Advertisement
Guest User

Untitled

a guest
Dec 22nd, 2018
37
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Java 19.95 KB | None | 0 0
  1. 22.12.2018 13:33:51   Debug  Debug: config connect called
  2. 22.12.2018 13:33:51   Log  DisconnectReason set to NoDisconnect in connect_thread
  3. 22.12.2018 13:33:51   Log  Debug: connect_thread started
  4. 22.12.2018 13:33:51   Log  State Change Event - Initializing
  5. 22.12.2018 13:33:52   Log  Waiting for OpenVPN.exe to get ready
  6. 22.12.2018 13:33:52   Log  OpenVPN.exe ready
  7. 22.12.2018 13:33:52   Log  Checking firewall and DNS leak protection settings
  8. 22.12.2018 13:33:54   Log  Waiting for network to get ready
  9. 22.12.2018 13:33:55   Debug  Debug: Serviceconnection connect called
  10. 22.12.2018 13:33:56   Management  Connecting to management interface 127.0.0.1:11196
  11. 22.12.2018 13:33:56   Log  MANAGEMENT: CMD 'state on'
  12. 22.12.2018 13:33:56   Log  MANAGEMENT: CMD 'hold release'
  13. 22.12.2018 13:33:56   Log  MANAGEMENT: CMD 'username 'Auth' "<Username Removed>"'
  14. 22.12.2018 13:33:57   Log  MANAGEMENT: CMD 'password [...]'
  15. 22.12.2018 13:33:57   Log  NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  16. 22.12.2018 13:33:57   Log  Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  17. 22.12.2018 13:33:57   Log  Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  18. 22.12.2018 13:33:57   Log  Control Channel MTU parms [ L:1626 D:1140 EF:110 EB:0 ET:0 EL:3 ]
  19. 22.12.2018 13:33:57   Log  Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
  20. 22.12.2018 13:33:57   Log  Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
  21. 22.12.2018 13:33:57   Log  Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
  22. 22.12.2018 13:33:57   Log  Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
  23. 22.12.2018 13:33:57   Log  TCP/UDP: Preserving recently used remote address: [AF_INET]82.199.134.162:151
  24. 22.12.2018 13:33:57   Log  Socket Buffers: R=[65536->65536] S=[65536->65536]
  25. 22.12.2018 13:33:57   Log  UDP link local: (not bound)
  26. 22.12.2018 13:33:57   Log  UDP link remote: [AF_INET]82.199.134.162:151
  27. 22.12.2018 13:33:57   Log  MANAGEMENT: >STATE:1545482037,WAIT,,,,,,
  28. 22.12.2018 13:33:57   State  WAIT
  29. 22.12.2018 13:33:57   Log  MANAGEMENT: >STATE:1545482037,AUTH,,,,,,
  30. 22.12.2018 13:33:57   State  AUTH
  31. 22.12.2018 13:33:57   Log  TLS: Initial packet from [AF_INET]82.199.134.162:151, sid=25e922be 6494048f
  32. 22.12.2018 13:33:57   Log  WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  33. 22.12.2018 13:33:57   Log  VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
  34. 22.12.2018 13:33:57   Log  VERIFY KU OK
  35. 22.12.2018 13:33:57   Log  Validating certificate extended key usage
  36. 22.12.2018 13:33:57   Log  ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  37. 22.12.2018 13:33:57   Log  VERIFY EKU OK
  38. 22.12.2018 13:33:57   Log  VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_basel.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
  39. 22.12.2018 13:33:57   Log  Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  40. 22.12.2018 13:33:57   Log  [Server_basel.perfect-privacy.com] Peer Connection Initiated with [AF_INET]82.199.134.162:151
  41. 22.12.2018 13:33:58   Log  MANAGEMENT: >STATE:1545482038,GET_CONFIG,,,,,,
  42. 22.12.2018 13:33:58   State  GET_CONFIG
  43. 22.12.2018 13:33:58   Log  SENT CONTROL [Server_basel.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
  44. 22.12.2018 13:33:58   Log  PUSH: Received control message: 'PUSH_REPLY,topology subnet,redirect-gateway def1,sndbuf 131072,rcvbuf 131072,comp-lzo adaptive,route-gateway 10.0.82.2,redirect-gateway ipv6,route-ipv6 2000::/3,ping 10,ping-restart 60,dhcp-option DNS 82.199.134.174,dhcp-option DNS 92.222.210.119,ifconfig-ipv6 fdbf:1d37:bbe0:0:5:10:0:23/112 fdbf:1d37:bbe0:0:5:10:0:1,ifconfig 10.0.82.35 255.255.255.0,peer-id 24'
  45. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: timers and/or timeouts modified
  46. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: compression parms modified
  47. 22.12.2018 13:33:58   Log  LZO compression initializing
  48. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  49. 22.12.2018 13:33:58   Log  Socket Buffers: R=[65536->131072] S=[65536->131072]
  50. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: --ifconfig/up options modified
  51. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: route options modified
  52. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: route-related options modified
  53. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  54. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: peer-id set
  55. 22.12.2018 13:33:58   Log  OPTIONS IMPORT: adjusting link_mtu to 1629
  56. 22.12.2018 13:33:58   Log  Data Channel MTU parms [ L:1609 D:1300 EF:109 EB:407 ET:0 EL:3 ]
  57. 22.12.2018 13:33:58   Log  Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  58. 22.12.2018 13:33:58   Log  Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
  59. 22.12.2018 13:33:58   Log  Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  60. 22.12.2018 13:33:58   Log  Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
  61. 22.12.2018 13:33:58   Log  interactive service msg_channel=0
  62. 22.12.2018 13:33:58   Log  ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=13 HWADDR=fc:aa:14:e0:22:65
  63. 22.12.2018 13:33:58   Log  GDG6: remote_host_ipv6=n/a
  64. 22.12.2018 13:33:58   Log  GetBestInterfaceEx() returned if=13
  65. 22.12.2018 13:33:58   Log  GDG6: II=13 DP=::/0 NH=fe80::5667:51ff:fec9:5493
  66. 22.12.2018 13:33:58   Log  GDG6: Metric=16, Loopback=0, AA=1, I=0
  67. 22.12.2018 13:33:58   Log  ROUTE6_GATEWAY fe80::5667:51ff:fec9:5493 I=13
  68. 22.12.2018 13:33:58   Log  open_tun
  69. 22.12.2018 13:33:58   Log  TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{FEC2611E-456B-441C-AC2E-E0CA370AB4AB}.tap
  70. 22.12.2018 13:33:58   Log  TAP-Windows Driver Version 9.21
  71. 22.12.2018 13:33:58   Log  TAP-Windows MTU=1500
  72. 22.12.2018 13:33:58   Log  Set TAP-Windows TUN subnet mode network/local/netmask = 10.0.82.0/10.0.82.35/255.255.255.0 [SUCCEEDED]
  73. 22.12.2018 13:33:58   Log  Notified TAP-Windows driver to set a DHCP IP/netmask of 10.0.82.35/255.255.255.0 on interface {FEC2611E-456B-441C-AC2E-E0CA370AB4AB} [DHCP-serv: 10.0.82.254, lease-time: 31536000]
  74. 22.12.2018 13:33:58   Log  DHCP option string: 060852c7 86ae5cde d277
  75. 22.12.2018 13:33:58   Log  Successful ARP Flush on interface [3] {FEC2611E-456B-441C-AC2E-E0CA370AB4AB}
  76. 22.12.2018 13:33:58   Log  do_ifconfig, tt->did_ifconfig_ipv6_setup=1
  77. 22.12.2018 13:33:58   Log  MANAGEMENT: >STATE:1545482038,ASSIGN_IP,,10.0.82.35,,,,,fdbf:1d37:bbe0:0:5:10:0:23
  78. 22.12.2018 13:33:58   State  ASSIGN_IP
  79. 22.12.2018 13:33:59   Log  NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=3 fdbf:1d37:bbe0:0:5:10:0:23 store=active
  80. 22.12.2018 13:33:59   Log  add_route_ipv6(fdbf:1d37:bbe0:0:5:10::/112 -> fdbf:1d37:bbe0:0:5:10:0:23 metric 0) dev Ethernet 2
  81. 22.12.2018 13:33:59   Log  C:\WINDOWS\system32\netsh.exe interface ipv6 add route fdbf:1d37:bbe0:0:5:10::/112 interface=3 fe80::8 store=active
  82. 22.12.2018 13:33:59   Log  env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  83. 22.12.2018 13:33:59   Log  updown_v6.bat Ethernet 2 1500 1609 10.0.82.35 255.255.255.0 init
  84. 22.12.2018 13:33:59   Log  env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  85. 22.12.2018 13:34:02   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  86. 22.12.2018 13:34:02   Log  Route: Waiting for TUN/TAP interface to come up...
  87. 22.12.2018 13:34:04   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  88. 22.12.2018 13:34:04   Log  Route: Waiting for TUN/TAP interface to come up...
  89. 22.12.2018 13:34:05   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  90. 22.12.2018 13:34:05   Log  Route: Waiting for TUN/TAP interface to come up...
  91. 22.12.2018 13:34:06   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  92. 22.12.2018 13:34:06   Log  To many Tap Init errors, Disconnecting and reinstalling TAP Adapter
  93. 22.12.2018 13:34:06   Log  Tunnel Basel Disconnect Called Reason:Error
  94. 22.12.2018 13:34:06   Debug  Debug: Serviceconnection Disconnect called
  95. 22.12.2018 13:34:06   Log  State Change Event - Stopping
  96. 22.12.2018 13:34:06   Debug  killConnection called
  97. 22.12.2018 13:34:06   Management  Sending signal to close connection
  98. 22.12.2018 13:34:06   Log  Route: Waiting for TUN/TAP interface to come up...
  99. 22.12.2018 13:34:06   Log  MANAGEMENT: CMD 'exit'
  100. 22.12.2018 13:34:06   Management  Disconnecting from management interface
  101. 22.12.2018 13:34:06   Debug  SendDisconnect done
  102. 22.12.2018 13:34:06   Management  Disconnecting from management interface
  103. 22.12.2018 13:34:06   Debug  DisconnectLogic done
  104. 22.12.2018 13:34:09   Log  State Change Event - Stopped
  105. 22.12.2018 13:34:09   Log  state changes to stoped, reason: Error
  106. 22.12.2018 13:34:10   Log  Handle disconnect for reason Error error:WaitingForTapAdapters
  107. 22.12.2018 13:34:10   Error  Tunnel Basel Disconnect Called Reason:WaitGlobalAction but disconnect reason already is Error
  108. 22.12.2018 13:34:13   Debug  Debug: config connect called
  109. 22.12.2018 13:34:14   Log  DisconnectReason set to NoDisconnect in connect_thread
  110. 22.12.2018 13:34:14   Log  Debug: connect_thread started
  111. 22.12.2018 13:34:14   Log  State Change Event - Initializing
  112. 22.12.2018 13:34:14   Log  Waiting for system to get ready..
  113. 22.12.2018 13:34:15   Log  Waiting for OpenVPN.exe to get ready
  114. 22.12.2018 13:34:15   Log  OpenVPN.exe ready
  115. 22.12.2018 13:34:15   Log  Checking firewall and DNS leak protection settings
  116. 22.12.2018 13:34:16   Log  Waiting for network to get ready
  117. 22.12.2018 13:34:17   Debug  Debug: Serviceconnection connect called
  118. 22.12.2018 13:34:17   Management  Connecting to management interface 127.0.0.1:11196
  119. 22.12.2018 13:34:17   Log  MANAGEMENT: CMD 'state on'
  120. 22.12.2018 13:34:17   Log  MANAGEMENT: CMD 'hold release'
  121. 22.12.2018 13:34:17   Log  MANAGEMENT: CMD 'username 'Auth' "<Username Removed>"'
  122. 22.12.2018 13:34:18   Log  MANAGEMENT: CMD 'password [...]'
  123. 22.12.2018 13:34:18   Log  NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  124. 22.12.2018 13:34:18   Log  Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  125. 22.12.2018 13:34:18   Log  Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  126. 22.12.2018 13:34:18   Log  Control Channel MTU parms [ L:1626 D:1140 EF:110 EB:0 ET:0 EL:3 ]
  127. 22.12.2018 13:34:18   Log  Data Channel MTU parms [ L:1626 D:1300 EF:126 EB:407 ET:0 EL:3 ]
  128. 22.12.2018 13:34:18   Log  Fragmentation MTU parms [ L:1626 D:1300 EF:125 EB:407 ET:1 EL:3 ]
  129. 22.12.2018 13:34:18   Log  Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 1,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-client'
  130. 22.12.2018 13:34:18   Log  Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1606,tun-mtu 1500,proto UDPv4,comp-lzo,mtu-dynamic,keydir 0,cipher AES-256-CBC,auth SHA512,keysize 256,tls-auth,key-method 2,tls-server'
  131. 22.12.2018 13:34:18   Log  TCP/UDP: Preserving recently used remote address: [AF_INET]80.255.7.66:1151
  132. 22.12.2018 13:34:18   Log  Socket Buffers: R=[65536->65536] S=[65536->65536]
  133. 22.12.2018 13:34:18   Log  UDP link local: (not bound)
  134. 22.12.2018 13:34:18   Log  UDP link remote: [AF_INET]80.255.7.66:1151
  135. 22.12.2018 13:34:18   Log  MANAGEMENT: >STATE:1545482058,WAIT,,,,,,
  136. 22.12.2018 13:34:19   State  WAIT
  137. 22.12.2018 13:34:19   Log  MANAGEMENT: >STATE:1545482058,AUTH,,,,,,
  138. 22.12.2018 13:34:19   State  AUTH
  139. 22.12.2018 13:34:19   Log  TLS: Initial packet from [AF_INET]80.255.7.66:1151, sid=12659434 ae47793a
  140. 22.12.2018 13:34:19   Log  WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  141. 22.12.2018 13:34:19   Log  VERIFY OK: depth=1, C=CH, ST=Zug, L=Zug, O=Perfect Privacy, CN=Perfect Privacy, emailAddress=admin@perfect-privacy.com
  142. 22.12.2018 13:34:19   Log  VERIFY KU OK
  143. 22.12.2018 13:34:19   Log  Validating certificate extended key usage
  144. 22.12.2018 13:34:19   Log  ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  145. 22.12.2018 13:34:19   Log  VERIFY EKU OK
  146. 22.12.2018 13:34:19   Log  VERIFY OK: depth=0, C=CH, ST=Zug, O=Perfect Privacy, CN=Server_basel.perfect-privacy.com, emailAddress=admin@perfect-privacy.com
  147. 22.12.2018 13:34:19   Log  Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  148. 22.12.2018 13:34:19   Log  [Server_basel.perfect-privacy.com] Peer Connection Initiated with [AF_INET]80.255.7.66:1151
  149. 22.12.2018 13:34:20   Log  MANAGEMENT: >STATE:1545482060,GET_CONFIG,,,,,,
  150. 22.12.2018 13:34:20   State  GET_CONFIG
  151. 22.12.2018 13:34:20   Log  SENT CONTROL [Server_basel.perfect-privacy.com]: 'PUSH_REQUEST' (status=1)
  152. 22.12.2018 13:34:20   Log  PUSH: Received control message: 'PUSH_REPLY,topology subnet,redirect-gateway def1,sndbuf 131072,rcvbuf 131072,comp-lzo adaptive,route-gateway 10.4.135.1,redirect-gateway ipv6,route-ipv6 2000::/3,ping 10,ping-restart 60,dhcp-option DNS 80.255.7.78,dhcp-option DNS 92.222.210.119,ifconfig-ipv6 fdbf:1d37:bbe0:0:72:7:0:f3/112 fdbf:1d37:bbe0:0:72:7:0:1,ifconfig 10.4.135.243 255.255.255.0,peer-id 5'
  153. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: timers and/or timeouts modified
  154. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: compression parms modified
  155. 22.12.2018 13:34:20   Log  LZO compression initializing
  156. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  157. 22.12.2018 13:34:20   Log  Socket Buffers: R=[65536->131072] S=[65536->131072]
  158. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: --ifconfig/up options modified
  159. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: route options modified
  160. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: route-related options modified
  161. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  162. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: peer-id set
  163. 22.12.2018 13:34:20   Log  OPTIONS IMPORT: adjusting link_mtu to 1629
  164. 22.12.2018 13:34:20   Log  Data Channel MTU parms [ L:1609 D:1300 EF:109 EB:407 ET:0 EL:3 ]
  165. 22.12.2018 13:34:20   Log  Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  166. 22.12.2018 13:34:20   Log  Outgoing Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
  167. 22.12.2018 13:34:20   Log  Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key
  168. 22.12.2018 13:34:20   Log  Incoming Data Channel: Using 512 bit message hash 'SHA512' for HMAC authentication
  169. 22.12.2018 13:34:20   Log  interactive service msg_channel=0
  170. 22.12.2018 13:34:20   Log  ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=13 HWADDR=fc:aa:14:e0:22:65
  171. 22.12.2018 13:34:20   Log  GDG6: remote_host_ipv6=n/a
  172. 22.12.2018 13:34:20   Log  GetBestInterfaceEx() returned if=13
  173. 22.12.2018 13:34:20   Log  GDG6: II=13 DP=::/0 NH=fe80::5667:51ff:fec9:5493
  174. 22.12.2018 13:34:20   Log  GDG6: Metric=16, Loopback=0, AA=1, I=0
  175. 22.12.2018 13:34:20   Log  ROUTE6_GATEWAY fe80::5667:51ff:fec9:5493 I=13
  176. 22.12.2018 13:34:20   Log  open_tun
  177. 22.12.2018 13:34:20   Log  TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{353B0676-AFB7-4E7F-ADB7-CBEE3560BDEA}.tap
  178. 22.12.2018 13:34:20   Log  TAP-Windows Driver Version 9.21
  179. 22.12.2018 13:34:20   Log  TAP-Windows MTU=1500
  180. 22.12.2018 13:34:20   Log  Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.135.0/10.4.135.243/255.255.255.0 [SUCCEEDED]
  181. 22.12.2018 13:34:20   Log  Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.135.243/255.255.255.0 on interface {353B0676-AFB7-4E7F-ADB7-CBEE3560BDEA} [DHCP-serv: 10.4.135.254, lease-time: 31536000]
  182. 22.12.2018 13:34:20   Log  DHCP option string: 060850ff 074e5cde d277
  183. 22.12.2018 13:34:20   Log  Successful ARP Flush on interface [3] {353B0676-AFB7-4E7F-ADB7-CBEE3560BDEA}
  184. 22.12.2018 13:34:20   Log  do_ifconfig, tt->did_ifconfig_ipv6_setup=1
  185. 22.12.2018 13:34:20   Log  MANAGEMENT: >STATE:1545482060,ASSIGN_IP,,10.4.135.243,,,,,fdbf:1d37:bbe0:0:72:7:0:f3
  186. 22.12.2018 13:34:21   State  ASSIGN_IP
  187. 22.12.2018 13:34:21   Log  NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=3 fdbf:1d37:bbe0:0:72:7:0:f3 store=active
  188. 22.12.2018 13:34:21   Log  add_route_ipv6(fdbf:1d37:bbe0:0:72:7::/112 -> fdbf:1d37:bbe0:0:72:7:0:f3 metric 0) dev Ethernet 2
  189. 22.12.2018 13:34:21   Log  C:\WINDOWS\system32\netsh.exe interface ipv6 add route fdbf:1d37:bbe0:0:72:7::/112 interface=3 fe80::8 store=active
  190. 22.12.2018 13:34:21   Log  env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  191. 22.12.2018 13:34:21   Log  updown_v6.bat Ethernet 2 1500 1609 10.4.135.243 255.255.255.0 init
  192. 22.12.2018 13:34:21   Log  env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  193. 22.12.2018 13:34:24   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  194. 22.12.2018 13:34:24   Log  Route: Waiting for TUN/TAP interface to come up...
  195. 22.12.2018 13:34:26   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  196. 22.12.2018 13:34:26   Log  Route: Waiting for TUN/TAP interface to come up...
  197. 22.12.2018 13:34:27   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  198. 22.12.2018 13:34:27   Log  Route: Waiting for TUN/TAP interface to come up...
  199. 22.12.2018 13:34:28   Log  TEST ROUTES: 0/0 succeeded len=-1 ret=0 a=0 u/d=down
  200. 22.12.2018 13:34:28   Log  To many Tap Init errors, Disconnecting and reinstalling TAP Adapter
  201. 22.12.2018 13:34:28   Log  Tunnel Basel Disconnect Called Reason:Error
  202. 22.12.2018 13:34:28   Debug  Debug: Serviceconnection Disconnect called
  203. 22.12.2018 13:34:28   Log  State Change Event - Stopping
  204. 22.12.2018 13:34:28   Debug  killConnection called
  205. 22.12.2018 13:34:28   Management  Sending signal to close connection
  206. 22.12.2018 13:34:28   Log  Route: Waiting for TUN/TAP interface to come up...
  207. 22.12.2018 13:34:28   Log  MANAGEMENT: CMD 'exit'
  208. 22.12.2018 13:34:28   Management  Disconnecting from management interface
  209. 22.12.2018 13:34:28   Debug  SendDisconnect done
  210. 22.12.2018 13:34:28   Management  Disconnecting from management interface
  211. 22.12.2018 13:34:28   Debug  DisconnectLogic done
  212. 22.12.2018 13:34:31   Log  State Change Event - Stopped
  213. 22.12.2018 13:34:31   Log  state changes to stoped, reason: Error
  214. 22.12.2018 13:34:31   Log  Handle disconnect for reason Error error:WaitingForTapAdapters
  215. 22.12.2018 13:34:31   Error  Tunnel Basel Disconnect Called Reason:WaitGlobalAction but disconnect reason already is Error
  216. 22.12.2018 13:34:35   Debug  Debug: config connect called
  217. 22.12.2018 13:34:35   Log  DisconnectReason set to NoDisconnect in connect_thread
  218. 22.12.2018 13:34:35   Log  Debug: connect_thread started
  219. 22.12.2018 13:34:35   Log  State Change Event - Initializing
  220. 22.12.2018 13:34:36   Log  Waiting for system to get ready..
  221. 22.12.2018 13:34:36   Log  Waiting for OpenVPN.exe to get ready
  222. 22.12.2018 13:34:36   Log  OpenVPN.exe ready
  223. 22.12.2018 13:34:36   Log  Checking firewall and DNS leak protection settings
  224. 22.12.2018 13:34:36   Log  Tunnel Basel Disconnect Called Reason:UserClicked
  225. 22.12.2018 13:34:36   Debug  Debug: Serviceconnection Disconnect called
  226. 22.12.2018 13:34:36   Log  State Change Event - Stopping
  227. 22.12.2018 13:34:36   Debug  killConnection called
  228. 22.12.2018 13:34:36   Management  Sending signal to close connection
  229. 22.12.2018 13:34:36   Debug  SendDisconnect done
  230. 22.12.2018 13:34:36   Management  Disconnecting from management interface
  231. 22.12.2018 13:34:36   Debug  DisconnectLogic done
  232. 22.12.2018 13:34:37   Log  State Change Event - Stopped
  233. 22.12.2018 13:34:37   Log  state changes to stoped, reason: UserClicked
  234. 22.12.2018 13:34:37   Log  Handle disconnect for reason UserClicked error:NoError
  235. 22.12.2018 13:34:37   Log  Waiting for network to get ready
  236. 22.12.2018 13:34:38   Debug  disconnect triggered, not starting tunnel1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement