Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 22.12.2018 13:33:51 Debug Debug: config connect called
- 22.12.2018 13:33:51 Log DisconnectReason set to NoDisconnect in connect_thread
- 22.12.2018 13:33:51 Log Debug: connect_thread started
- 22.12.2018 13:33:51 Log State Change Event - Initializing
- 22.12.2018 13:33:52 Log Waiting for OpenVPN.exe to get ready
- 22.12.2018 13:33:52 Log OpenVPN.exe ready
- 22.12.2018 13:33:52 Log Checking firewall and DNS leak protection settings
- 22.12.2018 13:33:54 Log Waiting for network to get ready
- 22.12.2018 13:33:55 Debug Debug: Serviceconnection connect called
- 22.12.2018 13:33:56 Management Connecting to management interface 127.0.0.1:11196
- 22.12.2018 13:33:56 Log MANAGEMENT: CMD 'state on'
- 22.12.2018 13:33:56 Log MANAGEMENT: CMD 'hold release'
- 22.12.2018 13:33:56 Log MANAGEMENT: CMD 'username 'Auth' "<Username Removed>"'
- 22.12.2018 13:33:57 Log MANAGEMENT: CMD 'password [...]'
- 22.12.2018 13:33:57 Log NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 22.12.2018 13:33:57 Log Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:33:57 Log Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:33:57 Log Control Channel MTU parms [ L:1626 D:1140 EF:110 EB:0 ET:0 EL:3 ]
- 22.12.2018 13:33:57 Log Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
- 22.12.2018 13:33:57 Log Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
- 22.12.2018 13:33:57 Log Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
- 22.12.2018 13:33:57 Log Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
- 22.12.2018 13:33:57 Log TCP/UDP: Preserving recently used remote address: [AF_INET]82.199.134.162:151
- 22.12.2018 13:33:57 Log Socket Buffers: R=[65536->65536] S=[65536->65536]
- 22.12.2018 13:33:57 Log UDP link local: (not bound)
- 22.12.2018 13:33:57 Log UDP link remote: [AF_INET]82.199.134.162:151
- 22.12.2018 13:33:57 Log MANAGEMENT: >STATE:1545482037,WAIT,,,,,,
- 22.12.2018 13:33:57 State WAIT
- 22.12.2018 13:33:57 Log MANAGEMENT: >STATE:1545482037,AUTH,,,,,,
- 22.12.2018 13:33:57 State AUTH
- 22.12.2018 13:33:57 Log TLS: Initial packet from [AF_INET]82.199.134.162:151, sid=25e922be 6494048f
- 22.12.2018 13:33:57 Log WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 22.12.2018 13:33:57 Log VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
- 22.12.2018 13:33:57 Log VERIFY KU OK
- 22.12.2018 13:33:57 Log Validating certificate extended key usage
- 22.12.2018 13:33:57 Log ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 22.12.2018 13:33:57 Log VERIFY EKU OK
- 22.12.2018 13:33:57 Log VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_basel.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
- 22.12.2018 13:33:57 Log Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 22.12.2018 13:33:57 Log [Server_basel.perfect-privacy.com] Peer Connection Initiated with [AF_INET]82.199.134.162:151
- 22.12.2018 13:33:58 Log MANAGEMENT: >STATE:1545482038,GET_CONFIG,,,,,,
- 22.12.2018 13:33:58 State GET_CONFIG
- 22.12.2018 13:33:58 Log SENT CONTROL [Server_basel.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
- 22.12.2018 13:33:58 Log PUSH: Received control message: 'PUSH_REPLY,topology subnet,redirect-gateway def1,sndbuf 131072,rcvbuf 131072,comp-lzo adaptive,route-gateway 10.0.82.2,redirect-gateway ipv6,route-ipv6 2000::/3,ping 10,ping-restart 60,dhcp-option DNS 82.199.134.174,dhcp-option DNS 92.222.210.119,ifconfig-ipv6 fdbf:1d37:bbe0:0:5:10:0:23/112 fdbf:1d37:bbe0:0:5:10:0:1,ifconfig 10.0.82.35 255.255.255.0,peer-id 24'
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: timers and/or timeouts modified
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: compression parms modified
- 22.12.2018 13:33:58 Log LZO compression initializing
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- 22.12.2018 13:33:58 Log Socket Buffers: R=[65536->131072] S=[65536->131072]
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: --ifconfig/up options modified
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: route options modified
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: route-related options modified
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: peer-id set
- 22.12.2018 13:33:58 Log OPTIONS IMPORT: adjusting link_mtu to 1629
- 22.12.2018 13:33:58 Log Data Channel MTU parms [ L:1609 D:1300 EF:109 EB:407 ET:0 EL:3 ]
- 22.12.2018 13:33:58 Log Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 22.12.2018 13:33:58 Log Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:33:58 Log Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 22.12.2018 13:33:58 Log Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:33:58 Log interactive service msg_channel=0
- 22.12.2018 13:33:58 Log ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=13 HWADDR=fc:aa:14:e0:22:65
- 22.12.2018 13:33:58 Log GDG6: remote_host_ipv6=n/a
- 22.12.2018 13:33:58 Log GetBestInterfaceEx() returned if=13
- 22.12.2018 13:33:58 Log GDG6: II=13 DP=::/0 NH=fe80::5667:51ff:fec9:5493
- 22.12.2018 13:33:58 Log GDG6: Metric=16, Loopback=0, AA=1, I=0
- 22.12.2018 13:33:58 Log ROUTE6_GATEWAY fe80::5667:51ff:fec9:5493 I=13
- 22.12.2018 13:33:58 Log open_tun
- 22.12.2018 13:33:58 Log TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{FEC2611E-456B-441C-AC2E-E0CA370AB4AB}.tap
- 22.12.2018 13:33:58 Log TAP-Windows Driver Version 9.21
- 22.12.2018 13:33:58 Log TAP-Windows MTU=1500
- 22.12.2018 13:33:58 Log Set TAP-Windows TUN subnet mode network/local/netmask = 10.0.82.0/10.0.82.35/255.255.255.0 [SUCCEEDED]
- 22.12.2018 13:33:58 Log Notified TAP-Windows driver to set a DHCP IP/netmask of 10.0.82.35/255.255.255.0 on interface {FEC2611E-456B-441C-AC2E-E0CA370AB4AB} [DHCP-serv: 10.0.82.254, lease-time: 31536000]
- 22.12.2018 13:33:58 Log DHCP option string: 060852c7 86ae5cde d277
- 22.12.2018 13:33:58 Log Successful ARP Flush on interface [3] {FEC2611E-456B-441C-AC2E-E0CA370AB4AB}
- 22.12.2018 13:33:58 Log do_ifconfig, tt->did_ifconfig_ipv6_setup=1
- 22.12.2018 13:33:58 Log MANAGEMENT: >STATE:1545482038,ASSIGN_IP,,10.0.82.35,,,,,fdbf:1d37:bbe0:0:5:10:0:23
- 22.12.2018 13:33:58 State ASSIGN_IP
- 22.12.2018 13:33:59 Log NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=3 fdbf:1d37:bbe0:0:5:10:0:23 store=active
- 22.12.2018 13:33:59 Log add_route_ipv6(fdbf:1d37:bbe0:0:5:10::/112 -> fdbf:1d37:bbe0:0:5:10:0:23 metric 0) dev Ethernet 2
- 22.12.2018 13:33:59 Log C:\WINDOWS\system32\netsh.exe interface ipv6 add route fdbf:1d37:bbe0:0:5:10::/112 interface=3 fe80::8 store=active
- 22.12.2018 13:33:59 Log env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- 22.12.2018 13:33:59 Log updown_v6.bat Ethernet 2 1500 1609 10.0.82.35 255.255.255.0 init
- 22.12.2018 13:33:59 Log env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- 22.12.2018 13:34:02 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:02 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:04 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:04 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:05 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:05 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:06 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:06 Log To many Tap Init errors, Disconnecting and reinstalling TAP Adapter
- 22.12.2018 13:34:06 Log Tunnel Basel Disconnect Called Reason:Error
- 22.12.2018 13:34:06 Debug Debug: Serviceconnection Disconnect called
- 22.12.2018 13:34:06 Log State Change Event - Stopping
- 22.12.2018 13:34:06 Debug killConnection called
- 22.12.2018 13:34:06 Management Sending signal to close connection
- 22.12.2018 13:34:06 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:06 Log MANAGEMENT: CMD 'exit'
- 22.12.2018 13:34:06 Management Disconnecting from management interface
- 22.12.2018 13:34:06 Debug SendDisconnect done
- 22.12.2018 13:34:06 Management Disconnecting from management interface
- 22.12.2018 13:34:06 Debug DisconnectLogic done
- 22.12.2018 13:34:09 Log State Change Event - Stopped
- 22.12.2018 13:34:09 Log state changes to stoped, reason: Error
- 22.12.2018 13:34:10 Log Handle disconnect for reason Error error:WaitingForTapAdapters
- 22.12.2018 13:34:10 Error Tunnel Basel Disconnect Called Reason:WaitGlobalAction but disconnect reason already is Error
- 22.12.2018 13:34:13 Debug Debug: config connect called
- 22.12.2018 13:34:14 Log DisconnectReason set to NoDisconnect in connect_thread
- 22.12.2018 13:34:14 Log Debug: connect_thread started
- 22.12.2018 13:34:14 Log State Change Event - Initializing
- 22.12.2018 13:34:14 Log Waiting for system to get ready..
- 22.12.2018 13:34:15 Log Waiting for OpenVPN.exe to get ready
- 22.12.2018 13:34:15 Log OpenVPN.exe ready
- 22.12.2018 13:34:15 Log Checking firewall and DNS leak protection settings
- 22.12.2018 13:34:16 Log Waiting for network to get ready
- 22.12.2018 13:34:17 Debug Debug: Serviceconnection connect called
- 22.12.2018 13:34:17 Management Connecting to management interface 127.0.0.1:11196
- 22.12.2018 13:34:17 Log MANAGEMENT: CMD 'state on'
- 22.12.2018 13:34:17 Log MANAGEMENT: CMD 'hold release'
- 22.12.2018 13:34:17 Log MANAGEMENT: CMD 'username 'Auth' "<Username Removed>"'
- 22.12.2018 13:34:18 Log MANAGEMENT: CMD 'password [...]'
- 22.12.2018 13:34:18 Log NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- 22.12.2018 13:34:18 Log Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:34:18 Log Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:34:18 Log Control Channel MTU parms [ L:1626 D:1140 EF:110 EB:0 ET:0 EL:3 ]
- 22.12.2018 13:34:18 Log Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
- 22.12.2018 13:34:18 Log Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
- 22.12.2018 13:34:18 Log Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
- 22.12.2018 13:34:18 Log Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
- 22.12.2018 13:34:18 Log TCP/UDP: Preserving recently used remote address: [AF_INET]80.255.7.66:1151
- 22.12.2018 13:34:18 Log Socket Buffers: R=[65536->65536] S=[65536->65536]
- 22.12.2018 13:34:18 Log UDP link local: (not bound)
- 22.12.2018 13:34:18 Log UDP link remote: [AF_INET]80.255.7.66:1151
- 22.12.2018 13:34:18 Log MANAGEMENT: >STATE:1545482058,WAIT,,,,,,
- 22.12.2018 13:34:19 State WAIT
- 22.12.2018 13:34:19 Log MANAGEMENT: >STATE:1545482058,AUTH,,,,,,
- 22.12.2018 13:34:19 State AUTH
- 22.12.2018 13:34:19 Log TLS: Initial packet from [AF_INET]80.255.7.66:1151, sid=12659434 ae47793a
- 22.12.2018 13:34:19 Log WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 22.12.2018 13:34:19 Log VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
- 22.12.2018 13:34:19 Log VERIFY KU OK
- 22.12.2018 13:34:19 Log Validating certificate extended key usage
- 22.12.2018 13:34:19 Log ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 22.12.2018 13:34:19 Log VERIFY EKU OK
- 22.12.2018 13:34:19 Log VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_basel.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
- 22.12.2018 13:34:19 Log Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 22.12.2018 13:34:19 Log [Server_basel.perfect-privacy.com] Peer Connection Initiated with [AF_INET]80.255.7.66:1151
- 22.12.2018 13:34:20 Log MANAGEMENT: >STATE:1545482060,GET_CONFIG,,,,,,
- 22.12.2018 13:34:20 State GET_CONFIG
- 22.12.2018 13:34:20 Log SENT CONTROL [Server_basel.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
- 22.12.2018 13:34:20 Log PUSH: Received control message: 'PUSH_REPLY,topology subnet,redirect-gateway def1,sndbuf 131072,rcvbuf 131072,comp-lzo adaptive,route-gateway 10.4.135.1,redirect-gateway ipv6,route-ipv6 2000::/3,ping 10,ping-restart 60,dhcp-option DNS 80.255.7.78,dhcp-option DNS 92.222.210.119,ifconfig-ipv6 fdbf:1d37:bbe0:0:72:7:0:f3/112 fdbf:1d37:bbe0:0:72:7:0:1,ifconfig 10.4.135.243 255.255.255.0,peer-id 5'
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: timers and/or timeouts modified
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: compression parms modified
- 22.12.2018 13:34:20 Log LZO compression initializing
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- 22.12.2018 13:34:20 Log Socket Buffers: R=[65536->131072] S=[65536->131072]
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: --ifconfig/up options modified
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: route options modified
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: route-related options modified
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: peer-id set
- 22.12.2018 13:34:20 Log OPTIONS IMPORT: adjusting link_mtu to 1629
- 22.12.2018 13:34:20 Log Data Channel MTU parms [ L:1609 D:1300 EF:109 EB:407 ET:0 EL:3 ]
- 22.12.2018 13:34:20 Log Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 22.12.2018 13:34:20 Log Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:34:20 Log Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
- 22.12.2018 13:34:20 Log Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
- 22.12.2018 13:34:20 Log interactive service msg_channel=0
- 22.12.2018 13:34:20 Log ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=13 HWADDR=fc:aa:14:e0:22:65
- 22.12.2018 13:34:20 Log GDG6: remote_host_ipv6=n/a
- 22.12.2018 13:34:20 Log GetBestInterfaceEx() returned if=13
- 22.12.2018 13:34:20 Log GDG6: II=13 DP=::/0 NH=fe80::5667:51ff:fec9:5493
- 22.12.2018 13:34:20 Log GDG6: Metric=16, Loopback=0, AA=1, I=0
- 22.12.2018 13:34:20 Log ROUTE6_GATEWAY fe80::5667:51ff:fec9:5493 I=13
- 22.12.2018 13:34:20 Log open_tun
- 22.12.2018 13:34:20 Log TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{353B0676-AFB7-4E7F-ADB7-CBEE3560BDEA}.tap
- 22.12.2018 13:34:20 Log TAP-Windows Driver Version 9.21
- 22.12.2018 13:34:20 Log TAP-Windows MTU=1500
- 22.12.2018 13:34:20 Log Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.135.0/10.4.135.243/255.255.255.0 [SUCCEEDED]
- 22.12.2018 13:34:20 Log Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.135.243/255.255.255.0 on interface {353B0676-AFB7-4E7F-ADB7-CBEE3560BDEA} [DHCP-serv: 10.4.135.254, lease-time: 31536000]
- 22.12.2018 13:34:20 Log DHCP option string: 060850ff 074e5cde d277
- 22.12.2018 13:34:20 Log Successful ARP Flush on interface [3] {353B0676-AFB7-4E7F-ADB7-CBEE3560BDEA}
- 22.12.2018 13:34:20 Log do_ifconfig, tt->did_ifconfig_ipv6_setup=1
- 22.12.2018 13:34:20 Log MANAGEMENT: >STATE:1545482060,ASSIGN_IP,,10.4.135.243,,,,,fdbf:1d37:bbe0:0:72:7:0:f3
- 22.12.2018 13:34:21 State ASSIGN_IP
- 22.12.2018 13:34:21 Log NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=3 fdbf:1d37:bbe0:0:72:7:0:f3 store=active
- 22.12.2018 13:34:21 Log add_route_ipv6(fdbf:1d37:bbe0:0:72:7::/112 -> fdbf:1d37:bbe0:0:72:7:0:f3 metric 0) dev Ethernet 2
- 22.12.2018 13:34:21 Log C:\WINDOWS\system32\netsh.exe interface ipv6 add route fdbf:1d37:bbe0:0:72:7::/112 interface=3 fe80::8 store=active
- 22.12.2018 13:34:21 Log env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- 22.12.2018 13:34:21 Log updown_v6.bat Ethernet 2 1500 1609 10.4.135.243 255.255.255.0 init
- 22.12.2018 13:34:21 Log env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- 22.12.2018 13:34:24 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:24 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:26 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:26 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:27 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:27 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:28 Log TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
- 22.12.2018 13:34:28 Log To many Tap Init errors, Disconnecting and reinstalling TAP Adapter
- 22.12.2018 13:34:28 Log Tunnel Basel Disconnect Called Reason:Error
- 22.12.2018 13:34:28 Debug Debug: Serviceconnection Disconnect called
- 22.12.2018 13:34:28 Log State Change Event - Stopping
- 22.12.2018 13:34:28 Debug killConnection called
- 22.12.2018 13:34:28 Management Sending signal to close connection
- 22.12.2018 13:34:28 Log Route: Waiting for TUN/TAP interface to come up...
- 22.12.2018 13:34:28 Log MANAGEMENT: CMD 'exit'
- 22.12.2018 13:34:28 Management Disconnecting from management interface
- 22.12.2018 13:34:28 Debug SendDisconnect done
- 22.12.2018 13:34:28 Management Disconnecting from management interface
- 22.12.2018 13:34:28 Debug DisconnectLogic done
- 22.12.2018 13:34:31 Log State Change Event - Stopped
- 22.12.2018 13:34:31 Log state changes to stoped, reason: Error
- 22.12.2018 13:34:31 Log Handle disconnect for reason Error error:WaitingForTapAdapters
- 22.12.2018 13:34:31 Error Tunnel Basel Disconnect Called Reason:WaitGlobalAction but disconnect reason already is Error
- 22.12.2018 13:34:35 Debug Debug: config connect called
- 22.12.2018 13:34:35 Log DisconnectReason set to NoDisconnect in connect_thread
- 22.12.2018 13:34:35 Log Debug: connect_thread started
- 22.12.2018 13:34:35 Log State Change Event - Initializing
- 22.12.2018 13:34:36 Log Waiting for system to get ready..
- 22.12.2018 13:34:36 Log Waiting for OpenVPN.exe to get ready
- 22.12.2018 13:34:36 Log OpenVPN.exe ready
- 22.12.2018 13:34:36 Log Checking firewall and DNS leak protection settings
- 22.12.2018 13:34:36 Log Tunnel Basel Disconnect Called Reason:UserClicked
- 22.12.2018 13:34:36 Debug Debug: Serviceconnection Disconnect called
- 22.12.2018 13:34:36 Log State Change Event - Stopping
- 22.12.2018 13:34:36 Debug killConnection called
- 22.12.2018 13:34:36 Management Sending signal to close connection
- 22.12.2018 13:34:36 Debug SendDisconnect done
- 22.12.2018 13:34:36 Management Disconnecting from management interface
- 22.12.2018 13:34:36 Debug DisconnectLogic done
- 22.12.2018 13:34:37 Log State Change Event - Stopped
- 22.12.2018 13:34:37 Log state changes to stoped, reason: UserClicked
- 22.12.2018 13:34:37 Log Handle disconnect for reason UserClicked error:NoError
- 22.12.2018 13:34:37 Log Waiting for network to get ready
- 22.12.2018 13:34:38 Debug disconnect triggered, not starting tunnel1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement