Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- + read -r ovpn
- ++ awk '/^remote [0-9][0-9]*\.*/{print $2}' hk90.nordvpn.com.udp1194.ovpn
- + vpnip=209.58.184.164
- + ping -w3 209.58.184.164
- PING 209.58.184.164 (209.58.184.164): 56 data bytes
- --- 209.58.184.164 ping statistics ---
- 4 packets transmitted, 0 packets received, 100% packet loss
- + RET=1
- + sleep 2
- + '[' 1 -gt 0 ']'
- + (( dead++ ))
- + echo 3
- 3
- + continue
- + read -r ovpn
- ++ awk '/^remote [0-9][0-9]*\.*/{print $2}' hk91.nordvpn.com.udp1194.ovpn
- + vpnip=43.249.36.135
- + ping -w3 43.249.36.135
- PING 43.249.36.135 (43.249.36.135): 56 data bytes
- 64 bytes from 43.249.36.135: icmp_seq=0 ttl=57 time=9.986 ms
- 64 bytes from 43.249.36.135: icmp_seq=1 ttl=57 time=6.892 ms
- 64 bytes from 43.249.36.135: icmp_seq=2 ttl=57 time=7.954 ms
- --- 43.249.36.135 ping statistics ---
- 4 packets transmitted, 3 packets received, 25% packet loss
- round-trip min/avg/max/stddev = 6.892/8.277/9.986/1.284 ms
- + RET=0
- + sleep 2
- + '[' 0 -gt 0 ']'
- + sudo iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
- + sudo openvpn hk91.nordvpn.com.udp1194.ovpn
- + sudo iptables -A FORWARD -i wlan0 -o tun0 -j ACCEPT
- + sudo iptables -A INPUT -i wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- + sudo iptables -A INPUT -i tun0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- + sudo iptables -A FORWARD -j ACCEPT
- + sleep 2
- + wget -qO- checkip.amazonaws.com
- 43.249.36.137
- + sleep 2
- + wget -qO- https://valid.rpki.cloudflare.com
- {"status":"valid", "asn":133752, "name": "LeaseWeb Asia Pacific / HKG-10", "blackholed":false}+ r1=0
- + sleep 2
- + wget -qO- https://invalid.rpki.cloudflare.com
- invalid+ r2=0
- + sleep 2
- + server=hk91
- + '[' 0 -eq 0 ']'
- + '[' 0 -gt 0 ']'
- + echo 'hk91: failed.'
- hk91: failed.
- + (( bad++ ))
- + sudo pkill openvpn
- + sleep 1
- + sudo iptables -F
- + sleep 1
- + sudo /etc/init.d/openvpn restart
- [ ok ] Restarting openvpn (via systemctl): openvpn.service.
- + sleep 1
- + read -r ovpn
- ++ awk '/^remote [0-9][0-9]*\.*/{print $2}' hk92.nordvpn.com.udp1194.ovpn
- + vpnip=43.249.36.138
- + ping -w3 43.249.36.138
- PING 43.249.36.138 (43.249.36.138): 56 data bytes
- 64 bytes from 43.249.36.138: icmp_seq=0 ttl=56 time=13.735 ms
- 64 bytes from 43.249.36.138: icmp_seq=1 ttl=56 time=8.591 ms
- 64 bytes from 43.249.36.138: icmp_seq=2 ttl=56 time=7.449 ms
- --- 43.249.36.138 ping statistics ---
- 4 packets transmitted, 3 packets received, 25% packet loss
- round-trip min/avg/max/stddev = 7.449/9.925/13.735/2.734 ms
- + RET=0
- + sleep 2
- + '[' 0 -gt 0 ']'
- + sudo iptables -t nat -A POSTROUTING -o tun0 -j MASQUERADE
- + sudo openvpn hk92.nordvpn.com.udp1194.ovpn
- + sudo iptables -A FORWARD -i wlan0 -o tun0 -j ACCEPT
- + sudo iptables -A INPUT -i wlan0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- + sudo iptables -A INPUT -i tun0 -m state --state RELATED,ESTABLISHED -j ACCEPT
- + sudo iptables -A FORWARD -j ACCEPT
- + sleep 2
- + wget -qO- checkip.amazonaws.com
- 43.249.36.140
- + sleep 2
- + wget -qO- https://valid.rpki.cloudflare.com
- {"status":"valid", "asn":133752, "name": "LeaseWeb Asia Pacific / HKG-10", "blackholed":false}+ r1=0
- + sleep 2
- + wget -qO- https://invalid.rpki.cloudflare.com
- invalid+ r2=0
- + sleep 2
- + server=hk92
- + '[' 0 -eq 0 ']'
- + '[' 0 -gt 0 ']'
- + echo 'hk92: failed.'
- hk92: failed.
- + (( bad++ ))
- + sudo pkill openvpn
- + sleep 1
- + sudo iptables -F
- + sleep 1
- + sudo /etc/init.d/openvpn restart
- [ ok ] Restarting openvpn (via systemctl): openvpn.service.
- + sleep 1
Add Comment
Please, Sign In to add comment