Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: OpenVPN 2.4.7 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
- Tue Dec 1 21:32:04 2020 daemon.warn openvpn(194)[32128]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.110.114.243:1194
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Socket Buffers: R=[212992->212992] S=[212992->212992]
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: UDP link local: (not bound)
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: UDP link remote: [AF_INET]194.110.114.243:1194
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: TLS: Initial packet from [AF_INET]194.110.114.243:1194, sid=340d5555 0ce56586
- Tue Dec 1 21:32:04 2020 daemon.warn openvpn(194)[32128]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY KU OK
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: Validating certificate extended key usage
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY EKU OK
- Tue Dec 1 21:32:04 2020 daemon.notice openvpn(194)[32128]: VERIFY OK: depth=0, CN=pl194.nordvpn.com
- Tue Dec 1 21:32:05 2020 daemon.notice openvpn(194)[32128]: Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Tue Dec 1 21:32:05 2020 daemon.notice openvpn(194)[32128]: [pl194.nordvpn.com] Peer Connection Initiated with [AF_INET]194.110.114.243:1194
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: SENT CONTROL [pl194.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.3 255.255.255.0,peer-id 6,cipher AES-256-GCM'
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: timers and/or timeouts modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: explicit notify parm(s) modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: compression parms modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Socket Buffers: R=[212992->425984] S=[212992->425984]
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: --ifconfig/up options modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: route options modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: route-related options modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: peer-id set
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: adjusting link_mtu to 1657
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: OPTIONS IMPORT: data channel crypto options modified
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: TUN/TAP device tun0 opened
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: TUN/TAP TX queue length set to 100
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/ifconfig tun0 10.8.2.3 netmask 255.255.255.0 mtu 1500 broadcast 10.8.2.255
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/route add -net 194.110.114.243 netmask 255.255.255.255 gw 192.168.0.1
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
- Tue Dec 1 21:32:06 2020 daemon.notice openvpn(194)[32128]: Initialization Sequence Completed
- Tue Dec 1 21:33:19 2020 daemon.err openvpn(194)[32128]: event_wait : Interrupted system call (code=4)
- Tue Dec 1 21:33:19 2020 daemon.notice openvpn(194)[32128]: SIGTERM received, sending exit notification to peer
- Tue Dec 1 21:33:19 2020 user.notice vpnbypass [2445]: service monitoring interfaces: wan
- Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/route del -net 194.110.114.243 netmask 255.255.255.255
- Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: Closing TUN/TAP interface
- Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: /sbin/ifconfig tun0 0.0.0.0
- Tue Dec 1 21:33:20 2020 daemon.notice openvpn(194)[32128]: SIGTERM[soft,exit-with-notification] received, process exiting
- Tue Dec 1 21:33:52 2020 user.notice vpnbypass [5082]: service monitoring interfaces: wan
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: OpenVPN 2.4.7 aarch64-openwrt-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD]
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10
- Tue Dec 1 21:33:52 2020 daemon.warn openvpn(193)[5200]: WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: TCP/UDP: Preserving recently used remote address: [AF_INET]194.110.114.235:1194
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Socket Buffers: R=[212992->212992] S=[212992->212992]
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: UDP link local: (not bound)
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: UDP link remote: [AF_INET]194.110.114.235:1194
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: TLS: Initial packet from [AF_INET]194.110.114.235:1194, sid=d4dc8fc3 23faf47c
- Tue Dec 1 21:33:52 2020 daemon.warn openvpn(193)[5200]: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY KU OK
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Validating certificate extended key usage
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY EKU OK
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: VERIFY OK: depth=0, CN=pl193.nordvpn.com
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA
- Tue Dec 1 21:33:52 2020 daemon.notice openvpn(193)[5200]: [pl193.nordvpn.com] Peer Connection Initiated with [AF_INET]194.110.114.235:1194
- Tue Dec 1 21:33:53 2020 daemon.notice openvpn(193)[5200]: SENT CONTROL [pl193.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.2.8 255.255.255.0,peer-id 4,cipher AES-256-GCM'
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: timers and/or timeouts modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: explicit notify parm(s) modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: compression parms modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Socket Buffers: R=[212992->425984] S=[212992->425984]
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: --ifconfig/up options modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: route options modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: route-related options modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: peer-id set
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: adjusting link_mtu to 1657
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: OPTIONS IMPORT: data channel crypto options modified
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Data Channel: using negotiated cipher 'AES-256-GCM'
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: TUN/TAP device tun0 opened
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: TUN/TAP TX queue length set to 100
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/ifconfig tun0 10.8.2.8 netmask 255.255.255.0 mtu 1500 broadcast 10.8.2.255
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/route add -net 194.110.114.235 netmask 255.255.255.255 gw 192.168.0.1
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.2.1
- Tue Dec 1 21:33:54 2020 daemon.notice openvpn(193)[5200]: Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment