Advertisement
gabry3795

OpenVPN UDP mullvad not reconnecting

Jun 5th, 2018
868
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 16.20 KB | None | 0 0
  1. Sat May 26 06:16:42 2018 Note: option tun-ipv6 is ignored because modern operating systems do not need special IPv6 tun handling anymore.
  2. Sat May 26 06:16:42 2018 WARNING: file 'mullvad_userpass.txt' is group or others accessible
  3. Sat May 26 06:16:42 2018 OpenVPN 2.4.6 armv7l-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on May 10 2018
  4. Sat May 26 06:16:42 2018 library versions: OpenSSL 1.0.1t 3 May 2016, LZO 2.06
  5. Sat May 26 06:16:42 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  6. Sat May 26 06:16:43 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.132:443
  7. Sat May 26 06:16:43 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  8. Sat May 26 06:16:43 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.132:443 [nonblock]
  9. Sat May 26 06:16:44 2018 TCP connection established with [AF_INET]185.65.134.132:443
  10. Sat May 26 06:16:44 2018 TCP_CLIENT link local: (not bound)
  11. Sat May 26 06:16:44 2018 TCP_CLIENT link remote: [AF_INET]185.65.134.132:443
  12. Sat May 26 06:16:44 2018 TLS: Initial packet from [AF_INET]185.65.134.132:443, sid=24324865 aff8015c
  13. Sat May 26 06:16:44 2018 WARNING: Failed to stat CRL file, not (re)loading CRL.
  14. Sat May 26 06:16:44 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  15. Sat May 26 06:16:44 2018 VERIFY WARNING: depth=1, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  16. Sat May 26 06:16:44 2018 VERIFY WARNING: depth=2, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  17. Sat May 26 06:16:44 2018 VERIFY OK: depth=2, C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  18. Sat May 26 06:16:44 2018 VERIFY OK: depth=1, C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  19. Sat May 26 06:16:44 2018 VERIFY KU OK
  20. Sat May 26 06:16:44 2018 Validating certificate extended key usage
  21. Sat May 26 06:16:44 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  22. Sat May 26 06:16:44 2018 VERIFY EKU OK
  23. Sat May 26 06:16:44 2018 VERIFY OK: depth=0, C=NA, ST=None, L=None, O=Mullvad, CN=nl2.mullvad.net, emailAddress=info@mullvad.net
  24. Sat May 26 06:16:48 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  25. Sat May 26 06:16:48 2018 [nl2.mullvad.net] Peer Connection Initiated with [AF_INET]185.65.134.132:443
  26. Sat May 26 06:16:49 2018 SENT CONTROL [nl2.mullvad.net]: 'PUSH_REQUEST' (status=1)
  27. Sat May 26 06:16:49 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,route-ipv6 0000::/2,route-ipv6 4000::/2,route-ipv6 8000::/2,route-ipv6 C000::/2,route-gateway 10.5.0.1,topology subnet,socket-flags TCP_NODELAY,ifconfig-ipv6 fdda:d0d0:cafe:443::1007/64 fdda:d0d0:cafe:443::,ifconfig 10.5.0.9 255.255.0.0,peer-id 0,cipher AES-256-GCM'
  28. Sat May 26 06:16:49 2018 OPTIONS IMPORT: --socket-flags option modified
  29. Sat May 26 06:16:49 2018 Socket flags: TCP_NODELAY=1 succeeded
  30. Sat May 26 06:16:49 2018 OPTIONS IMPORT: --ifconfig/up options modified
  31. Sat May 26 06:16:49 2018 OPTIONS IMPORT: route options modified
  32. Sat May 26 06:16:49 2018 OPTIONS IMPORT: route-related options modified
  33. Sat May 26 06:16:49 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  34. Sat May 26 06:16:49 2018 OPTIONS IMPORT: peer-id set
  35. Sat May 26 06:16:49 2018 OPTIONS IMPORT: adjusting link_mtu to 1627
  36. Sat May 26 06:16:49 2018 OPTIONS IMPORT: data channel crypto options modified
  37. Sat May 26 06:16:49 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
  38. Sat May 26 06:16:49 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  39. Sat May 26 06:16:49 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  40. Sat May 26 06:16:49 2018 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 IFACE=eth0 HWADDR=b8:27:eb:17:47:36
  41. Sat May 26 06:16:49 2018 GDG6: remote_host_ipv6=n/a
  42. Sat May 26 06:16:49 2018 ROUTE6: default_gateway=UNDEF
  43. Sat May 26 06:16:49 2018 TUN/TAP device tun0 opened
  44. Sat May 26 06:16:49 2018 TUN/TAP TX queue length set to 100
  45. Sat May 26 06:16:49 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=1
  46. Sat May 26 06:16:49 2018 /sbin/ifconfig tun0 10.5.0.9 netmask 255.255.0.0 mtu 1500 broadcast 10.5.255.255
  47. Sat May 26 06:16:49 2018 /sbin/ifconfig tun0 add fdda:d0d0:cafe:443::1007/64
  48. Sat May 26 06:16:49 2018 /etc/openvpn/update-resolv-conf tun0 1500 1555 10.5.0.9 255.255.0.0 init
  49. Sat May 26 06:16:49 2018 /sbin/route add -net 185.65.134.132 netmask 255.255.255.255 gw 192.168.0.1
  50. Sat May 26 06:16:49 2018 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
  51. Sat May 26 06:16:49 2018 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.5.0.1
  52. Sat May 26 06:16:49 2018 add_route_ipv6(::/2 -> fdda:d0d0:cafe:443:: metric -1) dev tun0
  53. Sat May 26 06:16:49 2018 /sbin/route -A inet6 add ::/2 dev tun0
  54. Sat May 26 06:16:49 2018 add_route_ipv6(4000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev tun0
  55. Sat May 26 06:16:49 2018 /sbin/route -A inet6 add 4000::/2 dev tun0
  56. Sat May 26 06:16:49 2018 add_route_ipv6(8000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev tun0
  57. Sat May 26 06:16:49 2018 /sbin/route -A inet6 add 8000::/2 dev tun0
  58. Sat May 26 06:16:49 2018 add_route_ipv6(c000::/2 -> fdda:d0d0:cafe:443:: metric -1) dev tun0
  59. Sat May 26 06:16:49 2018 /sbin/route -A inet6 add c000::/2 dev tun0
  60. Sat May 26 06:16:49 2018 Initialization Sequence Completed
  61. Sat May 26 07:16:48 2018 TLS: soft reset sec=0 bytes=99197/-1 pkts=1421/0
  62. Sat May 26 07:16:48 2018 WARNING: Failed to stat CRL file, not (re)loading CRL.
  63. Sat May 26 07:16:48 2018 VERIFY WARNING: depth=1, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  64. Sat May 26 07:16:48 2018 VERIFY WARNING: depth=2, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  65. Sat May 26 07:16:48 2018 VERIFY OK: depth=2, C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  66. Sat May 26 07:16:48 2018 VERIFY OK: depth=1, C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  67. Sat May 26 07:16:48 2018 VERIFY KU OK
  68. Sat May 26 07:16:48 2018 Validating certificate extended key usage
  69. Sat May 26 07:16:48 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  70. Sat May 26 07:16:48 2018 VERIFY EKU OK
  71. Sat May 26 07:16:48 2018 VERIFY OK: depth=0, C=NA, ST=None, L=None, O=Mullvad, CN=nl2.mullvad.net, emailAddress=info@mullvad.net
  72. Sat May 26 07:16:51 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  73. Sat May 26 07:16:51 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  74. Sat May 26 07:16:51 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  75. Sat May 26 08:16:48 2018 TLS: tls_process: killed expiring key
  76. Sat May 26 08:16:51 2018 TLS: soft reset sec=0 bytes=47324/-1 pkts=892/0
  77. Sat May 26 08:16:51 2018 WARNING: Failed to stat CRL file, not (re)loading CRL.
  78. Sat May 26 08:16:52 2018 VERIFY WARNING: depth=1, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  79. Sat May 26 08:16:52 2018 VERIFY WARNING: depth=2, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  80. Sat May 26 08:16:52 2018 VERIFY OK: depth=2, C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  81. Sat May 26 08:16:52 2018 VERIFY OK: depth=1, C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  82. Sat May 26 08:16:52 2018 VERIFY KU OK
  83. Sat May 26 08:16:52 2018 Validating certificate extended key usage
  84. Sat May 26 08:16:52 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  85. Sat May 26 08:16:52 2018 VERIFY EKU OK
  86. Sat May 26 08:16:52 2018 VERIFY OK: depth=0, C=NA, ST=None, L=None, O=Mullvad, CN=nl2.mullvad.net, emailAddress=info@mullvad.net
  87. Sat May 26 08:16:54 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  88. Sat May 26 08:16:54 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  89. Sat May 26 08:16:54 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  90. Sat May 26 09:16:51 2018 TLS: tls_process: killed expiring key
  91. Sat May 26 09:16:54 2018 TLS: soft reset sec=0 bytes=45415/-1 pkts=863/0
  92. Sat May 26 09:16:54 2018 WARNING: Failed to stat CRL file, not (re)loading CRL.
  93. Sat May 26 09:16:54 2018 VERIFY WARNING: depth=1, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  94. Sat May 26 09:16:54 2018 VERIFY WARNING: depth=2, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  95. Sat May 26 09:16:54 2018 VERIFY OK: depth=2, C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  96. Sat May 26 09:16:54 2018 VERIFY OK: depth=1, C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  97. Sat May 26 09:16:54 2018 VERIFY KU OK
  98. Sat May 26 09:16:54 2018 Validating certificate extended key usage
  99. Sat May 26 09:16:54 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  100. Sat May 26 09:16:54 2018 VERIFY EKU OK
  101. Sat May 26 09:16:54 2018 VERIFY OK: depth=0, C=NA, ST=None, L=None, O=Mullvad, CN=nl2.mullvad.net, emailAddress=info@mullvad.net
  102. Sat May 26 09:16:57 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  103. Sat May 26 09:16:57 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  104. Sat May 26 09:16:57 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  105. Sat May 26 10:16:55 2018 TLS: tls_process: killed expiring key
  106. Sat May 26 10:16:57 2018 TLS: soft reset sec=0 bytes=40763/-1 pkts=814/0
  107. Sat May 26 10:16:57 2018 WARNING: Failed to stat CRL file, not (re)loading CRL.
  108. Sat May 26 10:16:57 2018 VERIFY WARNING: depth=1, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  109. Sat May 26 10:16:57 2018 VERIFY WARNING: depth=2, unable to get certificate CRL: C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  110. Sat May 26 10:16:57 2018 VERIFY OK: depth=2, C=NA, ST=None, L=None, O=Mullvad, CN=Mullvad CA, emailAddress=info@mullvad.net
  111. Sat May 26 10:16:57 2018 VERIFY OK: depth=1, C=NA, ST=None, L=None, O=Mullvad, CN=master.mullvad.net, emailAddress=info@mullvad.net
  112. Sat May 26 10:16:57 2018 VERIFY KU OK
  113. Sat May 26 10:16:57 2018 Validating certificate extended key usage
  114. Sat May 26 10:16:57 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  115. Sat May 26 10:16:57 2018 VERIFY EKU OK
  116. Sat May 26 10:16:57 2018 VERIFY OK: depth=0, C=NA, ST=None, L=None, O=Mullvad, CN=nl2.mullvad.net, emailAddress=info@mullvad.net
  117. Sat May 26 10:17:00 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  118. Sat May 26 10:17:00 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  119. Sat May 26 10:17:00 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  120. Sat May 26 10:22:44 2018 Connection reset, restarting [0]
  121. Sat May 26 10:22:44 2018 SIGUSR1[soft,connection-reset] received, process restarting
  122. Sat May 26 10:22:44 2018 Restart pause, 5 second(s)
  123. Sat May 26 10:22:49 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  124. Sat May 26 10:22:49 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.132:443
  125. Sat May 26 10:22:49 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  126. Sat May 26 10:22:49 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.132:443 [nonblock]
  127. Sat May 26 10:24:49 2018 TCP: connect to [AF_INET]185.65.134.132:443 failed: Connection timed out
  128. Sat May 26 10:24:49 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  129. Sat May 26 10:24:49 2018 Restart pause, 5 second(s)
  130. Sat May 26 10:24:54 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  131. Sat May 26 10:24:54 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.133:443
  132. Sat May 26 10:24:54 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  133. Sat May 26 10:24:54 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.133:443 [nonblock]
  134. Sat May 26 10:26:54 2018 TCP: connect to [AF_INET]185.65.134.133:443 failed: Connection timed out
  135. Sat May 26 10:26:54 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  136. Sat May 26 10:26:54 2018 Restart pause, 5 second(s)
  137. Sat May 26 10:26:59 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  138. Sat May 26 10:26:59 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.134:443
  139. Sat May 26 10:26:59 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  140. Sat May 26 10:26:59 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.134:443 [nonblock]
  141. Sat May 26 10:28:59 2018 TCP: connect to [AF_INET]185.65.134.134:443 failed: Connection timed out
  142. Sat May 26 10:28:59 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  143. Sat May 26 10:28:59 2018 Restart pause, 5 second(s)
  144. Sat May 26 10:29:04 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  145. Sat May 26 10:29:04 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.135:443
  146. Sat May 26 10:29:04 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  147. Sat May 26 10:29:04 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.135:443 [nonblock]
  148. Sat May 26 10:31:04 2018 TCP: connect to [AF_INET]185.65.134.135:443 failed: Connection timed out
  149. Sat May 26 10:31:04 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  150. Sat May 26 10:31:04 2018 Restart pause, 5 second(s)
  151. Sat May 26 10:31:09 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  152. Sat May 26 10:31:09 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.136:443
  153. Sat May 26 10:31:09 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  154. Sat May 26 10:31:09 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.136:443 [nonblock]
  155. Sat May 26 10:33:09 2018 TCP: connect to [AF_INET]185.65.134.136:443 failed: Connection timed out
  156. Sat May 26 10:33:09 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  157. Sat May 26 10:33:09 2018 Restart pause, 5 second(s)
  158. Sat May 26 10:33:14 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  159. Sat May 26 10:33:14 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.137:443
  160. Sat May 26 10:33:14 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  161. Sat May 26 10:33:14 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.137:443 [nonblock]
  162. Sat May 26 10:35:14 2018 TCP: connect to [AF_INET]185.65.134.137:443 failed: Connection timed out
  163. Sat May 26 10:35:14 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  164. Sat May 26 10:35:14 2018 Restart pause, 5 second(s)
  165. Sat May 26 10:35:19 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
  166. Sat May 26 10:35:19 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]185.65.134.138:443
  167. Sat May 26 10:35:19 2018 Socket Buffers: R=[87380->327680] S=[16384->327680]
  168. Sat May 26 10:35:19 2018 Attempting to establish TCP connection with [AF_INET]185.65.134.138:443 [nonblock]
  169. Sat May 26 10:37:19 2018 TCP: connect to [AF_INET]185.65.134.138:443 failed: Connection timed out
  170. Sat May 26 10:37:19 2018 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  171. Sat May 26 10:37:19 2018 Restart pause, 5 second(s)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement