Advertisement
Guest User

Untitled

a guest
Apr 7th, 2018
17,639
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.46 KB | None | 0 0
  1.  
  2. ExpressVPN client version : 6.5.1
  3. ExpressVPN client build : 6.5.1 (6.5.1.3605)
  4. Operating system version : win6.3.0
  5. Timestamp: 2018-04-07 21:03:00.1362604 +0200 EET
  6. Cluster list file version: 20180407|1|
  7. Cluster list download date: 2018-04-07 19:15:38.4692353 +0200 EET
  8.  
  9.  
  10.  
  11. ==============================================
  12.  
  13. Connecting to USA - New York, ip: 153.65.154.252, protocol: udp
  14. Diagnostics:
  15. has internet: false
  16. cluster stats: min/avg/max/stddev = 206.058/1209.675/2000.170/883.790 ms, x
  17. cluster packet loss rate: 55.6%
  18.  
  19. Sat Apr 07 20:58:13 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
  20. Sat Apr 07 20:58:13 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  21. Sat Apr 07 20:58:13 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  22. Sat Apr 07 20:58:13 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:58071
  23. Sat Apr 07 20:58:13 2018 Control Channel Authentication: tls-auth using INLINE static key file
  24. Sat Apr 07 20:58:13 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  25. Sat Apr 07 20:58:13 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  26. Sat Apr 07 20:58:13 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  27. Sat Apr 07 20:58:13 2018 UDPv4 link local: [undef]
  28. Sat Apr 07 20:58:13 2018 UDPv4 link remote: [AF_INET]153.65.154.252:16402
  29. Sat Apr 07 20:58:13 2018 TLS: Initial packet from [AF_INET]153.65.154.252:16402, sid=d5f57586 4c1f16b1
  30. Sat Apr 07 20:58:13 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  31. Sat Apr 07 20:58:13 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  32. Sat Apr 07 20:58:13 2018 VERIFY OK: nsCertType=SERVER
  33. Sat Apr 07 20:58:13 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1946-1a, emailAddress=support@expressvpn.com
  34. Sat Apr 07 20:58:13 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1946-1a, emailAddress=support@expressvpn.com
  35. Sat Apr 07 20:58:14 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  36. Sat Apr 07 20:58:14 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  37. Sat Apr 07 20:58:14 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  38. Sat Apr 07 20:58:14 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  39. Sat Apr 07 20:58:14 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  40. Sat Apr 07 20:58:14 2018 [Server-1946-1a] Peer Connection Initiated with [AF_INET]153.65.154.252:16402
  41. Sat Apr 07 20:58:16 2018 SENT CONTROL [Server-1946-1a]: 'PUSH_REQUEST' (status=1)
  42. Sat Apr 07 20:58:17 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.163.0.1,route 10.163.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.163.129.150 10.163.129.149'
  43. Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: timers and/or timeouts modified
  44. Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: --ifconfig/up options modified
  45. Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: route options modified
  46. Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  47. Sat Apr 07 20:58:17 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  48. Sat Apr 07 20:58:17 2018 open_tun, tt->ipv6=0
  49. Sat Apr 07 20:58:17 2018 CreateFile failed on TAP device: \\.\Global\{52751CEE-3B57-40B6-8370-140DB30CFB1F}.tap
  50. Sat Apr 07 20:58:17 2018 All TAP-Windows adapters on this system are currently in use.
  51. Sat Apr 07 20:58:17 2018 Exiting due to fatal error
  52. Disconnected with error: vpn process terminated unexpectedly
  53.  
  54.  
  55. ==============================================
  56.  
  57. Connecting to USA - New York, ip: 117.111.111.133, protocol: udp
  58. Diagnostics:
  59. has internet: false
  60. udp ping: is_timeout: true, latency: 2000.2 ms, error: read udp 10.34.0.174:59003->117.111.111.133:9559: i/o timeout
  61. cluster stats: min/avg/max/stddev = 206.058/1209.675/2000.170/883.790 ms, x
  62. cluster packet loss rate: 55.6%
  63.  
  64. Sat Apr 07 20:58:19 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
  65. Sat Apr 07 20:58:19 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  66. Sat Apr 07 20:58:19 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  67. Sat Apr 07 20:58:19 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:58080
  68. Sat Apr 07 20:58:19 2018 Control Channel Authentication: tls-auth using INLINE static key file
  69. Sat Apr 07 20:58:19 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  70. Sat Apr 07 20:58:19 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  71. Sat Apr 07 20:58:19 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  72. Sat Apr 07 20:58:19 2018 UDPv4 link local: [undef]
  73. Sat Apr 07 20:58:19 2018 UDPv4 link remote: [AF_INET]117.111.111.133:14486
  74. Sat Apr 07 20:58:19 2018 TLS: Initial packet from [AF_INET]117.111.111.133:14486, sid=bb28e934 b887bd74
  75. Sat Apr 07 20:58:19 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  76. Sat Apr 07 20:58:20 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  77. Sat Apr 07 20:58:20 2018 VERIFY OK: nsCertType=SERVER
  78. Sat Apr 07 20:58:20 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
  79. Sat Apr 07 20:58:20 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
  80. Sat Apr 07 20:58:20 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  81. Sat Apr 07 20:58:20 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  82. Sat Apr 07 20:58:20 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  83. Sat Apr 07 20:58:20 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  84. Sat Apr 07 20:58:20 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  85. Sat Apr 07 20:58:20 2018 [Server-1757-1a] Peer Connection Initiated with [AF_INET]117.111.111.133:14486
  86. Sat Apr 07 20:58:22 2018 SENT CONTROL [Server-1757-1a]: 'PUSH_REQUEST' (status=1)
  87. Sat Apr 07 20:58:23 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.58.0.1,route 10.58.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.58.124.58 10.58.124.57'
  88. Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: timers and/or timeouts modified
  89. Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: --ifconfig/up options modified
  90. Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: route options modified
  91. Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  92. Sat Apr 07 20:58:23 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  93. Sat Apr 07 20:58:23 2018 open_tun, tt->ipv6=0
  94. Sat Apr 07 20:58:23 2018 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{52751CEE-3B57-40B6-8370-140DB30CFB1F}.tap
  95. Sat Apr 07 20:58:23 2018 TAP-Windows Driver Version 9.23
  96. Sat Apr 07 20:58:23 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.58.124.58/255.255.255.252 on interface {52751CEE-3B57-40B6-8370-140DB30CFB1F} [DHCP-serv: 10.58.124.57, lease-time: 31536000]
  97. Sat Apr 07 20:58:23 2018 Successful ARP Flush on interface [16] {52751CEE-3B57-40B6-8370-140DB30CFB1F}
  98. Sat Apr 07 20:58:25 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  99. Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 117.111.111.133 MASK 255.255.255.255 192.168.1.1
  100. Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  101. Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.58.124.57
  102. Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  103. Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.58.124.57
  104. Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  105. Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 10.58.0.1 MASK 255.255.255.255 10.58.124.57
  106. Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  107. Sat Apr 07 20:58:25 2018 Initialization Sequence Completed
  108. Sat Apr 07 20:58:39 2018 TUN/TAP I/O operation aborted, restarting
  109. Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 10.58.0.1 MASK 255.255.255.255 10.58.124.57
  110. Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  111. Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 117.111.111.133 MASK 255.255.255.255 192.168.1.1
  112. Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  113. Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.58.124.57
  114. Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  115. Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.58.124.57
  116. Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
  117. Sat Apr 07 20:58:39 2018 Closing TUN/TAP interface
  118. Sat Apr 07 20:58:39 2018 SIGHUP[soft,tun-abort] received, process restarting
  119. Sat Apr 07 20:58:39 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
  120. Sat Apr 07 20:58:39 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  121. Sat Apr 07 20:58:39 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  122. Sat Apr 07 20:58:39 2018 Restart pause, 10 second(s)
  123. Sat Apr 07 20:58:49 2018 Control Channel Authentication: tls-auth using INLINE static key file
  124. Sat Apr 07 20:58:49 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  125. Sat Apr 07 20:58:49 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  126. Sat Apr 07 20:58:49 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  127. Sat Apr 07 20:58:49 2018 UDPv4 link local: [undef]
  128. Sat Apr 07 20:58:49 2018 UDPv4 link remote: [AF_INET]117.111.111.133:14486
  129. Sat Apr 07 20:58:49 2018 TLS: Initial packet from [AF_INET]117.111.111.133:14486, sid=01aace9f 7cce7183
  130. Sat Apr 07 20:58:50 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  131. Sat Apr 07 20:58:50 2018 VERIFY OK: nsCertType=SERVER
  132. Sat Apr 07 20:58:50 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
  133. Sat Apr 07 20:58:50 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
  134. Sat Apr 07 20:58:50 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  135. Sat Apr 07 20:58:50 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  136. Sat Apr 07 20:58:50 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  137. Sat Apr 07 20:58:50 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  138. Sat Apr 07 20:58:50 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  139. Sat Apr 07 20:58:50 2018 [Server-1757-1a] Peer Connection Initiated with [AF_INET]117.111.111.133:14486
  140. Sat Apr 07 20:58:52 2018 SENT CONTROL [Server-1757-1a]: 'PUSH_REQUEST' (status=1)
  141. Sat Apr 07 20:58:52 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.58.0.1,route 10.58.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.58.124.58 10.58.124.57'
  142. Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: timers and/or timeouts modified
  143. Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: --ifconfig/up options modified
  144. Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: route options modified
  145. Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  146. Sat Apr 07 20:58:52 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
  147. Sat Apr 07 20:58:52 2018 open_tun, tt->ipv6=0
  148. Sat Apr 07 20:58:52 2018 CreateFile failed on TAP device: \\.\Global\{52751CEE-3B57-40B6-8370-140DB30CFB1F}.tap
  149. Sat Apr 07 20:58:52 2018 All TAP-Windows adapters on this system are currently in use.
  150. Sat Apr 07 20:58:52 2018 Exiting due to fatal error
  151. Disconnected with error: vpn process terminated unexpectedly
  152.  
  153.  
  154. ==============================================
  155.  
  156. Connecting to USA - New York, ip: 117.111.111.133, protocol: udp
  157. Diagnostics:
  158. has internet: false
  159. udp ping: is_timeout: true, latency: 2000.2 ms, error: read udp 10.34.0.174:59003->117.111.111.133:9559: i/o timeout
  160. cluster stats: min/avg/max/stddev = 206.058/1209.675/2000.170/883.790 ms, x
  161. cluster packet loss rate: 55.6%
  162.  
  163. Sat Apr 07 20:58:54 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
  164. Sat Apr 07 20:58:54 2018 Windows version 6.2 (Windows 8 or greater) 64bit
  165. Sat Apr 07 20:58:54 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
  166. Sat Apr 07 20:58:54 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:60662
  167. Sat Apr 07 20:58:54 2018 Control Channel Authentication: tls-auth using INLINE static key file
  168. Sat Apr 07 20:58:54 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  169. Sat Apr 07 20:58:54 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
  170. Sat Apr 07 20:58:54 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
  171. Sat Apr 07 20:58:54 2018 UDPv4 link local: [undef]
  172. Sat Apr 07 20:58:54 2018 UDPv4 link remote: [AF_INET]117.111.111.133:14486
  173. Sat Apr 07 20:58:54 2018 TLS: Initial packet from [AF_INET]117.111.111.133:14486, sid=a8f48e0d 9a5e9e11
  174. Sat Apr 07 20:58:54 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  175. Sat Apr 07 20:58:54 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  176. Sat Apr 07 20:58:54 2018 VERIFY OK: nsCertType=SERVER
  177. Sat Apr 07 20:58:54 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
  178. Sat Apr 07 20:58:54 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
  179. Sat Apr 07 20:58:54 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  180. Sat Apr 07 20:58:54 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  181. Sat Apr 07 20:58:54 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
  182. Sat Apr 07 20:58:54 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
  183. Sat Apr 07 20:58:54 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  184. Sat Apr 07 20:58:54 2018 [Server-1757-1a] Peer Connection Initiated with [AF_INET]117.111.111.133:14486
  185. Sat Apr 07 20:58:55 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:60662
  186. Sat Apr 07 20:58:55 2018 MANAGEMENT: CMD 'signal SIGTERM'
  187. Sat Apr 07 20:58:55 2018 MANAGEMENT: CMD ''
  188. Sat Apr 07 20:58:55 2018 SIGTERM[hard,] received, process exiting
  189. Disconnected with error: cancelled
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement