Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Mon May 29 11:33:03 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
- Mon May 29 11:33:03 2017 Windows version 6.2 (Windows 8 or greater) 64bit
- Mon May 29 11:33:03 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
- Enter Management Password:
- Mon May 29 11:33:03 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25348
- Mon May 29 11:33:03 2017 Need hold release from management interface, waiting...
- Mon May 29 11:33:03 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25348
- Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'state on'
- Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'log all on'
- Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'hold off'
- Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'hold release'
- Mon May 29 11:33:11 2017 MANAGEMENT: CMD 'username "Auth" "max@antisupport.ru"'
- Mon May 29 11:33:11 2017 MANAGEMENT: CMD 'password [...]'
- Mon May 29 11:33:12 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Mon May 29 11:33:12 2017 NOTE: --fast-io is disabled since we are running on Windows
- Mon May 29 11:33:12 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Mon May 29 11:33:12 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Mon May 29 11:33:12 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
- Mon May 29 11:33:12 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon May 29 11:33:12 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
- Mon May 29 11:33:12 2017 MANAGEMENT: >STATE:1496039592,TCP_CONNECT,,,,,,
- Mon May 29 11:33:13 2017 TCP connection established with [AF_INET]5.254.86.214:443
- Mon May 29 11:33:13 2017 TCP_CLIENT link local: (not bound)
- Mon May 29 11:33:13 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
- Mon May 29 11:33:13 2017 MANAGEMENT: >STATE:1496039593,WAIT,,,,,,
- Mon May 29 11:33:13 2017 MANAGEMENT: >STATE:1496039593,AUTH,,,,,,
- Mon May 29 11:33:13 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=9b03b704 05f87bb3
- Mon May 29 11:33:13 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Mon May 29 11:33:13 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 11:33:13 2017 Validating certificate key usage
- Mon May 29 11:33:13 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 11:33:13 2017 VERIFY KU OK
- Mon May 29 11:33:13 2017 Validating certificate extended key usage
- Mon May 29 11:33:13 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 11:33:13 2017 VERIFY EKU OK
- Mon May 29 11:33:13 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 11:33:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 11:33:14 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
- Mon May 29 11:33:15 2017 MANAGEMENT: >STATE:1496039595,GET_CONFIG,,,,,,
- Mon May 29 11:33:15 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Mon May 29 11:33:16 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.39 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Mon May 29 11:33:16 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: route options modified
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: route-related options modified
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: peer-id set
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
- Mon May 29 11:33:16 2017 OPTIONS IMPORT: data channel crypto options modified
- Mon May 29 11:33:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 11:33:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 11:33:16 2017 interactive service msg_channel=0
- Mon May 29 11:33:16 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=27 HWADDR=00:23:54:37:4a:30
- Mon May 29 11:33:16 2017 open_tun
- Mon May 29 11:33:16 2017 TAP-WIN32 device [Ethernet] opened: \\.\Global\{B924712C-AC4F-41CA-BEB6-8811D3F56B7E}.tap
- Mon May 29 11:33:16 2017 TAP-Windows Driver Version 9.21
- Mon May 29 11:33:16 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.39/255.255.255.0 [SUCCEEDED]
- Mon May 29 11:33:16 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.39/255.255.255.0 on interface {B924712C-AC4F-41CA-BEB6-8811D3F56B7E} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
- Mon May 29 11:33:16 2017 Successful ARP Flush on interface [20] {B924712C-AC4F-41CA-BEB6-8811D3F56B7E}
- Mon May 29 11:33:16 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon May 29 11:33:16 2017 MANAGEMENT: >STATE:1496039596,ASSIGN_IP,,10.7.7.39,,,,
- Mon May 29 11:33:21 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
- Mon May 29 11:33:21 2017 C:\WINDOWS\system32\route.exe ADD 5.254.86.214 MASK 255.255.255.255 192.168.0.1
- Mon May 29 11:33:21 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Mon May 29 11:33:21 2017 Route addition via IPAPI succeeded [adaptive]
- Mon May 29 11:33:21 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 11:33:21 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon May 29 11:33:21 2017 Route addition via IPAPI succeeded [adaptive]
- Mon May 29 11:33:21 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 11:33:21 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon May 29 11:33:21 2017 Route addition via IPAPI succeeded [adaptive]
- Mon May 29 11:33:21 2017 Initialization Sequence Completed
- Mon May 29 11:33:21 2017 MANAGEMENT: >STATE:1496039601,CONNECTED,SUCCESS,10.7.7.39,5.254.86.214,443,192.168.0.2,61271
- Mon May 29 12:33:15 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 12:33:15 2017 Validating certificate key usage
- Mon May 29 12:33:15 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 12:33:15 2017 VERIFY KU OK
- Mon May 29 12:33:15 2017 Validating certificate extended key usage
- Mon May 29 12:33:15 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 12:33:15 2017 VERIFY EKU OK
- Mon May 29 12:33:15 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 12:33:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 12:33:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 12:33:16 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 13:29:49 2017 TUN/TAP I/O operation aborted, restarting
- Mon May 29 13:29:49 2017 C:\WINDOWS\system32\route.exe DELETE 5.254.86.214 MASK 255.255.255.255 192.168.0.1
- Mon May 29 13:29:49 2017 Route deletion via IPAPI succeeded [adaptive]
- Mon May 29 13:29:49 2017 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 13:29:49 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
- Mon May 29 13:29:49 2017 Route deletion via IPAPI failed [adaptive]
- Mon May 29 13:29:49 2017 Route deletion fallback to route.exe
- Mon May 29 13:29:49 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Mon May 29 13:29:49 2017 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 13:29:49 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
- Mon May 29 13:29:49 2017 Route deletion via IPAPI failed [adaptive]
- Mon May 29 13:29:49 2017 Route deletion fallback to route.exe
- Mon May 29 13:29:49 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Mon May 29 13:29:49 2017 Closing TUN/TAP interface
- Mon May 29 13:29:49 2017 SIGHUP[soft,tun-abort] received, process restarting
- Mon May 29 13:29:49 2017 MANAGEMENT: >STATE:1496046589,RECONNECTING,tun-abort,,,,,
- Mon May 29 13:29:49 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
- Mon May 29 13:29:49 2017 Windows version 6.2 (Windows 8 or greater) 64bit
- Mon May 29 13:29:49 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
- Mon May 29 13:29:49 2017 Restart pause, 10 second(s)
- Mon May 29 17:24:06 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Mon May 29 17:24:06 2017 NOTE: --fast-io is disabled since we are running on Windows
- Mon May 29 17:24:06 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Mon May 29 17:24:06 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Mon May 29 17:24:06 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
- Mon May 29 17:24:06 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon May 29 17:24:06 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
- Mon May 29 17:24:06 2017 MANAGEMENT: >STATE:1496060646,TCP_CONNECT,,,,,,
- Mon May 29 17:26:06 2017 TCP: connect to [AF_INET]5.254.86.214:443 failed: Connection timed out (WSAETIMEDOUT)
- Mon May 29 17:26:06 2017 SIGUSR1[connection failed(soft),init_instance] received, process restarting
- Mon May 29 17:26:06 2017 MANAGEMENT: >STATE:1496060766,RECONNECTING,init_instance,,,,,
- Mon May 29 17:26:06 2017 Restart pause, 5 second(s)
- Mon May 29 17:26:11 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Mon May 29 17:26:11 2017 NOTE: --fast-io is disabled since we are running on Windows
- Mon May 29 17:26:11 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
- Mon May 29 17:26:11 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Mon May 29 17:26:11 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
- Mon May 29 17:26:11 2017 MANAGEMENT: >STATE:1496060771,TCP_CONNECT,,,,,,
- Mon May 29 17:26:12 2017 TCP connection established with [AF_INET]5.254.86.214:443
- Mon May 29 17:26:12 2017 TCP_CLIENT link local: (not bound)
- Mon May 29 17:26:12 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
- Mon May 29 17:26:12 2017 MANAGEMENT: >STATE:1496060772,WAIT,,,,,,
- Mon May 29 17:26:13 2017 MANAGEMENT: >STATE:1496060773,AUTH,,,,,,
- Mon May 29 17:26:13 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=f5e50cdc d49e1508
- Mon May 29 17:26:13 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 17:26:13 2017 Validating certificate key usage
- Mon May 29 17:26:13 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 17:26:13 2017 VERIFY KU OK
- Mon May 29 17:26:13 2017 Validating certificate extended key usage
- Mon May 29 17:26:13 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 17:26:13 2017 VERIFY EKU OK
- Mon May 29 17:26:13 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 17:26:13 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 17:26:13 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
- Mon May 29 17:26:15 2017 MANAGEMENT: >STATE:1496060775,GET_CONFIG,,,,,,
- Mon May 29 17:26:15 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Mon May 29 17:26:15 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Mon May 29 17:26:15 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: route options modified
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: route-related options modified
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: peer-id set
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
- Mon May 29 17:26:15 2017 OPTIONS IMPORT: data channel crypto options modified
- Mon May 29 17:26:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 17:26:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 17:26:15 2017 interactive service msg_channel=0
- Mon May 29 17:26:15 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=27 HWADDR=00:23:54:37:4a:30
- Mon May 29 17:26:15 2017 open_tun
- Mon May 29 17:26:15 2017 TAP-WIN32 device [Ethernet] opened: \\.\Global\{B924712C-AC4F-41CA-BEB6-8811D3F56B7E}.tap
- Mon May 29 17:26:15 2017 TAP-Windows Driver Version 9.21
- Mon May 29 17:26:15 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.6/255.255.255.0 [SUCCEEDED]
- Mon May 29 17:26:15 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.6/255.255.255.0 on interface {B924712C-AC4F-41CA-BEB6-8811D3F56B7E} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
- Mon May 29 17:26:15 2017 Successful ARP Flush on interface [20] {B924712C-AC4F-41CA-BEB6-8811D3F56B7E}
- Mon May 29 17:26:15 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Mon May 29 17:26:15 2017 MANAGEMENT: >STATE:1496060775,ASSIGN_IP,,10.7.7.6,,,,
- Mon May 29 17:26:20 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
- Mon May 29 17:26:20 2017 C:\WINDOWS\system32\route.exe ADD 5.254.86.214 MASK 255.255.255.255 192.168.0.1
- Mon May 29 17:26:20 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Mon May 29 17:26:20 2017 Route addition via IPAPI succeeded [adaptive]
- Mon May 29 17:26:20 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 17:26:20 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon May 29 17:26:20 2017 Route addition via IPAPI succeeded [adaptive]
- Mon May 29 17:26:20 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 17:26:20 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Mon May 29 17:26:20 2017 Route addition via IPAPI succeeded [adaptive]
- Mon May 29 17:26:20 2017 Initialization Sequence Completed
- Mon May 29 17:26:20 2017 MANAGEMENT: >STATE:1496060780,CONNECTED,SUCCESS,10.7.7.6,5.254.86.214,443,192.168.0.2,65202
- Mon May 29 18:26:14 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 18:26:14 2017 Validating certificate key usage
- Mon May 29 18:26:14 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 18:26:14 2017 VERIFY KU OK
- Mon May 29 18:26:14 2017 Validating certificate extended key usage
- Mon May 29 18:26:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 18:26:14 2017 VERIFY EKU OK
- Mon May 29 18:26:14 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 18:26:14 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 18:26:14 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 18:26:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 19:26:13 2017 TLS: tls_process: killed expiring key
- Mon May 29 19:26:14 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 19:26:14 2017 Validating certificate key usage
- Mon May 29 19:26:14 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 19:26:14 2017 VERIFY KU OK
- Mon May 29 19:26:14 2017 Validating certificate extended key usage
- Mon May 29 19:26:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 19:26:14 2017 VERIFY EKU OK
- Mon May 29 19:26:14 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 19:26:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 19:26:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 19:26:15 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 20:26:14 2017 TLS: tls_process: killed expiring key
- Mon May 29 20:26:15 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 20:26:15 2017 Validating certificate key usage
- Mon May 29 20:26:15 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 20:26:15 2017 VERIFY KU OK
- Mon May 29 20:26:15 2017 Validating certificate extended key usage
- Mon May 29 20:26:15 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 20:26:15 2017 VERIFY EKU OK
- Mon May 29 20:26:15 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 20:26:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 20:26:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 20:26:16 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 21:26:15 2017 TLS: tls_process: killed expiring key
- Mon May 29 21:26:16 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 21:26:16 2017 Validating certificate key usage
- Mon May 29 21:26:16 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 21:26:16 2017 VERIFY KU OK
- Mon May 29 21:26:16 2017 Validating certificate extended key usage
- Mon May 29 21:26:16 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 21:26:16 2017 VERIFY EKU OK
- Mon May 29 21:26:16 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 21:26:17 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 21:26:17 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 21:26:17 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 22:26:17 2017 TLS: tls_process: killed expiring key
- Mon May 29 22:26:17 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 22:26:17 2017 Validating certificate key usage
- Mon May 29 22:26:17 2017 ++ Certificate has key usage 00a0, expects 00a0
- Mon May 29 22:26:17 2017 VERIFY KU OK
- Mon May 29 22:26:17 2017 Validating certificate extended key usage
- Mon May 29 22:26:17 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 29 22:26:17 2017 VERIFY EKU OK
- Mon May 29 22:26:17 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 29 22:26:18 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 22:26:18 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 29 22:26:18 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 29 22:29:09 2017 TUN/TAP I/O operation aborted, restarting
- Mon May 29 22:29:09 2017 C:\WINDOWS\system32\route.exe DELETE 5.254.86.214 MASK 255.255.255.255 192.168.0.1
- Mon May 29 22:29:09 2017 Route deletion via IPAPI succeeded [adaptive]
- Mon May 29 22:29:09 2017 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 22:29:09 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
- Mon May 29 22:29:09 2017 Route deletion via IPAPI failed [adaptive]
- Mon May 29 22:29:09 2017 Route deletion fallback to route.exe
- Mon May 29 22:29:09 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Mon May 29 22:29:09 2017 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 29 22:29:09 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
- Mon May 29 22:29:09 2017 Route deletion via IPAPI failed [adaptive]
- Mon May 29 22:29:09 2017 Route deletion fallback to route.exe
- Mon May 29 22:29:09 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Mon May 29 22:29:09 2017 Closing TUN/TAP interface
- Mon May 29 22:29:09 2017 SIGHUP[soft,tun-abort] received, process restarting
- Mon May 29 22:29:09 2017 MANAGEMENT: >STATE:1496078949,RECONNECTING,tun-abort,,,,,
- Mon May 29 22:29:09 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
- Mon May 29 22:29:09 2017 Windows version 6.2 (Windows 8 or greater) 64bit
- Mon May 29 22:29:09 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
- Mon May 29 22:29:09 2017 Restart pause, 10 second(s)
- Tue May 30 07:55:23 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Tue May 30 07:55:23 2017 NOTE: --fast-io is disabled since we are running on Windows
- Tue May 30 07:55:23 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Tue May 30 07:55:23 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Tue May 30 07:55:23 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
- Tue May 30 07:55:23 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Tue May 30 07:55:23 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
- Tue May 30 07:55:23 2017 MANAGEMENT: >STATE:1496112923,TCP_CONNECT,,,,,,
- Tue May 30 07:55:27 2017 TCP connection established with [AF_INET]5.254.86.214:443
- Tue May 30 07:55:27 2017 TCP_CLIENT link local: (not bound)
- Tue May 30 07:55:27 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
- Tue May 30 07:55:27 2017 MANAGEMENT: >STATE:1496112927,WAIT,,,,,,
- Tue May 30 07:55:28 2017 MANAGEMENT: >STATE:1496112928,AUTH,,,,,,
- Tue May 30 07:55:28 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=84ba878b 0da69185
- Tue May 30 07:55:28 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 07:55:28 2017 Validating certificate key usage
- Tue May 30 07:55:28 2017 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 30 07:55:28 2017 VERIFY KU OK
- Tue May 30 07:55:28 2017 Validating certificate extended key usage
- Tue May 30 07:55:28 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 30 07:55:28 2017 VERIFY EKU OK
- Tue May 30 07:55:28 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 07:55:31 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 30 07:55:31 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
- Tue May 30 07:55:32 2017 MANAGEMENT: >STATE:1496112932,GET_CONFIG,,,,,,
- Tue May 30 07:55:32 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Tue May 30 07:55:32 2017 AUTH: Received control message: AUTH_FAILED
- Tue May 30 07:55:35 2017 SIGUSR1[soft,auth-failure] received, process restarting
- Tue May 30 07:55:35 2017 MANAGEMENT: >STATE:1496112935,RECONNECTING,auth-failure,,,,,
- Tue May 30 07:55:35 2017 Restart pause, 5 second(s)
- Tue May 30 08:01:03 2017 MANAGEMENT: CMD 'username "Auth" "max@antisupport.ru"'
- Tue May 30 08:01:03 2017 MANAGEMENT: CMD 'password [...]'
- Tue May 30 08:01:03 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Tue May 30 08:01:03 2017 NOTE: --fast-io is disabled since we are running on Windows
- Tue May 30 08:01:03 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
- Tue May 30 08:01:03 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Tue May 30 08:01:03 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
- Tue May 30 08:01:03 2017 MANAGEMENT: >STATE:1496113263,TCP_CONNECT,,,,,,
- Tue May 30 08:01:04 2017 TCP connection established with [AF_INET]5.254.86.214:443
- Tue May 30 08:01:04 2017 TCP_CLIENT link local: (not bound)
- Tue May 30 08:01:04 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
- Tue May 30 08:01:04 2017 MANAGEMENT: >STATE:1496113264,WAIT,,,,,,
- Tue May 30 08:01:04 2017 MANAGEMENT: >STATE:1496113264,AUTH,,,,,,
- Tue May 30 08:01:04 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=8bc773d1 2caf18fe
- Tue May 30 08:01:05 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 08:01:05 2017 Validating certificate key usage
- Tue May 30 08:01:05 2017 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 30 08:01:05 2017 VERIFY KU OK
- Tue May 30 08:01:05 2017 Validating certificate extended key usage
- Tue May 30 08:01:05 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 30 08:01:05 2017 VERIFY EKU OK
- Tue May 30 08:01:05 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 08:01:05 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 30 08:01:05 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
- Tue May 30 08:01:07 2017 MANAGEMENT: >STATE:1496113267,GET_CONFIG,,,,,,
- Tue May 30 08:01:07 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Tue May 30 08:01:07 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Tue May 30 08:01:07 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: route options modified
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: route-related options modified
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: peer-id set
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
- Tue May 30 08:01:07 2017 OPTIONS IMPORT: data channel crypto options modified
- Tue May 30 08:01:07 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 08:01:07 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 08:01:07 2017 interactive service msg_channel=0
- Tue May 30 08:01:07 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=27 HWADDR=00:23:54:37:4a:30
- Tue May 30 08:01:07 2017 open_tun
- Tue May 30 08:01:07 2017 TAP-WIN32 device [Ethernet] opened: \\.\Global\{B924712C-AC4F-41CA-BEB6-8811D3F56B7E}.tap
- Tue May 30 08:01:07 2017 TAP-Windows Driver Version 9.21
- Tue May 30 08:01:07 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.6/255.255.255.0 [SUCCEEDED]
- Tue May 30 08:01:07 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.6/255.255.255.0 on interface {B924712C-AC4F-41CA-BEB6-8811D3F56B7E} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
- Tue May 30 08:01:07 2017 Successful ARP Flush on interface [20] {B924712C-AC4F-41CA-BEB6-8811D3F56B7E}
- Tue May 30 08:01:07 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Tue May 30 08:01:07 2017 MANAGEMENT: >STATE:1496113267,ASSIGN_IP,,10.7.7.6,,,,
- Tue May 30 08:01:12 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
- Tue May 30 08:01:12 2017 C:\WINDOWS\system32\route.exe ADD 5.254.86.214 MASK 255.255.255.255 192.168.0.1
- Tue May 30 08:01:12 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
- Tue May 30 08:01:12 2017 Route addition via IPAPI succeeded [adaptive]
- Tue May 30 08:01:12 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Tue May 30 08:01:12 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Tue May 30 08:01:12 2017 Route addition via IPAPI succeeded [adaptive]
- Tue May 30 08:01:12 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Tue May 30 08:01:12 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
- Tue May 30 08:01:12 2017 Route addition via IPAPI succeeded [adaptive]
- Tue May 30 08:01:12 2017 Initialization Sequence Completed
- Tue May 30 08:01:12 2017 MANAGEMENT: >STATE:1496113272,CONNECTED,SUCCESS,10.7.7.6,5.254.86.214,443,192.168.0.2,57185
- Tue May 30 09:01:07 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 09:01:07 2017 Validating certificate key usage
- Tue May 30 09:01:07 2017 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 30 09:01:07 2017 VERIFY KU OK
- Tue May 30 09:01:07 2017 Validating certificate extended key usage
- Tue May 30 09:01:07 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 30 09:01:07 2017 VERIFY EKU OK
- Tue May 30 09:01:07 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 09:01:07 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 09:01:07 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 09:01:07 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 30 10:01:06 2017 TLS: tls_process: killed expiring key
- Tue May 30 10:01:08 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 10:01:08 2017 Validating certificate key usage
- Tue May 30 10:01:08 2017 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 30 10:01:08 2017 VERIFY KU OK
- Tue May 30 10:01:08 2017 Validating certificate extended key usage
- Tue May 30 10:01:08 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 30 10:01:08 2017 VERIFY EKU OK
- Tue May 30 10:01:08 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 10:01:08 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 10:01:08 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 10:01:08 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 30 11:01:07 2017 TLS: tls_process: killed expiring key
- Tue May 30 11:01:09 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 11:01:09 2017 Validating certificate key usage
- Tue May 30 11:01:09 2017 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 30 11:01:09 2017 VERIFY KU OK
- Tue May 30 11:01:09 2017 Validating certificate extended key usage
- Tue May 30 11:01:09 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 30 11:01:09 2017 VERIFY EKU OK
- Tue May 30 11:01:09 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 11:01:12 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 11:01:12 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 11:01:12 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 30 11:08:07 2017 Connection reset, restarting [0]
- Tue May 30 11:08:07 2017 SIGUSR1[soft,connection-reset] received, process restarting
- Tue May 30 11:08:07 2017 MANAGEMENT: >STATE:1496124487,RECONNECTING,connection-reset,,,,,
- Tue May 30 11:08:07 2017 Restart pause, 5 second(s)
- Tue May 30 11:08:12 2017 NOTE: --fast-io is disabled since we are running on Windows
- Tue May 30 11:08:12 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
- Tue May 30 11:08:12 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Tue May 30 11:08:12 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
- Tue May 30 11:08:12 2017 MANAGEMENT: >STATE:1496124492,TCP_CONNECT,,,,,,
- Tue May 30 11:08:13 2017 TCP connection established with [AF_INET]5.254.86.214:443
- Tue May 30 11:08:13 2017 TCP_CLIENT link local: (not bound)
- Tue May 30 11:08:13 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
- Tue May 30 11:08:13 2017 MANAGEMENT: >STATE:1496124493,WAIT,,,,,,
- Tue May 30 11:08:13 2017 MANAGEMENT: >STATE:1496124493,AUTH,,,,,,
- Tue May 30 11:08:13 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=2bd64a5c 5f57468f
- Tue May 30 11:08:14 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 11:08:14 2017 Validating certificate key usage
- Tue May 30 11:08:14 2017 ++ Certificate has key usage 00a0, expects 00a0
- Tue May 30 11:08:14 2017 VERIFY KU OK
- Tue May 30 11:08:14 2017 Validating certificate extended key usage
- Tue May 30 11:08:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Tue May 30 11:08:14 2017 VERIFY EKU OK
- Tue May 30 11:08:14 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Tue May 30 11:08:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Tue May 30 11:08:14 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
- Tue May 30 11:08:15 2017 MANAGEMENT: >STATE:1496124495,GET_CONFIG,,,,,,
- Tue May 30 11:08:15 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Tue May 30 11:08:15 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: timers and/or timeouts modified
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Tue May 30 11:08:15 2017 Socket Buffers: R=[524288->524288] S=[524288->524288]
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: route options modified
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: route-related options modified
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: peer-id set
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
- Tue May 30 11:08:15 2017 OPTIONS IMPORT: data channel crypto options modified
- Tue May 30 11:08:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 11:08:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- Tue May 30 11:08:15 2017 Preserving previous TUN/TAP instance: Ethernet
- Tue May 30 11:08:15 2017 Initialization Sequence Completed
- Tue May 30 11:08:15 2017 MANAGEMENT: >STATE:1496124495,CONNECTED,SUCCESS,10.7.7.6,5.254.86.214,443,192.168.0.2,56732
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement