPN_CA
    Tue Feb 21 18:57:30 2012 VERIFY OK: nsCertType=SERVER
    Tue Feb 21 18:57:30 2012 VERIFY OK: depth=0, /CN=OpenVPN_Server
    Tue Feb 21 18:57:45 2012 Data Channel Encrypt: Cipher ‘BF-CBC’ initialized with 128 bit key
    Tue Feb 21 18:57:45 2012 Data Channel Encrypt: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:57:45 2012 Data Channel Decrypt: Cipher ‘BF-CBC’ initialized with 128 bit key
    Tue Feb 21 18:57:45 2012 Data Channel Decrypt: Using 160 bit message hash ‘SHA1? for HMAC authentication
    Tue Feb 21 18:57:45 2012 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 1024 bit RSA
    Tue Feb 21 18:57:45 2012 [OpenVPN_Server] Peer Connection Initiated with 69.46.69.194:443
    Tue Feb 21 18:57:46 2012 MANAGEMENT: >STATE:1329843466,GET_CONFIG,,,
    Tue Feb 21 18:57:47 2012 SENT CONTROL [OpenVPN_Server]: ‘PUSH_REQUEST’ (status=1)
    Tue Feb 21 18:57:51 2012 PUSH: Received control message: ‘PUSH_REPLY,explicit-exit-notify,topology subnet,route-delay 5 30,dhcp-pre-release,dhcp-renew,dhcp-release,route-metric 101,ping 5,ping-restart 40,socket-flags TCP_NODELAY,redirect-gateway def1,redirect-gateway bypass-dhcp,redirect-gateway autolocal,route-gateway 5.5.0.1,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,register-dns,comp-lzo yes,ifconfig 5.5.96.130 255.255.0.0?
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: timers and/or timeouts modified
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: –explicit-exit-notify can only be used with –proto udp
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: LZO parms modified
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: –socket-flags option modified
    Tue Feb 21 18:57:51 2012 Socket flags: TCP_NODELAY=1 succeeded
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: –ifconfig/up options modified
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: route options modified
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: route-related options modified
    Tue Feb 21 18:57:51 2012 OPTIONS IMPORT: –ip-win32 and/or –dhcp-option options modified
    Tue Feb 21 18:57:51 2012 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=14 HWADDR=48:5d:60:a7:d6:49
    Tue Feb 21 18:57:51 2012 MANAGEMENT: >STATE:1329843471,ASSIGN_IP,,5.5.96.130,
    Tue Feb 21 18:57:51 2012 TAP-WIN32 device [Local Area Connection 2] opened: \.Global{F338B583-02ED-42E3-BBBA-299FF986C83B}.tap
    Tue Feb 21 18:57:51 2012 TAP-Win32 Driver Version 9.7
    Tue Feb 21 18:57:51 2012 Set TAP-Win32 TUN subnet mode network/local/netmask = 5.5.0.0/5.5.96.130/255.255.0.0 [SUCCEEDED]
    Tue Feb 21 18:57:51 2012 Notified TAP-Win32 driver to set a DHCP IP/netmask of 5.5.96.130/255.255.0.0 on interface {F338B583-02ED-42E3-BBBA-299FF986C83B} [DHCP-serv: 5.5.0.1, lease-time: 31536000]
    Tue Feb 21 18:57:51 2012 Successful ARP Flush on interface [22] {F338B583-02ED-42E3-BBBA-299FF986C83B}
    Tue Feb 21 18:57:55 2012 TAP: DHCP address released
    Tue Feb 21 18:57:59 2012 TAP: DHCP address renewal succeeded
    Tue Feb 21 18:58:04 2012 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
    Tue Feb 21 18:58:04 2012 ROUTE remote_host is NOT LOCAL
    Tue Feb 21 18:58:04 2012 C:Windowssystem32route.exe ADD 69.46.69.194 MASK 255.255.255.255 192.168.1.1
    Tue Feb 21 18:58:04 2012 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
    Tue Feb 21 18:58:04 2012 Route addition via IPAPI succeeded [adaptive]
    Tue Feb 21 18:58:04 2012 C:Windowssystem32route.exe ADD 0.0.0.0 MASK 128.0.0.0 5.5.0.1
    Tue Feb 21 18:58:04 2012 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Tue Feb 21 18:58:04 2012 Route addition via IPAPI succeeded [adaptive]
    Tue Feb 21 18:58:04 2012 C:Windowssystem32route.exe ADD 128.0.0.0 MASK 128.0.0.0 5.5.0.1
    Tue Feb 21 18:58:04 2012 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
    Tue Feb 21 18:58:04 2012 Route addition via IPAPI succeeded [adaptive]
    Tue Feb 21 18:58:04 2012 Initialization Sequence Completed
    Tue Feb 21 18:58:04 2012 MANAGEMENT: >STATE:1329843484,CONNECTED,SUCCESS,5.5.96.130,69.46.69.194
    Tue Feb 21 18:58:04 2012 Start net commands…
    Tue Feb 21 18:58:04 2012 C:WINDOWSsystem32net.exe stop dnscache
    The DNS Client service is stopping.
    The DNS Client service could not be stopped.
    Tue Feb 21 18:58:07 2012 C:WINDOWSsystem32net.exe start dnscache
    The requested service has already been started.
    More help is available by typing NET HELPMSG 2182.
    Tue Feb 21 18:58:07 2012 ERROR: Windows ipconfig command failed: returned error code 2
    Tue Feb 21 18:58:07 2012 C:WINDOWSsystem32ipconfig.exe /flushdns
    Windows IP Configuration
    Successfully flushed the DNS Resolver Cache.
    Tue Feb 21 18:58:07 2012 C:WINDOWSsystem32ipconfig.exe /registerdns
    Windows IP Configuration
    Registration of the DNS resource records for all adapters of this computer has been initiated. Any errors will be reported in the Event Viewer in 15 minutes.
    Tue Feb 21 18:58:10 2012 End net commands…
    Tue Feb 21 19:04:25 2012 MANAGEMENT: CMD ‘exit’
    Tue Feb 21 19:04:25 2012 MANAGEMENT: Client disconnected
    Tue Feb 21 19:04:25 2012 MANAGEMENT: Triggering management exit
    Tue Feb 21 19:04:25 2012 C:Windowssystem32route.exe DELETE 69.46.69.194 MASK 255.255.255.255 192.168.1.1
    Tue Feb 21 19:04:25 2012 Route deletion via IPAPI succeeded [adaptive]
    Tue Feb 21 19:04:25 2012 C:Windowssystem32route.exe DELETE 0.0.0.0 MASK 128.0.0.0 5.5.0.1
    Tue Feb 21 19:04:25 2012 Route deletion via IPAPI succeeded [adaptive]
    Tue Feb 21 19:04:25 2012 C:Windowssystem32route.exe DELETE 128.0.0.0 MASK 128.0.0.0 5.5.0.1
    Tue Feb 21 19:04:25 2012 Route deletion via IPAPI succeeded [adaptive]
    Tue Feb 21 19:04:25 2012 Closing TUN/TAP interface
    Tue Feb 21 19:04:25 2012 TAP: DHCP address released
    Tue Feb 21 19:04:25 2012 SIGTERM[soft,management-exit] received, process exiting
    Tue Feb 21 19:04:25 2012 MANAGEMENT: >STATE:1329843865,EXITING,management-exit,,
    =====
    as you see that there is a deferent with a certificate issue. so what do u think?
    please not that the two servers are work under same ports.
    Thanks.

    Reply
  2. Smith says:

    Hey thanks for this. But I ended up with some errors. I tried fixing them but to no success. I Googled more and I found this: http://www.l337fx.com/openvpn-vz-vps-bash-script-centos.html

    Does that bash script would work ? Please help ! I really need the OpenVPN to be installed 🙁
    Oh and my OS is CentOS 6

    Reply
  3. Cisco says:

    I simply couldn’t depart your website before suggesting that I really enjoyed the standard information a person supply in your visitors? Is gonna be again ceaselessly to check up on new posts

    Reply
  4. Mckenzie says:

    I аm nο longer ρositive wherе уоu’re getting your information, however good topic. I needs to spend some time finding out much more or working out more. Thank you for fantastic info I was searching for this info for my mission.

    My blog post Mckenzie

    Reply

Anything to add?

X