Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Nov 2 10:26:28 openvpn 69856 MANAGEMENT: Client disconnected
- Nov 2 10:26:28 openvpn 69856 MANAGEMENT: CMD 'status 2'
- Nov 2 10:26:28 openvpn 69856 MANAGEMENT: CMD 'state 1'
- Nov 2 10:26:28 openvpn 69856 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock
- Nov 2 10:26:24 openvpn 69856 Initialization Sequence Completed
- Nov 2 10:26:24 openvpn 69856 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 2 10:26:24 openvpn 69856 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.0.3 255.255.255.0 init
- Nov 2 10:26:24 openvpn 69856 /sbin/route add -net 10.8.0.0 10.8.0.1 255.255.255.0
- Nov 2 10:26:24 openvpn 69856 /sbin/ifconfig ovpnc1 10.8.0.3 10.8.0.1 mtu 1500 netmask 255.255.255.0 up
- Nov 2 10:26:24 openvpn 69856 TUN/TAP device /dev/tun1 opened
- Nov 2 10:26:24 openvpn 69856 TUN/TAP device ovpnc1 exists previously, keep at program end
- Nov 2 10:26:24 openvpn 69856 ROUTE_GATEWAY 66.158.128.24/255.255.255.255 IFACE=pppoe0 HWADDR=00:00:00:00:00:00
- Nov 2 10:26:24 openvpn 69856 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 10:26:24 openvpn 69856 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 10:26:24 openvpn 69856 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 10:26:24 openvpn 69856 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 10:26:24 openvpn 69856 Using peer cipher 'AES-256-CBC'
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: adjusting link_mtu to 1656
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: peer-id set
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: route-related options modified
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: route options modified
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: --ifconfig/up options modified
- Nov 2 10:26:24 openvpn 69856 Socket Buffers: R=[42080->524288] S=[57344->524288]
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: compression parms modified
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: explicit notify parm(s) modified
- Nov 2 10:26:24 openvpn 69856 OPTIONS IMPORT: timers and/or timeouts modified
- Nov 2 10:26:24 openvpn 69856 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.0.3 255.255.255.0,peer-id 1'
- Nov 2 10:26:24 openvpn 69856 SENT CONTROL [ca1227.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Nov 2 10:26:23 openvpn 69856 [ca1227.nordvpn.com] Peer Connection Initiated with [AF_INET]45.133.182.195:1194
- Nov 2 10:26:23 openvpn 69856 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 10:26:23 openvpn 69856 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 10:26:23 openvpn 69856 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 10:26:23 openvpn 69856 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 10:26:23 openvpn 69856 VERIFY EKU OK
- Nov 2 10:26:23 openvpn 69856 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 10:26:23 openvpn 69856 Validating certificate extended key usage
- Nov 2 10:26:23 openvpn 69856 VERIFY KU OK
- Nov 2 10:26:23 openvpn 69856 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 10:26:23 openvpn 69856 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 10:26:23 openvpn 69856 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 10:26:23 openvpn 69856 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 10:26:23 openvpn 69856 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 10:26:23 openvpn 69856 TLS: Initial packet from [AF_INET]45.133.182.195:1194, sid=bc09bf96 4963584b
- Nov 2 10:26:23 openvpn 69856 UDPv4 link remote: [AF_INET]45.133.182.195:1194
- Nov 2 10:26:23 openvpn 69856 UDPv4 link local (bound): [AF_INET]205.233.125.200:0
- Nov 2 10:26:23 openvpn 69856 Socket Buffers: R=[42080->42080] S=[57344->57344]
- Nov 2 10:26:23 openvpn 69856 TCP/UDP: Preserving recently used remote address: [AF_INET]45.133.182.195:1194
- Nov 2 10:26:23 openvpn 69856 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 10:26:23 openvpn 69856 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 10:26:23 openvpn 69856 WARNING: experimental option --capath /var/etc/openvpn/client1/ca
- Nov 2 10:26:23 openvpn 69856 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Nov 2 10:26:23 openvpn 69856 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock
- Nov 2 10:26:23 openvpn 69771 library versions: OpenSSL 1.1.1k-freebsd 25 Mar 2021, LZO 2.10
- Nov 2 10:26:23 openvpn 69771 OpenVPN 2.5.2 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 24 2021
- Nov 2 10:26:23 openvpn 69771 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible
- Nov 2 10:26:23 openvpn 28171 SIGTERM[soft,exit-with-notification] received, process exiting
- Nov 2 10:26:23 openvpn 28171 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1656 10.8.3.10 255.255.255.0 init
- Nov 2 10:26:23 openvpn 28171 Closing TUN/TAP interface
- Nov 2 10:26:22 openvpn 28171 SIGTERM received, sending exit notification to peer
- Nov 2 10:26:22 openvpn 28171 event_wait : Interrupted system call (code=4)
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: Client disconnected
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: CMD 'status 2'
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: CMD 'state 1'
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: Client disconnected
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: CMD 'status 2'
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: CMD 'state 1'
- Nov 2 10:26:19 openvpn 28171 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock
- Nov 2 10:25:58 openvpn 28171 MANAGEMENT: Client disconnected
- Nov 2 10:25:58 openvpn 28171 MANAGEMENT: CMD 'status 2'
- Nov 2 10:25:58 openvpn 28171 MANAGEMENT: CMD 'state 1'
- Nov 2 10:25:58 openvpn 28171 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: Client disconnected
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: CMD 'status 2'
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: CMD 'state 1'
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: Client disconnected
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: CMD 'status 2'
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: CMD 'state 1'
- Nov 2 10:25:55 openvpn 28171 MANAGEMENT: Client connected from /var/etc/openvpn/client1/sock
- Nov 2 09:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 09:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 09:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 09:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 09:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 09:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 09:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 09:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 09:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 09:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 09:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 09:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 09:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 09:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 09:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 09:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 09:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 09:41:08 openvpn 28171 TLS: tls_process: killed expiring key
- Nov 2 08:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 08:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 08:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 08:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 08:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 08:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 08:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 08:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 08:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 08:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 08:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 08:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 08:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 08:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 08:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 08:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 08:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 07:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 07:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 07:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 07:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 07:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 07:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 07:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 07:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 07:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 07:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 07:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 07:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 07:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 07:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 07:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 07:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 07:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 07:41:09 openvpn 28171 TLS: tls_process: killed expiring key
- Nov 2 06:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 06:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 06:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 06:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 06:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 06:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 06:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 06:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 06:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 06:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 06:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 06:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 06:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 06:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 06:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 06:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 06:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 06:41:09 openvpn 28171 TLS: tls_process: killed expiring key
- Nov 2 05:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 05:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 05:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 05:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 05:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 05:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 05:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 05:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 05:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 05:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 05:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 05:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 05:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 05:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 05:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 05:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 05:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 04:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 04:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 04:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 04:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 04:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 04:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 04:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 04:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 04:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 04:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 04:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 04:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 04:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 04:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 04:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 04:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 04:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 04:41:09 openvpn 28171 TLS: tls_process: killed expiring key
- Nov 2 03:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 03:41:09 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 03:41:09 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 03:41:09 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 03:41:09 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 03:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 03:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 03:41:09 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 03:41:09 openvpn 28171 VERIFY EKU OK
- Nov 2 03:41:09 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 03:41:09 openvpn 28171 Validating certificate extended key usage
- Nov 2 03:41:09 openvpn 28171 VERIFY KU OK
- Nov 2 03:41:09 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 03:41:09 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 03:41:09 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 03:41:09 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 03:41:09 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 02:41:10 openvpn 28171 Initialization Sequence Completed
- Nov 2 02:41:10 openvpn 28171 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Nov 2 02:41:10 openvpn 28171 /usr/local/sbin/ovpn-linkup ovpnc1 1500 1656 10.8.3.10 255.255.255.0 init
- Nov 2 02:41:10 openvpn 28171 /sbin/route add -net 10.8.3.0 10.8.3.1 255.255.255.0
- Nov 2 02:41:10 openvpn 28171 /sbin/ifconfig ovpnc1 10.8.3.10 10.8.3.1 mtu 1500 netmask 255.255.255.0 up
- Nov 2 02:41:10 openvpn 28171 TUN/TAP device /dev/tun1 opened
- Nov 2 02:41:10 openvpn 28171 TUN/TAP device ovpnc1 exists previously, keep at program end
- Nov 2 02:41:10 openvpn 28171 ROUTE_GATEWAY 66.158.128.24/255.255.255.255 IFACE=pppoe0 HWADDR=00:00:00:00:00:00
- Nov 2 02:41:10 openvpn 28171 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 02:41:10 openvpn 28171 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 02:41:10 openvpn 28171 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 02:41:10 openvpn 28171 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 02:41:10 openvpn 28171 Using peer cipher 'AES-256-CBC'
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: adjusting link_mtu to 1656
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: peer-id set
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: route-related options modified
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: route options modified
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: --ifconfig/up options modified
- Nov 2 02:41:10 openvpn 28171 Socket Buffers: R=[42080->524288] S=[57344->524288]
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: compression parms modified
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: explicit notify parm(s) modified
- Nov 2 02:41:10 openvpn 28171 OPTIONS IMPORT: timers and/or timeouts modified
- Nov 2 02:41:10 openvpn 28171 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.3.10 255.255.255.0,peer-id 8'
- Nov 2 02:41:10 openvpn 28171 SENT CONTROL [ca1227.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Nov 2 02:41:09 openvpn 28171 [ca1227.nordvpn.com] Peer Connection Initiated with [AF_INET]45.133.182.195:1194
- Nov 2 02:41:09 openvpn 28171 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 02:41:09 openvpn 28171 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 02:41:09 openvpn 28171 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 02:41:08 openvpn 28171 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 02:41:08 openvpn 28171 VERIFY EKU OK
- Nov 2 02:41:08 openvpn 28171 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 02:41:08 openvpn 28171 Validating certificate extended key usage
- Nov 2 02:41:08 openvpn 28171 VERIFY KU OK
- Nov 2 02:41:08 openvpn 28171 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 02:41:08 openvpn 28171 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 02:41:08 openvpn 28171 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 02:41:08 openvpn 28171 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 02:41:08 openvpn 28171 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 02:41:08 openvpn 28171 TLS: Initial packet from [AF_INET]45.133.182.195:1194, sid=4c27b26c 394ff414
- Nov 2 02:41:08 openvpn 28171 UDPv4 link remote: [AF_INET]45.133.182.195:1194
- Nov 2 02:41:08 openvpn 28171 UDPv4 link local (bound): [AF_INET]205.233.125.200:0
- Nov 2 02:41:08 openvpn 28171 Socket Buffers: R=[42080->42080] S=[57344->57344]
- Nov 2 02:41:08 openvpn 28171 TCP/UDP: Preserving recently used remote address: [AF_INET]45.133.182.195:1194
- Nov 2 02:41:08 openvpn 28171 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 02:41:08 openvpn 28171 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 02:41:08 openvpn 28171 WARNING: experimental option --capath /var/etc/openvpn/client1/ca
- Nov 2 02:41:08 openvpn 28171 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Nov 2 02:41:08 openvpn 28171 MANAGEMENT: unix domain socket listening on /var/etc/openvpn/client1/sock
- Nov 2 02:41:08 openvpn 27960 library versions: OpenSSL 1.1.1k-freebsd 25 Mar 2021, LZO 2.10
- Nov 2 02:41:08 openvpn 27960 OpenVPN 2.5.2 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 24 2021
- Nov 2 02:41:08 openvpn 27960 WARNING: file '/var/etc/openvpn/client1/up' is group or others accessible
- Nov 2 02:41:08 openvpn 28680 SIGTERM[soft,exit-with-notification] received, process exiting
- Nov 2 02:41:08 openvpn 28680 /usr/local/sbin/ovpn-linkdown ovpnc1 1500 1656 10.8.2.12 255.255.255.0 init
- Nov 2 02:41:08 openvpn 28680 Closing TUN/TAP interface
- Nov 2 02:41:07 openvpn 28680 SIGTERM received, sending exit notification to peer
- Nov 2 02:41:07 openvpn 28680 event_wait : Interrupted system call (code=4)
- Nov 2 02:41:07 openvpn 70557 Initialization Sequence Completed
- Nov 2 02:41:07 openvpn 70557 TCPv6_SERVER link remote: [AF_UNSPEC]
- Nov 2 02:41:07 openvpn 70557 TCPv6_SERVER link local (bound): [AF_INET6][undef]:1194
- Nov 2 02:41:07 openvpn 70557 Listening for incoming TCP connection on [AF_INET6][undef]:1194
- Nov 2 02:41:07 openvpn 70557 setsockopt(IPV6_V6ONLY=0)
- Nov 2 02:41:07 openvpn 70557 Could not determine IPv4/IPv6 protocol. Using AF_INET6
- Nov 2 02:41:07 openvpn 70557 /usr/local/sbin/ovpn-linkup ovpns2 1500 1623 192.168.2.1 255.255.255.0 init
- Nov 2 02:41:07 openvpn 70557 /sbin/ifconfig ovpns2 192.168.2.1 192.168.2.2 mtu 1500 netmask 255.255.255.0 up
- Nov 2 02:41:07 openvpn 70557 TUN/TAP device /dev/tun2 opened
- Nov 2 02:41:07 openvpn 70557 TUN/TAP device ovpns2 exists previously, keep at program end
- Nov 2 02:41:07 openvpn 70557 WARNING: experimental option --capath /var/etc/openvpn/server2/ca
- Nov 2 02:41:07 openvpn 70557 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Nov 2 02:41:07 openvpn 70317 library versions: OpenSSL 1.1.1k-freebsd 25 Mar 2021, LZO 2.10
- Nov 2 02:41:07 openvpn 70317 OpenVPN 2.5.2 amd64-portbld-freebsd12.2 [SSL (OpenSSL)] [LZO] [LZ4] [MH/RECVDA] [AEAD] built on Jun 24 2021
- Nov 2 02:41:07 openvpn 70317 DEPRECATED OPTION: --cipher set to 'AES-256-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-256-CBC' to --data-ciphers or change --cipher 'AES-256-CBC' to --data-ciphers-fallback 'AES-256-CBC' to silence this warning.
- Nov 2 02:41:07 openvpn 70317 DEPRECATED OPTION: ncp-disable. Disabling cipher negotiation is a deprecated debug feature that will be removed in OpenVPN 2.6
- Nov 2 02:41:07 openvpn 52675 SIGTERM[hard,] received, process exiting
- Nov 2 02:41:07 openvpn 52675 /usr/local/sbin/ovpn-linkdown ovpns2 1500 1623 192.168.2.1 255.255.255.0 init
- Nov 2 02:40:58 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:57 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:56 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:55 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:54 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:53 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:53 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:53 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:53 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:52 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:52 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:52 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:52 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:52 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:51 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:51 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:50 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:49 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:48 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:48 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:48 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:48 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:48 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:40:47 openvpn 28680 write UDPv4: No route to host (code=65)
- Nov 2 02:22:14 openvpn 28680 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 02:22:14 openvpn 28680 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 02:22:14 openvpn 28680 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 02:22:14 openvpn 28680 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 02:22:14 openvpn 28680 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 02:22:14 openvpn 28680 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 02:22:14 openvpn 28680 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 02:22:14 openvpn 28680 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 02:22:14 openvpn 28680 VERIFY EKU OK
- Nov 2 02:22:14 openvpn 28680 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 02:22:14 openvpn 28680 Validating certificate extended key usage
- Nov 2 02:22:14 openvpn 28680 VERIFY KU OK
- Nov 2 02:22:14 openvpn 28680 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 02:22:14 openvpn 28680 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 02:22:14 openvpn 28680 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 02:22:14 openvpn 28680 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 02:22:14 openvpn 28680 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 02:22:14 openvpn 28680 TLS: tls_process: killed expiring key
- Nov 2 01:22:14 openvpn 28680 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 01:22:14 openvpn 28680 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 01:22:14 openvpn 28680 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 01:22:14 openvpn 28680 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 01:22:14 openvpn 28680 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 01:22:14 openvpn 28680 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 01:22:14 openvpn 28680 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 01:22:14 openvpn 28680 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 01:22:14 openvpn 28680 VERIFY EKU OK
- Nov 2 01:22:14 openvpn 28680 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 01:22:14 openvpn 28680 Validating certificate extended key usage
- Nov 2 01:22:14 openvpn 28680 VERIFY KU OK
- Nov 2 01:22:14 openvpn 28680 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 01:22:14 openvpn 28680 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 01:22:14 openvpn 28680 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 01:22:14 openvpn 28680 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 01:22:14 openvpn 28680 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 2 01:22:14 openvpn 28680 TLS: tls_process: killed expiring key
- Nov 2 00:22:14 openvpn 28680 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 2 00:22:14 openvpn 28680 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 00:22:14 openvpn 28680 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 00:22:14 openvpn 28680 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 2 00:22:14 openvpn 28680 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 2 00:22:14 openvpn 28680 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 2 00:22:14 openvpn 28680 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 2 00:22:14 openvpn 28680 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 2 00:22:14 openvpn 28680 VERIFY EKU OK
- Nov 2 00:22:14 openvpn 28680 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 2 00:22:14 openvpn 28680 Validating certificate extended key usage
- Nov 2 00:22:14 openvpn 28680 VERIFY KU OK
- Nov 2 00:22:14 openvpn 28680 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 00:22:14 openvpn 28680 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 00:22:14 openvpn 28680 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 2 00:22:14 openvpn 28680 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 2 00:22:14 openvpn 28680 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 1 23:22:14 openvpn 28680 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 1 23:22:14 openvpn 28680 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 1 23:22:14 openvpn 28680 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 1 23:22:14 openvpn 28680 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 1 23:22:14 openvpn 28680 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 1 23:22:14 openvpn 28680 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 1 23:22:14 openvpn 28680 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 1 23:22:14 openvpn 28680 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 1 23:22:14 openvpn 28680 VERIFY EKU OK
- Nov 1 23:22:14 openvpn 28680 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 1 23:22:14 openvpn 28680 Validating certificate extended key usage
- Nov 1 23:22:14 openvpn 28680 VERIFY KU OK
- Nov 1 23:22:14 openvpn 28680 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 1 23:22:14 openvpn 28680 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 1 23:22:14 openvpn 28680 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 1 23:22:14 openvpn 28680 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 1 23:22:14 openvpn 28680 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 1 23:22:13 openvpn 28680 TLS: tls_process: killed expiring key
- Nov 1 22:22:14 openvpn 28680 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 1 22:22:14 openvpn 28680 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 1 22:22:14 openvpn 28680 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 1 22:22:14 openvpn 28680 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 1 22:22:14 openvpn 28680 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 1 22:22:14 openvpn 28680 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 1 22:22:14 openvpn 28680 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 1 22:22:13 openvpn 28680 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 1 22:22:13 openvpn 28680 VERIFY EKU OK
- Nov 1 22:22:13 openvpn 28680 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 1 22:22:13 openvpn 28680 Validating certificate extended key usage
- Nov 1 22:22:13 openvpn 28680 VERIFY KU OK
- Nov 1 22:22:13 openvpn 28680 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 1 22:22:13 openvpn 28680 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 1 22:22:13 openvpn 28680 VERIFY WARNING: depth=2, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN Root CA
- Nov 1 22:22:13 openvpn 28680 VERIFY WARNING: depth=1, unable to get certificate CRL: C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 1 22:22:13 openvpn 28680 VERIFY WARNING: depth=0, unable to get certificate CRL: CN=ca1227.nordvpn.com
- Nov 1 22:22:13 openvpn 28680 TLS: tls_process: killed expiring key
- Nov 1 21:37:26 openvpn 52675 TCP: accept(6) failed: Software caused connection abort (errno=53)
- Nov 1 21:37:26 openvpn 52675 167.94.138.41:32872 Connection reset, restarting [0]
- Nov 1 21:37:26 openvpn 52675 167.94.138.41:32872 WARNING: Bad encapsulated packet length from peer (18245), which must be > 0 and <= 1626 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
- Nov 1 21:37:25 openvpn 52675 TCP connection established with [AF_INET6]::ffff:167.94.138.41:32872
- Nov 1 21:37:25 openvpn 52675 167.94.138.41:60480 Connection reset, restarting [0]
- Nov 1 21:37:25 openvpn 52675 167.94.138.41:60480 WARNING: Bad encapsulated packet length from peer (5635), which must be > 0 and <= 1626 -- please ensure that --tun-mtu or --link-mtu is equal on both peers -- this condition could also indicate a possible active attack on the TCP link -- [Attempting restart...]
- Nov 1 21:37:25 openvpn 52675 TCP connection established with [AF_INET6]::ffff:167.94.138.41:60480
- Nov 1 21:37:25 openvpn 52675 167.94.138.41:39866 Connection reset, restarting [-1]
- Nov 1 21:37:24 openvpn 52675 TCP connection established with [AF_INET6]::ffff:167.94.138.41:39866
- Nov 1 21:37:24 openvpn 52675 167.94.138.41:39084 Fatal TLS error (check_tls_errors_co), restarting
- Nov 1 21:37:24 openvpn 52675 167.94.138.41:39084 TLS Error: cannot locate HMAC in incoming packet from [AF_INET6]::ffff:167.94.138.41:39084
- Nov 1 21:37:24 openvpn 52675 TCP connection established with [AF_INET6]::ffff:167.94.138.41:39084
- Nov 1 21:37:24 openvpn 52675 167.94.138.41:37550 Fatal TLS error (check_tls_errors_co), restarting
- Nov 1 21:37:24 openvpn 52675 167.94.138.41:37550 TLS Error: unknown opcode received from [AF_INET6]::ffff:167.94.138.41:37550 op=1
- Nov 1 21:37:24 openvpn 52675 167.94.138.41:37550 Peer tried unsupported key-method 1
- Nov 1 21:37:24 openvpn 52675 TCP connection established with [AF_INET6]::ffff:167.94.138.41:37550
- Nov 1 21:22:14 openvpn 28680 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, peer certificate: 4096 bit RSA, signature: RSA-SHA512
- Nov 1 21:22:14 openvpn 28680 Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 1 21:22:14 openvpn 28680 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 1 21:22:14 openvpn 28680 Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- Nov 1 21:22:14 openvpn 28680 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- Nov 1 21:22:14 openvpn 28680 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- Nov 1 21:22:14 openvpn 28680 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- Nov 1 21:22:14 openvpn 28680 VERIFY OK: depth=0, CN=ca1227.nordvpn.com
- Nov 1 21:22:14 openvpn 28680 VERIFY EKU OK
- Nov 1 21:22:14 openvpn 28680 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Nov 1 21:22:14 openvpn 28680 Validating certificate extended key usage
- Nov 1 21:22:14 openvpn 28680 VERIFY KU OK
- Nov 1 21:22:14 openvpn 28680 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA6
- Nov 1 21:22:14 openvpn 28680 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement