Advertisement
Guest User

Untitled

a guest
Dec 2nd, 2018
5,754
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 21.49 KB | None | 0 0
  1.  
  2. ExpressVPN client version : 6.8.5
  3. ExpressVPN client build : 6.8.5 (6.8.5.5936)
  4. Operating system version : win10.0.0.17134
  5. Timestamp: 2018-12-02 11:36:25.0750293 -0800 PST m=+3215.207569301
  6. Cluster list file version: 20181202|1|
  7. Cluster list download date: 2018-12-02 10:50:26.4655337 -0800 PST m=+456.596992101
  8. Smart location download date: 2018-12-02 11:20:27.1783511 -0800 PST m=+2257.310891201
  9. Protocol pecking order download date: 2018-12-02 11:12:52.083583 -0800 PST m=+1802.216123101
  10.  
  11.  
  12. ==============================================
  13.  
  14. Connecting to Japan - Tokyo - 2, ip: 138.74.6.157, protocol: udp
  15. Diagnostics:
  16. has internet: false
  17. cluster stats: min/avg/max/stddev = 0.000/0.000/0.000/0.000 ms, x
  18. cluster packet loss rate: 0.0%
  19.  
  20. Sun Dec 02 11:32:48 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
  21. Sun Dec 02 11:32:48 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [AEAD] built on Oct 30 2018
  22. Sun Dec 02 11:32:48 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  23. Sun Dec 02 11:32:48 2018 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
  24. Sun Dec 02 11:32:48 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:56554
  25. Sun Dec 02 11:32:48 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  26. Sun Dec 02 11:32:48 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  27. Sun Dec 02 11:32:48 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  28. Sun Dec 02 11:32:48 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]138.74.6.157:26741
  29. Sun Dec 02 11:32:48 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  30. Sun Dec 02 11:32:48 2018 UDP link local: (not bound)
  31. Sun Dec 02 11:32:48 2018 UDP link remote: [AF_INET]138.74.6.157:26741
  32. Sun Dec 02 11:32:48 2018 TLS: Initial packet from [AF_INET]138.74.6.157:26741, sid=aaba388a 2378b773
  33. Sun Dec 02 11:32:48 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  34. Sun Dec 02 11:32:49 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  35. Sun Dec 02 11:32:49 2018 VERIFY OK: nsCertType=SERVER
  36. Sun Dec 02 11:32:49 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1171-1a, emailAddress=support@expressvpn.com
  37. Sun Dec 02 11:32:49 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1171-1a, emailAddress=support@expressvpn.com
  38. Sun Dec 02 11:32:49 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  39. Sun Dec 02 11:32:49 2018 [Server-1171-1a] Peer Connection Initiated with [AF_INET]138.74.6.157:26741
  40. Sun Dec 02 11:32:50 2018 SENT CONTROL [Server-1171-1a]: 'PUSH_REQUEST' (status=1)
  41. Sun Dec 02 11:32:50 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.129.0.1,route 10.129.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.129.0.54 10.129.0.53,peer-id 11,cipher AES-256-GCM'
  42. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: timers and/or timeouts modified
  43. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: --ifconfig/up options modified
  44. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: route options modified
  45. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  46. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: peer-id set
  47. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: adjusting link_mtu to 1628
  48. Sun Dec 02 11:32:50 2018 OPTIONS IMPORT: data channel crypto options modified
  49. Sun Dec 02 11:32:50 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
  50. Sun Dec 02 11:32:50 2018 NCP: overriding user-set keysize with default
  51. Sun Dec 02 11:32:50 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  52. Sun Dec 02 11:32:50 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  53. Sun Dec 02 11:32:50 2018 interactive service msg_channel=0
  54. Sun Dec 02 11:32:50 2018 ROUTE_GATEWAY 192.168.1.14/255.255.255.0 I=18 HWADDR=b4:b6:86:e3:25:fa
  55. Sun Dec 02 11:32:50 2018 open_tun
  56. Sun Dec 02 11:32:50 2018 CreateFile failed on TAP device: \\.\Global\{780080E1-A49E-48C7-8B49-0034FEB0DA8D}.tap
  57. Sun Dec 02 11:32:50 2018 All TAP-Windows adapters on this system are currently in use.
  58. Sun Dec 02 11:32:50 2018 Exiting due to fatal error
  59. Disconnected with error: vpn process terminated unexpectedly
  60.  
  61.  
  62. ==============================================
  63.  
  64. Connecting to Japan - Tokyo - 2, ip: 138.74.6.143, protocol: udp
  65. Diagnostics:
  66. has internet: false
  67. cluster stats: min/avg/max/stddev = 0.000/0.000/0.000/0.000 ms, x
  68. cluster packet loss rate: 0.0%
  69.  
  70. Sun Dec 02 11:32:53 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
  71. Sun Dec 02 11:32:53 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [AEAD] built on Oct 30 2018
  72. Sun Dec 02 11:32:53 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  73. Sun Dec 02 11:32:53 2018 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
  74. Sun Dec 02 11:32:53 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:56560
  75. Sun Dec 02 11:32:53 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  76. Sun Dec 02 11:32:54 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  77. Sun Dec 02 11:32:54 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  78. Sun Dec 02 11:32:54 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]138.74.6.143:32966
  79. Sun Dec 02 11:32:54 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  80. Sun Dec 02 11:32:54 2018 UDP link local: (not bound)
  81. Sun Dec 02 11:32:54 2018 UDP link remote: [AF_INET]138.74.6.143:32966
  82. Sun Dec 02 11:32:54 2018 TLS: Initial packet from [AF_INET]138.74.6.143:32966, sid=0a66e517 7e82f8ba
  83. Sun Dec 02 11:32:54 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  84. Sun Dec 02 11:32:54 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  85. Sun Dec 02 11:32:54 2018 VERIFY OK: nsCertType=SERVER
  86. Sun Dec 02 11:32:54 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1620-1a, emailAddress=support@expressvpn.com
  87. Sun Dec 02 11:32:54 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1620-1a, emailAddress=support@expressvpn.com
  88. Sun Dec 02 11:32:54 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  89. Sun Dec 02 11:32:54 2018 [Server-1620-1a] Peer Connection Initiated with [AF_INET]138.74.6.143:32966
  90. Sun Dec 02 11:32:55 2018 SENT CONTROL [Server-1620-1a]: 'PUSH_REQUEST' (status=1)
  91. Sun Dec 02 11:32:55 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.172.0.1,route 10.172.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.172.0.30 10.172.0.29,peer-id 7,cipher AES-256-GCM'
  92. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: timers and/or timeouts modified
  93. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: --ifconfig/up options modified
  94. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: route options modified
  95. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  96. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: peer-id set
  97. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: adjusting link_mtu to 1628
  98. Sun Dec 02 11:32:55 2018 OPTIONS IMPORT: data channel crypto options modified
  99. Sun Dec 02 11:32:55 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
  100. Sun Dec 02 11:32:55 2018 NCP: overriding user-set keysize with default
  101. Sun Dec 02 11:32:55 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  102. Sun Dec 02 11:32:55 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  103. Sun Dec 02 11:32:55 2018 interactive service msg_channel=0
  104. Sun Dec 02 11:32:55 2018 ROUTE_GATEWAY 192.168.1.14/255.255.255.0 I=18 HWADDR=b4:b6:86:e3:25:fa
  105. Sun Dec 02 11:32:55 2018 open_tun
  106. Sun Dec 02 11:32:55 2018 TAP-WIN32 device [Ethernet 10] opened: \\.\Global\{780080E1-A49E-48C7-8B49-0034FEB0DA8D}.tap
  107. Sun Dec 02 11:32:55 2018 TAP-Windows Driver Version 9.23
  108. Sun Dec 02 11:32:55 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.172.0.30/255.255.255.252 on interface {780080E1-A49E-48C7-8B49-0034FEB0DA8D} [DHCP-serv: 10.172.0.29, lease-time: 31536000]
  109. Sun Dec 02 11:32:55 2018 Successful ARP Flush on interface [75] {780080E1-A49E-48C7-8B49-0034FEB0DA8D}
  110. Sun Dec 02 11:32:55 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  111. Sun Dec 02 11:32:57 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  112. Sun Dec 02 11:32:57 2018 C:\WINDOWS\system32\route.exe ADD 138.74.6.143 MASK 255.255.255.255 192.168.1.14
  113. Sun Dec 02 11:32:57 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  114. Sun Dec 02 11:32:57 2018 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.172.0.29
  115. Sun Dec 02 11:32:57 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  116. Sun Dec 02 11:32:57 2018 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.172.0.29
  117. Sun Dec 02 11:32:57 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  118. Sun Dec 02 11:32:57 2018 C:\WINDOWS\system32\route.exe ADD 10.172.0.1 MASK 255.255.255.255 10.172.0.29
  119. Sun Dec 02 11:32:57 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  120. Sun Dec 02 11:32:57 2018 Initialization Sequence Completed
  121. Sun Dec 02 11:33:05 2018 TUN/TAP I/O operation aborted, restarting
  122. Sun Dec 02 11:33:05 2018 C:\WINDOWS\system32\route.exe DELETE 10.172.0.1 MASK 255.255.255.255 10.172.0.29
  123. Sun Dec 02 11:33:05 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  124. Sun Dec 02 11:33:05 2018 C:\WINDOWS\system32\route.exe DELETE 138.74.6.143 MASK 255.255.255.255 192.168.1.14
  125. Sun Dec 02 11:33:05 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  126. Sun Dec 02 11:33:06 2018 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.172.0.29
  127. Sun Dec 02 11:33:06 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  128. Sun Dec 02 11:33:06 2018 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.172.0.29
  129. Sun Dec 02 11:33:06 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  130. Sun Dec 02 11:33:06 2018 Closing TUN/TAP interface
  131. Sun Dec 02 11:33:06 2018 SIGHUP[soft,tun-abort] received, process restarting
  132. Sun Dec 02 11:33:06 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
  133. Sun Dec 02 11:33:06 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [AEAD] built on Oct 30 2018
  134. Sun Dec 02 11:33:06 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  135. Sun Dec 02 11:33:06 2018 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
  136. Sun Dec 02 11:33:06 2018 Restart pause, 10 second(s)
  137. Sun Dec 02 11:33:16 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  138. Sun Dec 02 11:33:16 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  139. Sun Dec 02 11:33:16 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  140. Sun Dec 02 11:33:16 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]138.74.6.143:32966
  141. Sun Dec 02 11:33:16 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  142. Sun Dec 02 11:33:16 2018 UDP link local: (not bound)
  143. Sun Dec 02 11:33:16 2018 UDP link remote: [AF_INET]138.74.6.143:32966
  144. Sun Dec 02 11:33:16 2018 TLS: Initial packet from [AF_INET]138.74.6.143:32966, sid=a7fafcf3 d2c16a45
  145. Sun Dec 02 11:33:16 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  146. Sun Dec 02 11:33:16 2018 VERIFY OK: nsCertType=SERVER
  147. Sun Dec 02 11:33:16 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1620-1a, emailAddress=support@expressvpn.com
  148. Sun Dec 02 11:33:16 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1620-1a, emailAddress=support@expressvpn.com
  149. Sun Dec 02 11:33:16 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  150. Sun Dec 02 11:33:16 2018 [Server-1620-1a] Peer Connection Initiated with [AF_INET]138.74.6.143:32966
  151. Sun Dec 02 11:33:17 2018 SENT CONTROL [Server-1620-1a]: 'PUSH_REQUEST' (status=1)
  152. Sun Dec 02 11:33:17 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.172.0.1,route 10.172.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.172.0.46 10.172.0.45,peer-id 8,cipher AES-256-GCM'
  153. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: timers and/or timeouts modified
  154. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: --ifconfig/up options modified
  155. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: route options modified
  156. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  157. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: peer-id set
  158. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: adjusting link_mtu to 1628
  159. Sun Dec 02 11:33:17 2018 OPTIONS IMPORT: data channel crypto options modified
  160. Sun Dec 02 11:33:17 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
  161. Sun Dec 02 11:33:17 2018 NCP: overriding user-set keysize with default
  162. Sun Dec 02 11:33:17 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  163. Sun Dec 02 11:33:17 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  164. Sun Dec 02 11:33:17 2018 interactive service msg_channel=0
  165. Sun Dec 02 11:33:17 2018 ROUTE_GATEWAY 192.168.1.14/255.255.255.0 I=18 HWADDR=b4:b6:86:e3:25:fa
  166. Sun Dec 02 11:33:17 2018 open_tun
  167. Sun Dec 02 11:33:17 2018 CreateFile failed on TAP device: \\.\Global\{780080E1-A49E-48C7-8B49-0034FEB0DA8D}.tap
  168. Sun Dec 02 11:33:17 2018 All TAP-Windows adapters on this system are currently in use.
  169. Sun Dec 02 11:33:17 2018 Exiting due to fatal error
  170. Disconnected with error: vpn process terminated unexpectedly
  171.  
  172.  
  173. ==============================================
  174.  
  175. Connecting to Japan - Tokyo - 2, ip: 138.74.6.143, protocol: udp
  176. Diagnostics:
  177. has internet: false
  178. cluster stats: min/avg/max/stddev = 0.000/0.000/0.000/0.000 ms, x
  179. cluster packet loss rate: 0.0%
  180.  
  181. Sun Dec 02 11:33:20 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
  182. Sun Dec 02 11:33:20 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [AEAD] built on Oct 30 2018
  183. Sun Dec 02 11:33:20 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  184. Sun Dec 02 11:33:20 2018 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
  185. Sun Dec 02 11:33:20 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:56625
  186. Sun Dec 02 11:33:20 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  187. Sun Dec 02 11:33:20 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  188. Sun Dec 02 11:33:20 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  189. Sun Dec 02 11:33:20 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]138.74.6.143:32966
  190. Sun Dec 02 11:33:20 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  191. Sun Dec 02 11:33:20 2018 UDP link local: (not bound)
  192. Sun Dec 02 11:33:20 2018 UDP link remote: [AF_INET]138.74.6.143:32966
  193. Sun Dec 02 11:33:21 2018 TLS: Initial packet from [AF_INET]138.74.6.143:32966, sid=5f3e8db2 5e0f0b71
  194. Sun Dec 02 11:33:21 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  195. Sun Dec 02 11:33:21 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  196. Sun Dec 02 11:33:21 2018 VERIFY OK: nsCertType=SERVER
  197. Sun Dec 02 11:33:21 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1620-1a, emailAddress=support@expressvpn.com
  198. Sun Dec 02 11:33:21 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1620-1a, emailAddress=support@expressvpn.com
  199. Sun Dec 02 11:33:21 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  200. Sun Dec 02 11:33:21 2018 [Server-1620-1a] Peer Connection Initiated with [AF_INET]138.74.6.143:32966
  201. Sun Dec 02 11:33:22 2018 SENT CONTROL [Server-1620-1a]: 'PUSH_REQUEST' (status=1)
  202. Sun Dec 02 11:33:22 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.172.0.1,route 10.172.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.172.0.50 10.172.0.49,peer-id 11,cipher AES-256-GCM'
  203. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: timers and/or timeouts modified
  204. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: --ifconfig/up options modified
  205. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: route options modified
  206. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  207. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: peer-id set
  208. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: adjusting link_mtu to 1628
  209. Sun Dec 02 11:33:22 2018 OPTIONS IMPORT: data channel crypto options modified
  210. Sun Dec 02 11:33:22 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
  211. Sun Dec 02 11:33:22 2018 NCP: overriding user-set keysize with default
  212. Sun Dec 02 11:33:22 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  213. Sun Dec 02 11:33:22 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  214. Sun Dec 02 11:33:22 2018 interactive service msg_channel=0
  215. Sun Dec 02 11:33:22 2018 ROUTE_GATEWAY 192.168.1.14/255.255.255.0 I=18 HWADDR=b4:b6:86:e3:25:fa
  216. Sun Dec 02 11:33:22 2018 open_tun
  217. Sun Dec 02 11:33:22 2018 TAP-WIN32 device [Ethernet 10] opened: \\.\Global\{780080E1-A49E-48C7-8B49-0034FEB0DA8D}.tap
  218. Sun Dec 02 11:33:22 2018 TAP-Windows Driver Version 9.23
  219. Sun Dec 02 11:33:22 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.172.0.50/255.255.255.252 on interface {780080E1-A49E-48C7-8B49-0034FEB0DA8D} [DHCP-serv: 10.172.0.49, lease-time: 31536000]
  220. Sun Dec 02 11:33:22 2018 Successful ARP Flush on interface [75] {780080E1-A49E-48C7-8B49-0034FEB0DA8D}
  221. Sun Dec 02 11:33:22 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  222. Sun Dec 02 11:33:24 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  223. Sun Dec 02 11:33:24 2018 C:\WINDOWS\system32\route.exe ADD 138.74.6.143 MASK 255.255.255.255 192.168.1.14
  224. Sun Dec 02 11:33:24 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  225. Sun Dec 02 11:33:24 2018 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.172.0.49
  226. Sun Dec 02 11:33:24 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  227. Sun Dec 02 11:33:24 2018 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.172.0.49
  228. Sun Dec 02 11:33:24 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  229. Sun Dec 02 11:33:24 2018 C:\WINDOWS\system32\route.exe ADD 10.172.0.1 MASK 255.255.255.255 10.172.0.49
  230. Sun Dec 02 11:33:24 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  231. Sun Dec 02 11:33:24 2018 Initialization Sequence Completed
  232. Sun Dec 02 11:33:33 2018 TUN/TAP I/O operation aborted, restarting
  233. Sun Dec 02 11:33:33 2018 C:\WINDOWS\system32\route.exe DELETE 10.172.0.1 MASK 255.255.255.255 10.172.0.49
  234. Sun Dec 02 11:33:33 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  235. Sun Dec 02 11:33:33 2018 C:\WINDOWS\system32\route.exe DELETE 138.74.6.143 MASK 255.255.255.255 192.168.1.14
  236. Sun Dec 02 11:33:33 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  237. Sun Dec 02 11:33:34 2018 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.172.0.49
  238. Sun Dec 02 11:33:34 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  239. Sun Dec 02 11:33:34 2018 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.172.0.49
  240. Sun Dec 02 11:33:34 2018 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  241. Sun Dec 02 11:33:34 2018 Closing TUN/TAP interface
  242. Sun Dec 02 11:33:34 2018 SIGHUP[soft,tun-abort] received, process restarting
  243. Sun Dec 02 11:33:34 2018 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
  244. Sun Dec 02 11:33:34 2018 OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [AEAD] built on Oct 30 2018
  245. Sun Dec 02 11:33:34 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  246. Sun Dec 02 11:33:34 2018 library versions: OpenSSL 1.0.2p 14 Aug 2018, LZO 2.10
  247. Sun Dec 02 11:33:34 2018 Restart pause, 10 second(s)
  248. Sun Dec 02 11:33:44 2018 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  249. Sun Dec 02 11:33:44 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  250. Sun Dec 02 11:33:44 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  251. Sun Dec 02 11:33:44 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]138.74.6.143:32966
  252. Sun Dec 02 11:33:44 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  253. Sun Dec 02 11:33:44 2018 UDP link local: (not bound)
  254. Sun Dec 02 11:33:44 2018 UDP link remote: [AF_INET]138.74.6.143:32966
  255. Sun Dec 02 11:34:04 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:56625
  256. Sun Dec 02 11:34:04 2018 MANAGEMENT: CMD ''
  257. Sun Dec 02 11:34:04 2018 MANAGEMENT: CMD 'signal SIGTERM'
  258. Sun Dec 02 11:34:04 2018 MANAGEMENT: Client disconnected
  259. Sun Dec 02 11:34:04 2018 MANAGEMENT: TCP recv error: Unknown error
  260. Sun Dec 02 11:34:04 2018 Assertion failed at win32.c:328 (!socket_defined(ne->sd))
  261. Sun Dec 02 11:34:04 2018 Exiting due to fatal error
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement