Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Thu Apr 18 19:57:15 2019 AEAD Decrypt error: bad packet ID (may be a replay): [ #2969515 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- Thu Apr 18 20:46:34 2019 TLS: tls_process: killed expiring key
- Thu Apr 18 20:46:35 2019 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Thu Apr 18 20:46:35 2019 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
- Thu Apr 18 20:46:35 2019 VERIFY KU OK
- Thu Apr 18 20:46:35 2019 Validating certificate extended key usage
- Thu Apr 18 20:46:35 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Thu Apr 18 20:46:35 2019 VERIFY EKU OK
- Thu Apr 18 20:46:35 2019 VERIFY OK: depth=0, CN=ca455.nordvpn.com
- Thu Apr 18 20:46:35 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu Apr 18 20:46:35 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu Apr 18 20:46:35 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Thu Apr 18 21:46:35 2019 TLS: tls_process: killed expiring key
- Thu Apr 18 21:46:35 2019 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Thu Apr 18 21:46:35 2019 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
- Thu Apr 18 21:46:35 2019 VERIFY KU OK
- Thu Apr 18 21:46:35 2019 Validating certificate extended key usage
- Thu Apr 18 21:46:35 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Thu Apr 18 21:46:35 2019 VERIFY EKU OK
- Thu Apr 18 21:46:35 2019 VERIFY OK: depth=0, CN=ca455.nordvpn.com
- Thu Apr 18 21:46:35 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu Apr 18 21:46:35 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu Apr 18 21:46:35 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Thu Apr 18 22:27:26 2019 event_wait : Interrupted system call (code=4)
- Thu Apr 18 22:27:26 2019 SIGTERM received, sending exit notification to peer
- Thu Apr 18 22:27:27 2019 /sbin/ip route del 185.153.179.10/32
- Thu Apr 18 22:27:28 2019 /sbin/ip route del 0.0.0.0/1
- Thu Apr 18 22:27:28 2019 /sbin/ip route del 128.0.0.0/1
- Thu Apr 18 22:27:28 2019 Closing TUN/TAP interface
- Thu Apr 18 22:27:28 2019 /sbin/ip addr del dev tun0 10.8.3.60/24
- Thu Apr 18 22:27:28 2019 /etc/openvpn/tunnelDown.sh tun0 1500 1585 10.8.3.60 255.255.255.0 init
- Thu Apr 18 22:27:28 2019 SIGTERM[soft,exit-with-notification] received, process exiting
- Using OpenVPN provider: NORDVPN
- Setting NORDVPN_PROTOCOL to: UDP
- 2019-04-18 22:33:11 Checking curl installation
- 2019-04-18 22:33:11 Removing existing configs
- 2019-04-18 22:33:11 Selecting the best server...
- 2019-04-18 22:33:11 Searching for group: legacy_p2p
- 2019-04-18 22:33:11 Searching for technology: openvpn_udp
- 2019-04-18 22:33:11 Best server : ca561.nordvpn.com
- 2019-04-18 22:33:11 Downloading config: default.ovpn
- 2019-04-18 22:33:11 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_udp/servers/ca561.nordvpn.com.udp.ovpn
- % Total % Received % Xferd Average Speed Time Time Time Current
- Dload Upload Total Spent Left Speed
- 100 2811 100 2811 0 0 10511 0 --:--:-- --:--:-- --:--:-- 10528
- 2019-04-18 22:33:11 Using OpenVPN CONFIG :: ca ca570.nordvpn.com.udp
- 2019-04-18 22:33:11 Downloading config: ca.ovpn
- 2019-04-18 22:33:11 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_udp/servers/ca.ovpn
- % Total % Received % Xferd Average Speed Time Time Time Current
- Dload Upload Total Spent Left Speed
- 100 162 100 162 0 0 238 0 --:--:-- --:--:-- --:--:-- 238
- 2019-04-18 22:33:11 Checking line endings
- 2019-04-18 22:33:11 Updating configs for docker-transmission-openvpn
- Supplied config CA ca570.nordvpn.com.udp.ovpn could not be found.
- Using default OpenVPN gateway for provider nordvpn
- Setting OPENVPN credentials...
- adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
- Thu Apr 18 22:33:14 2019 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 19 2019
- Thu Apr 18 22:33:14 2019 library versions: OpenSSL 1.0.2g 1 Mar 2016, LZO 2.08
- Thu Apr 18 22:33:14 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu Apr 18 22:33:14 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu Apr 18 22:33:14 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu Apr 18 22:33:14 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]104.200.132.220:1194
- Thu Apr 18 22:33:14 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Thu Apr 18 22:33:14 2019 UDP link local: (not bound)
- Thu Apr 18 22:33:14 2019 UDP link remote: [AF_INET]104.200.132.220:1194
- Thu Apr 18 22:33:14 2019 TLS: Initial packet from [AF_INET]104.200.132.220:1194, sid=066d61a4 3b266e4b
- Thu Apr 18 22:33:14 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu Apr 18 22:33:14 2019 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Thu Apr 18 22:33:14 2019 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
- Thu Apr 18 22:33:14 2019 VERIFY KU OK
- Thu Apr 18 22:33:14 2019 Validating certificate extended key usage
- Thu Apr 18 22:33:14 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Thu Apr 18 22:33:14 2019 VERIFY EKU OK
- Thu Apr 18 22:33:14 2019 VERIFY OK: depth=0, CN=ca561.nordvpn.com
- Thu Apr 18 22:33:14 2019 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Thu Apr 18 22:33:14 2019 [ca561.nordvpn.com] Peer Connection Initiated with [AF_INET]104.200.132.220:1194
- Thu Apr 18 22:33:15 2019 SENT CONTROL [ca561.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Thu Apr 18 22:33:15 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.1.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.1.9 255.255.255.0,peer-id 7,cipher AES-256-GCM'
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: explicit notify parm(s) modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: compression parms modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Thu Apr 18 22:33:15 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: route options modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: route-related options modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: peer-id set
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: adjusting link_mtu to 1657
- Thu Apr 18 22:33:15 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu Apr 18 22:33:15 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu Apr 18 22:33:15 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu Apr 18 22:33:15 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu Apr 18 22:33:15 2019 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:06
- Thu Apr 18 22:33:15 2019 TUN/TAP device tun0 opened
- Thu Apr 18 22:33:15 2019 TUN/TAP TX queue length set to 100
- Thu Apr 18 22:33:15 2019 /sbin/ip link set dev tun0 up mtu 1500
- Thu Apr 18 22:33:15 2019 /sbin/ip addr add dev tun0 10.8.1.9/24 broadcast 10.8.1.255
- Thu Apr 18 22:33:15 2019 /etc/openvpn/tunnelUp.sh tun0 1500 1585 10.8.1.9 255.255.255.0 init
- Up script executed with tun0 1500 1585 10.8.1.9 255.255.255.0 init
- Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.8.1.9
- Generating transmission settings.json from env variables
- sed'ing True to true
- -------------------------------------
- Transmission will run as
- -------------------------------------
- User name: root
- User uid: 0
- User gid: 0
- -------------------------------------
- STARTING TRANSMISSION
- NO PORT UPDATER FOR THIS PROVIDER
- Transmission startup script complete.
- Thu Apr 18 22:33:15 2019 /sbin/ip route add 104.200.132.220/32 via 172.17.0.1
- Thu Apr 18 22:33:15 2019 /sbin/ip route add 0.0.0.0/1 via 10.8.1.1
- Thu Apr 18 22:33:15 2019 /sbin/ip route add 128.0.0.0/1 via 10.8.1.1
- Thu Apr 18 22:33:15 2019 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement