Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- VPN4Games Version : 3.0.7
- Starting Connection
- Sun Nov 20 16:09:08 2016 OpenVPN 2.3.10 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Feb 1 2016
- Sun Nov 20 16:09:08 2016 Windows version 6.2 (Windows 8 or greater)
- Sun Nov 20 16:09:08 2016 library versions: OpenSSL 1.0.1r 28 Jan 2016, LZO 2.09
- Sun Nov 20 16:09:09 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sun Nov 20 16:09:09 2016 UDPv4 link remote: [AF_INET]27.254.61.15:1194
- Sun Nov 20 16:09:09 2016 TLS: Initial packet from [AF_INET]27.254.61.15:1194, sid=8d4294b4 475d5e6d
- Sun Nov 20 16:09:09 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Nov 20 16:09:09 2016 VERIFY OK: depth=1, CN=vpn4games
- Sun Nov 20 16:09:09 2016 Validating certificate key usage
- Sun Nov 20 16:09:09 2016 ++ Certificate has key usage 00a0, expects 00a0
- Sun Nov 20 16:09:09 2016 VERIFY KU OK
- Sun Nov 20 16:09:09 2016 Validating certificate extended key usage
- Sun Nov 20 16:09:09 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Nov 20 16:09:09 2016 VERIFY EKU OK
- Sun Nov 20 16:09:09 2016 VERIFY OK: depth=0, CN=vpn4games
- Sun Nov 20 16:09:10 2016 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 16:09:10 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 16:09:10 2016 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 16:09:10 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 16:09:10 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Nov 20 16:09:10 2016 [vpn4games] Peer Connection Initiated with [AF_INET]27.254.61.15:1194
- Sun Nov 20 16:09:12 2016 SENT CONTROL [vpn4games]: 'PUSH_REQUEST' (status=1)
- Sun Nov 20 16:09:12 2016 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,dhcp-option DNS 208.67.222.222,route 10.55.11.0 255.255.255.0,topology net30,ping 10,ping-restart 60,ifconfig 10.55.11.14 10.55.11.13'
- Sun Nov 20 16:09:12 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 20 16:09:12 2016 OPTIONS IMPORT: --persist options modified
- Sun Nov 20 16:09:12 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 20 16:09:12 2016 OPTIONS IMPORT: route options modified
- Sun Nov 20 16:09:12 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 20 16:09:12 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=50:e5:49:3a:63:0f
- Sun Nov 20 16:09:12 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sun Nov 20 16:09:12 2016 open_tun, tt->ipv6=0
- Sun Nov 20 16:09:12 2016 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{29676070-6321-43C3-9E2D-11AA931888AA}.tap
- Sun Nov 20 16:09:12 2016 TAP-Windows Driver Version 9.21
- Sun Nov 20 16:09:12 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.55.11.14/255.255.255.252 on interface {29676070-6321-43C3-9E2D-11AA931888AA} [DHCP-serv: 10.55.11.13, lease-time: 31536000]
- Sun Nov 20 16:09:12 2016 Successful ARP Flush on interface [4] {29676070-6321-43C3-9E2D-11AA931888AA}
- Sun Nov 20 16:09:17 2016 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Sun Nov 20 16:09:17 2016 C:\WINDOWS\system32\route.exe ADD 27.254.61.15 MASK 255.255.255.255 192.168.1.1
- Sun Nov 20 16:09:17 2016 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=2]
- Sun Nov 20 16:09:17 2016 Route addition via IPAPI failed [adaptive]
- Sun Nov 20 16:09:17 2016 Route addition fallback to route.exe
- Sun Nov 20 16:09:17 2016 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Sun Nov 20 16:09:17 2016 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.55.11.13
- Sun Nov 20 16:09:17 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 16:09:17 2016 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.55.11.13
- Sun Nov 20 16:09:17 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 16:09:17 2016 C:\WINDOWS\system32\route.exe ADD 10.55.11.0 MASK 255.255.255.0 10.55.11.13
- Sun Nov 20 16:09:17 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 16:09:17 2016 Initialization Sequence Completed
- Forcing Connection to terminate.
- VPN4Games Version : 3.0.7
- Starting Connection
- Sun Nov 20 16:14:38 2016 OpenVPN 2.3.10 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Feb 1 2016
- Sun Nov 20 16:14:38 2016 Windows version 6.2 (Windows 8 or greater)
- Sun Nov 20 16:14:38 2016 library versions: OpenSSL 1.0.1r 28 Jan 2016, LZO 2.09
- Sun Nov 20 16:14:39 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sun Nov 20 16:14:39 2016 UDPv4 link remote: [AF_INET]103.13.30.61:1194
- Sun Nov 20 16:14:39 2016 TLS: Initial packet from [AF_INET]103.13.30.61:1194, sid=895231ce 2451fbaf
- Sun Nov 20 16:14:39 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Nov 20 16:14:39 2016 VERIFY OK: depth=1, CN=vpn4games
- Sun Nov 20 16:14:39 2016 Validating certificate key usage
- Sun Nov 20 16:14:39 2016 ++ Certificate has key usage 00a0, expects 00a0
- Sun Nov 20 16:14:39 2016 VERIFY KU OK
- Sun Nov 20 16:14:39 2016 Validating certificate extended key usage
- Sun Nov 20 16:14:39 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Nov 20 16:14:39 2016 VERIFY EKU OK
- Sun Nov 20 16:14:39 2016 VERIFY OK: depth=0, CN=vpn4games
- Sun Nov 20 16:14:39 2016 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 16:14:39 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 16:14:39 2016 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 16:14:39 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 16:14:39 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Nov 20 16:14:39 2016 [vpn4games] Peer Connection Initiated with [AF_INET]103.13.30.61:1194
- Sun Nov 20 16:14:41 2016 SENT CONTROL [vpn4games]: 'PUSH_REQUEST' (status=1)
- Sun Nov 20 16:14:42 2016 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,dhcp-option DNS 208.67.222.222,route 10.55.11.0 255.255.255.0,topology net30,ping 10,ping-restart 60,ifconfig 10.55.11.6 10.55.11.5'
- Sun Nov 20 16:14:42 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 20 16:14:42 2016 OPTIONS IMPORT: --persist options modified
- Sun Nov 20 16:14:42 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 20 16:14:42 2016 OPTIONS IMPORT: route options modified
- Sun Nov 20 16:14:42 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 20 16:14:42 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=50:e5:49:3a:63:0f
- Sun Nov 20 16:14:42 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sun Nov 20 16:14:42 2016 open_tun, tt->ipv6=0
- Sun Nov 20 16:14:42 2016 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{29676070-6321-43C3-9E2D-11AA931888AA}.tap
- Sun Nov 20 16:14:42 2016 TAP-Windows Driver Version 9.21
- Sun Nov 20 16:14:42 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.55.11.6/255.255.255.252 on interface {29676070-6321-43C3-9E2D-11AA931888AA} [DHCP-serv: 10.55.11.5, lease-time: 31536000]
- Sun Nov 20 16:14:42 2016 Successful ARP Flush on interface [4] {29676070-6321-43C3-9E2D-11AA931888AA}
- Sun Nov 20 16:14:47 2016 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Sun Nov 20 16:14:47 2016 C:\WINDOWS\system32\route.exe ADD 103.13.30.61 MASK 255.255.255.255 192.168.1.1
- Sun Nov 20 16:14:47 2016 ROUTE: route addition failed using CreateIpForwardEntry: The object already exists. [status=5010 if_index=2]
- Sun Nov 20 16:14:47 2016 Route addition via IPAPI failed [adaptive]
- Sun Nov 20 16:14:47 2016 Route addition fallback to route.exe
- Sun Nov 20 16:14:47 2016 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Sun Nov 20 16:14:47 2016 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.55.11.5
- Sun Nov 20 16:14:47 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 16:14:47 2016 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.55.11.5
- Sun Nov 20 16:14:47 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 16:14:47 2016 C:\WINDOWS\system32\route.exe ADD 10.55.11.0 MASK 255.255.255.0 10.55.11.5
- Sun Nov 20 16:14:47 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 16:14:47 2016 Initialization Sequence Completed
- Sun Nov 20 19:19:54 2016 [vpn4games] Inactivity timeout (--ping-restart), restarting
- Sun Nov 20 19:19:54 2016 SIGUSR1[soft,ping-restart] received, process restarting
- Sun Nov 20 19:19:54 2016 Restart pause, 2 second(s)
- Sun Nov 20 19:19:56 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sun Nov 20 19:19:56 2016 UDPv4 link remote: [AF_INET]103.13.30.61:1194
- Sun Nov 20 19:19:56 2016 TLS: Initial packet from [AF_INET]103.13.30.61:1194, sid=de1e95ae 54dd1ee5
- Sun Nov 20 19:19:56 2016 VERIFY OK: depth=1, CN=vpn4games
- Sun Nov 20 19:19:56 2016 Validating certificate key usage
- Sun Nov 20 19:19:56 2016 ++ Certificate has key usage 00a0, expects 00a0
- Sun Nov 20 19:19:56 2016 VERIFY KU OK
- Sun Nov 20 19:19:56 2016 Validating certificate extended key usage
- Sun Nov 20 19:19:56 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Nov 20 19:19:56 2016 VERIFY EKU OK
- Sun Nov 20 19:19:56 2016 VERIFY OK: depth=0, CN=vpn4games
- Sun Nov 20 19:19:56 2016 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 19:19:56 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 19:19:56 2016 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 19:19:56 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 19:19:56 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Nov 20 19:19:56 2016 [vpn4games] Peer Connection Initiated with [AF_INET]103.13.30.61:1194
- Sun Nov 20 19:19:58 2016 SENT CONTROL [vpn4games]: 'PUSH_REQUEST' (status=1)
- Sun Nov 20 19:19:58 2016 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,dhcp-option DNS 208.67.222.222,route 10.55.11.0 255.255.255.0,topology net30,ping 10,ping-restart 60,ifconfig 10.55.11.6 10.55.11.5'
- Sun Nov 20 19:19:58 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 20 19:19:58 2016 OPTIONS IMPORT: --persist options modified
- Sun Nov 20 19:19:58 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 20 19:19:58 2016 OPTIONS IMPORT: route options modified
- Sun Nov 20 19:19:58 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 20 19:19:58 2016 Preserving previous TUN/TAP instance: Ethernet 3
- Sun Nov 20 19:19:58 2016 Initialization Sequence Completed
- Forcing Connection to terminate.
- VPN4Games Version : 3.0.7
- Starting Connection
- Sun Nov 20 19:20:47 2016 OpenVPN 2.3.10 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Feb 1 2016
- Sun Nov 20 19:20:47 2016 Windows version 6.2 (Windows 8 or greater)
- Sun Nov 20 19:20:47 2016 library versions: OpenSSL 1.0.1r 28 Jan 2016, LZO 2.09
- Sun Nov 20 19:20:48 2016 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sun Nov 20 19:20:48 2016 UDPv4 link remote: [AF_INET]122.155.168.38:1194
- Sun Nov 20 19:20:48 2016 TLS: Initial packet from [AF_INET]122.155.168.38:1194, sid=67054b75 51e3b43d
- Sun Nov 20 19:20:48 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Nov 20 19:20:48 2016 VERIFY OK: depth=1, CN=vpn4games
- Sun Nov 20 19:20:48 2016 Validating certificate key usage
- Sun Nov 20 19:20:48 2016 ++ Certificate has key usage 00a0, expects 00a0
- Sun Nov 20 19:20:48 2016 VERIFY KU OK
- Sun Nov 20 19:20:48 2016 Validating certificate extended key usage
- Sun Nov 20 19:20:48 2016 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Nov 20 19:20:48 2016 VERIFY EKU OK
- Sun Nov 20 19:20:48 2016 VERIFY OK: depth=0, CN=vpn4games
- Sun Nov 20 19:20:48 2016 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 19:20:48 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 19:20:48 2016 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- Sun Nov 20 19:20:48 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Sun Nov 20 19:20:48 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Nov 20 19:20:48 2016 [vpn4games] Peer Connection Initiated with [AF_INET]122.155.168.38:1194
- Sun Nov 20 19:20:51 2016 SENT CONTROL [vpn4games]: 'PUSH_REQUEST' (status=1)
- Sun Nov 20 19:20:51 2016 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 8.8.8.8,dhcp-option DNS 8.8.4.4,dhcp-option DNS 208.67.222.222,route 10.49.11.0 255.255.255.0,topology net30,ping 10,ping-restart 60,ifconfig 10.49.11.14 10.49.11.13'
- Sun Nov 20 19:20:51 2016 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Nov 20 19:20:51 2016 OPTIONS IMPORT: --persist options modified
- Sun Nov 20 19:20:51 2016 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Nov 20 19:20:51 2016 OPTIONS IMPORT: route options modified
- Sun Nov 20 19:20:51 2016 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Nov 20 19:20:51 2016 ROUTE_GATEWAY 192.168.1.1/255.255.255.0 I=2 HWADDR=50:e5:49:3a:63:0f
- Sun Nov 20 19:20:51 2016 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sun Nov 20 19:20:51 2016 open_tun, tt->ipv6=0
- Sun Nov 20 19:20:51 2016 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{29676070-6321-43C3-9E2D-11AA931888AA}.tap
- Sun Nov 20 19:20:51 2016 TAP-Windows Driver Version 9.21
- Sun Nov 20 19:20:51 2016 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.49.11.14/255.255.255.252 on interface {29676070-6321-43C3-9E2D-11AA931888AA} [DHCP-serv: 10.49.11.13, lease-time: 31536000]
- Sun Nov 20 19:20:51 2016 Successful ARP Flush on interface [4] {29676070-6321-43C3-9E2D-11AA931888AA}
- Sun Nov 20 19:20:51 2016 write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)
- Sun Nov 20 19:20:51 2016 write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)
- Sun Nov 20 19:20:51 2016 write UDPv4: No Route to Host (WSAEHOSTUNREACH) (code=10065)
- Sun Nov 20 19:20:56 2016 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Sun Nov 20 19:20:56 2016 C:\WINDOWS\system32\route.exe ADD 122.155.168.38 MASK 255.255.255.255 192.168.1.1
- Sun Nov 20 19:20:56 2016 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Sun Nov 20 19:20:56 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 19:20:56 2016 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.49.11.13
- Sun Nov 20 19:20:56 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 19:20:56 2016 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.49.11.13
- Sun Nov 20 19:20:56 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 19:20:56 2016 C:\WINDOWS\system32\route.exe ADD 10.49.11.0 MASK 255.255.255.0 10.49.11.13
- Sun Nov 20 19:20:56 2016 Route addition via IPAPI succeeded [adaptive]
- Sun Nov 20 19:20:56 2016 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement