Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ExpressVPN client version : 6.5.1
- ExpressVPN client build : 6.5.1 (6.5.1.3605)
- Operating system version : win6.3.0
- Timestamp: 2018-04-07 21:03:00.1362604 +0200 EET
- Cluster list file version: 20180407|1|
- Cluster list download date: 2018-04-07 19:15:38.4692353 +0200 EET
- ==============================================
- Connecting to USA - New York, ip: 153.65.154.252, protocol: udp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 206.058/1209.675/2000.170/883.790 ms, x
- cluster packet loss rate: 55.6%
- Sat Apr 07 20:58:13 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Sat Apr 07 20:58:13 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Sat Apr 07 20:58:13 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Sat Apr 07 20:58:13 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:58071
- Sat Apr 07 20:58:13 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Sat Apr 07 20:58:13 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:13 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:13 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Sat Apr 07 20:58:13 2018 UDPv4 link local: [undef]
- Sat Apr 07 20:58:13 2018 UDPv4 link remote: [AF_INET]153.65.154.252:16402
- Sat Apr 07 20:58:13 2018 TLS: Initial packet from [AF_INET]153.65.154.252:16402, sid=d5f57586 4c1f16b1
- Sat Apr 07 20:58:13 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sat Apr 07 20:58:13 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:13 2018 VERIFY OK: nsCertType=SERVER
- Sat Apr 07 20:58:13 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1946-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:13 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1946-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:14 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:14 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:14 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:14 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:14 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sat Apr 07 20:58:14 2018 [Server-1946-1a] Peer Connection Initiated with [AF_INET]153.65.154.252:16402
- Sat Apr 07 20:58:16 2018 SENT CONTROL [Server-1946-1a]: 'PUSH_REQUEST' (status=1)
- Sat Apr 07 20:58:17 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.163.0.1,route 10.163.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.163.129.150 10.163.129.149'
- Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: route options modified
- Sat Apr 07 20:58:17 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sat Apr 07 20:58:17 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sat Apr 07 20:58:17 2018 open_tun, tt->ipv6=0
- Sat Apr 07 20:58:17 2018 CreateFile failed on TAP device: \\.\Global\{52751CEE-3B57-40B6-8370-140DB30CFB1F}.tap
- Sat Apr 07 20:58:17 2018 All TAP-Windows adapters on this system are currently in use.
- Sat Apr 07 20:58:17 2018 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to USA - New York, ip: 117.111.111.133, protocol: udp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: true, latency: 2000.2 ms, error: read udp 10.34.0.174:59003->117.111.111.133:9559: i/o timeout
- cluster stats: min/avg/max/stddev = 206.058/1209.675/2000.170/883.790 ms, x
- cluster packet loss rate: 55.6%
- Sat Apr 07 20:58:19 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Sat Apr 07 20:58:19 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Sat Apr 07 20:58:19 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Sat Apr 07 20:58:19 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:58080
- Sat Apr 07 20:58:19 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Sat Apr 07 20:58:19 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:19 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:19 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Sat Apr 07 20:58:19 2018 UDPv4 link local: [undef]
- Sat Apr 07 20:58:19 2018 UDPv4 link remote: [AF_INET]117.111.111.133:14486
- Sat Apr 07 20:58:19 2018 TLS: Initial packet from [AF_INET]117.111.111.133:14486, sid=bb28e934 b887bd74
- Sat Apr 07 20:58:19 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sat Apr 07 20:58:20 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:20 2018 VERIFY OK: nsCertType=SERVER
- Sat Apr 07 20:58:20 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:20 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:20 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:20 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:20 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:20 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:20 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sat Apr 07 20:58:20 2018 [Server-1757-1a] Peer Connection Initiated with [AF_INET]117.111.111.133:14486
- Sat Apr 07 20:58:22 2018 SENT CONTROL [Server-1757-1a]: 'PUSH_REQUEST' (status=1)
- Sat Apr 07 20:58:23 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.58.0.1,route 10.58.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.58.124.58 10.58.124.57'
- Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: route options modified
- Sat Apr 07 20:58:23 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sat Apr 07 20:58:23 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sat Apr 07 20:58:23 2018 open_tun, tt->ipv6=0
- Sat Apr 07 20:58:23 2018 TAP-WIN32 device [Ethernet 3] opened: \\.\Global\{52751CEE-3B57-40B6-8370-140DB30CFB1F}.tap
- Sat Apr 07 20:58:23 2018 TAP-Windows Driver Version 9.23
- Sat Apr 07 20:58:23 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.58.124.58/255.255.255.252 on interface {52751CEE-3B57-40B6-8370-140DB30CFB1F} [DHCP-serv: 10.58.124.57, lease-time: 31536000]
- Sat Apr 07 20:58:23 2018 Successful ARP Flush on interface [16] {52751CEE-3B57-40B6-8370-140DB30CFB1F}
- Sat Apr 07 20:58:25 2018 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 117.111.111.133 MASK 255.255.255.255 192.168.1.1
- Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.58.124.57
- Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.58.124.57
- Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:25 2018 C:\Windows\system32\route.exe ADD 10.58.0.1 MASK 255.255.255.255 10.58.124.57
- Sat Apr 07 20:58:25 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:25 2018 Initialization Sequence Completed
- Sat Apr 07 20:58:39 2018 TUN/TAP I/O operation aborted, restarting
- Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 10.58.0.1 MASK 255.255.255.255 10.58.124.57
- Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 117.111.111.133 MASK 255.255.255.255 192.168.1.1
- Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.58.124.57
- Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:39 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.58.124.57
- Sat Apr 07 20:58:39 2018 env_block: add PATH=C:\Windows\System32;C:\Windows;C:\Windows\System32\Wbem
- Sat Apr 07 20:58:39 2018 Closing TUN/TAP interface
- Sat Apr 07 20:58:39 2018 SIGHUP[soft,tun-abort] received, process restarting
- Sat Apr 07 20:58:39 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Sat Apr 07 20:58:39 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Sat Apr 07 20:58:39 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Sat Apr 07 20:58:39 2018 Restart pause, 10 second(s)
- Sat Apr 07 20:58:49 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Sat Apr 07 20:58:49 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:49 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:49 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Sat Apr 07 20:58:49 2018 UDPv4 link local: [undef]
- Sat Apr 07 20:58:49 2018 UDPv4 link remote: [AF_INET]117.111.111.133:14486
- Sat Apr 07 20:58:49 2018 TLS: Initial packet from [AF_INET]117.111.111.133:14486, sid=01aace9f 7cce7183
- Sat Apr 07 20:58:50 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:50 2018 VERIFY OK: nsCertType=SERVER
- Sat Apr 07 20:58:50 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:50 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:50 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:50 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:50 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:50 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:50 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sat Apr 07 20:58:50 2018 [Server-1757-1a] Peer Connection Initiated with [AF_INET]117.111.111.133:14486
- Sat Apr 07 20:58:52 2018 SENT CONTROL [Server-1757-1a]: 'PUSH_REQUEST' (status=1)
- Sat Apr 07 20:58:52 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.58.0.1,route 10.58.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.58.124.58 10.58.124.57'
- Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: route options modified
- Sat Apr 07 20:58:52 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sat Apr 07 20:58:52 2018 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
- Sat Apr 07 20:58:52 2018 open_tun, tt->ipv6=0
- Sat Apr 07 20:58:52 2018 CreateFile failed on TAP device: \\.\Global\{52751CEE-3B57-40B6-8370-140DB30CFB1F}.tap
- Sat Apr 07 20:58:52 2018 All TAP-Windows adapters on this system are currently in use.
- Sat Apr 07 20:58:52 2018 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to USA - New York, ip: 117.111.111.133, protocol: udp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: true, latency: 2000.2 ms, error: read udp 10.34.0.174:59003->117.111.111.133:9559: i/o timeout
- cluster stats: min/avg/max/stddev = 206.058/1209.675/2000.170/883.790 ms, x
- cluster packet loss rate: 55.6%
- Sat Apr 07 20:58:54 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Sat Apr 07 20:58:54 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Sat Apr 07 20:58:54 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Sat Apr 07 20:58:54 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:60662
- Sat Apr 07 20:58:54 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Sat Apr 07 20:58:54 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:54 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:54 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Sat Apr 07 20:58:54 2018 UDPv4 link local: [undef]
- Sat Apr 07 20:58:54 2018 UDPv4 link remote: [AF_INET]117.111.111.133:14486
- Sat Apr 07 20:58:54 2018 TLS: Initial packet from [AF_INET]117.111.111.133:14486, sid=a8f48e0d 9a5e9e11
- Sat Apr 07 20:58:54 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sat Apr 07 20:58:54 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:54 2018 VERIFY OK: nsCertType=SERVER
- Sat Apr 07 20:58:54 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:54 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-1757-1a, emailAddress=support@expressvpn.com
- Sat Apr 07 20:58:54 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:54 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:54 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Sat Apr 07 20:58:54 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Sat Apr 07 20:58:54 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sat Apr 07 20:58:54 2018 [Server-1757-1a] Peer Connection Initiated with [AF_INET]117.111.111.133:14486
- Sat Apr 07 20:58:55 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:60662
- Sat Apr 07 20:58:55 2018 MANAGEMENT: CMD 'signal SIGTERM'
- Sat Apr 07 20:58:55 2018 MANAGEMENT: CMD ''
- Sat Apr 07 20:58:55 2018 SIGTERM[hard,] received, process exiting
- Disconnected with error: cancelled
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement