Advertisement
Guest User

Untitled

a guest
May 30th, 2017
7,493
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 37.24 KB | None | 0 0
  1. Mon May 29 11:33:03 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
  2. Mon May 29 11:33:03 2017 Windows version 6.2 (Windows 8 or greater) 64bit
  3. Mon May 29 11:33:03 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
  4. Enter Management Password:
  5. Mon May 29 11:33:03 2017 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25348
  6. Mon May 29 11:33:03 2017 Need hold release from management interface, waiting...
  7. Mon May 29 11:33:03 2017 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25348
  8. Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'state on'
  9. Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'log all on'
  10. Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'hold off'
  11. Mon May 29 11:33:03 2017 MANAGEMENT: CMD 'hold release'
  12. Mon May 29 11:33:11 2017 MANAGEMENT: CMD 'username "Auth" "max@antisupport.ru"'
  13. Mon May 29 11:33:11 2017 MANAGEMENT: CMD 'password [...]'
  14. Mon May 29 11:33:12 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
  15. Mon May 29 11:33:12 2017 NOTE: --fast-io is disabled since we are running on Windows
  16. Mon May 29 11:33:12 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  17. Mon May 29 11:33:12 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  18. Mon May 29 11:33:12 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
  19. Mon May 29 11:33:12 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  20. Mon May 29 11:33:12 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
  21. Mon May 29 11:33:12 2017 MANAGEMENT: >STATE:1496039592,TCP_CONNECT,,,,,,
  22. Mon May 29 11:33:13 2017 TCP connection established with [AF_INET]5.254.86.214:443
  23. Mon May 29 11:33:13 2017 TCP_CLIENT link local: (not bound)
  24. Mon May 29 11:33:13 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
  25. Mon May 29 11:33:13 2017 MANAGEMENT: >STATE:1496039593,WAIT,,,,,,
  26. Mon May 29 11:33:13 2017 MANAGEMENT: >STATE:1496039593,AUTH,,,,,,
  27. Mon May 29 11:33:13 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=9b03b704 05f87bb3
  28. Mon May 29 11:33:13 2017 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  29. Mon May 29 11:33:13 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  30. Mon May 29 11:33:13 2017 Validating certificate key usage
  31. Mon May 29 11:33:13 2017 ++ Certificate has key usage 00a0, expects 00a0
  32. Mon May 29 11:33:13 2017 VERIFY KU OK
  33. Mon May 29 11:33:13 2017 Validating certificate extended key usage
  34. Mon May 29 11:33:13 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  35. Mon May 29 11:33:13 2017 VERIFY EKU OK
  36. Mon May 29 11:33:13 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  37. Mon May 29 11:33:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  38. Mon May 29 11:33:14 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
  39. Mon May 29 11:33:15 2017 MANAGEMENT: >STATE:1496039595,GET_CONFIG,,,,,,
  40. Mon May 29 11:33:15 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  41. Mon May 29 11:33:16 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.39 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  42. Mon May 29 11:33:16 2017 OPTIONS IMPORT: timers and/or timeouts modified
  43. Mon May 29 11:33:16 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  44. Mon May 29 11:33:16 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
  45. Mon May 29 11:33:16 2017 OPTIONS IMPORT: --ifconfig/up options modified
  46. Mon May 29 11:33:16 2017 OPTIONS IMPORT: route options modified
  47. Mon May 29 11:33:16 2017 OPTIONS IMPORT: route-related options modified
  48. Mon May 29 11:33:16 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  49. Mon May 29 11:33:16 2017 OPTIONS IMPORT: peer-id set
  50. Mon May 29 11:33:16 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
  51. Mon May 29 11:33:16 2017 OPTIONS IMPORT: data channel crypto options modified
  52. Mon May 29 11:33:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  53. Mon May 29 11:33:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  54. Mon May 29 11:33:16 2017 interactive service msg_channel=0
  55. Mon May 29 11:33:16 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=27 HWADDR=00:23:54:37:4a:30
  56. Mon May 29 11:33:16 2017 open_tun
  57. Mon May 29 11:33:16 2017 TAP-WIN32 device [Ethernet] opened: \\.\Global\{B924712C-AC4F-41CA-BEB6-8811D3F56B7E}.tap
  58. Mon May 29 11:33:16 2017 TAP-Windows Driver Version 9.21
  59. Mon May 29 11:33:16 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.39/255.255.255.0 [SUCCEEDED]
  60. Mon May 29 11:33:16 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.39/255.255.255.0 on interface {B924712C-AC4F-41CA-BEB6-8811D3F56B7E} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
  61. Mon May 29 11:33:16 2017 Successful ARP Flush on interface [20] {B924712C-AC4F-41CA-BEB6-8811D3F56B7E}
  62. Mon May 29 11:33:16 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  63. Mon May 29 11:33:16 2017 MANAGEMENT: >STATE:1496039596,ASSIGN_IP,,10.7.7.39,,,,
  64. Mon May 29 11:33:21 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
  65. Mon May 29 11:33:21 2017 C:\WINDOWS\system32\route.exe ADD 5.254.86.214 MASK 255.255.255.255 192.168.0.1
  66. Mon May 29 11:33:21 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  67. Mon May 29 11:33:21 2017 Route addition via IPAPI succeeded [adaptive]
  68. Mon May 29 11:33:21 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
  69. Mon May 29 11:33:21 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  70. Mon May 29 11:33:21 2017 Route addition via IPAPI succeeded [adaptive]
  71. Mon May 29 11:33:21 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
  72. Mon May 29 11:33:21 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  73. Mon May 29 11:33:21 2017 Route addition via IPAPI succeeded [adaptive]
  74. Mon May 29 11:33:21 2017 Initialization Sequence Completed
  75. Mon May 29 11:33:21 2017 MANAGEMENT: >STATE:1496039601,CONNECTED,SUCCESS,10.7.7.39,5.254.86.214,443,192.168.0.2,61271
  76. Mon May 29 12:33:15 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  77. Mon May 29 12:33:15 2017 Validating certificate key usage
  78. Mon May 29 12:33:15 2017 ++ Certificate has key usage 00a0, expects 00a0
  79. Mon May 29 12:33:15 2017 VERIFY KU OK
  80. Mon May 29 12:33:15 2017 Validating certificate extended key usage
  81. Mon May 29 12:33:15 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  82. Mon May 29 12:33:15 2017 VERIFY EKU OK
  83. Mon May 29 12:33:15 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  84. Mon May 29 12:33:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  85. Mon May 29 12:33:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  86. Mon May 29 12:33:16 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  87. Mon May 29 13:29:49 2017 TUN/TAP I/O operation aborted, restarting
  88. Mon May 29 13:29:49 2017 C:\WINDOWS\system32\route.exe DELETE 5.254.86.214 MASK 255.255.255.255 192.168.0.1
  89. Mon May 29 13:29:49 2017 Route deletion via IPAPI succeeded [adaptive]
  90. Mon May 29 13:29:49 2017 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.7.1
  91. Mon May 29 13:29:49 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
  92. Mon May 29 13:29:49 2017 Route deletion via IPAPI failed [adaptive]
  93. Mon May 29 13:29:49 2017 Route deletion fallback to route.exe
  94. Mon May 29 13:29:49 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  95. Mon May 29 13:29:49 2017 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.7.1
  96. Mon May 29 13:29:49 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
  97. Mon May 29 13:29:49 2017 Route deletion via IPAPI failed [adaptive]
  98. Mon May 29 13:29:49 2017 Route deletion fallback to route.exe
  99. Mon May 29 13:29:49 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  100. Mon May 29 13:29:49 2017 Closing TUN/TAP interface
  101. Mon May 29 13:29:49 2017 SIGHUP[soft,tun-abort] received, process restarting
  102. Mon May 29 13:29:49 2017 MANAGEMENT: >STATE:1496046589,RECONNECTING,tun-abort,,,,,
  103. Mon May 29 13:29:49 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
  104. Mon May 29 13:29:49 2017 Windows version 6.2 (Windows 8 or greater) 64bit
  105. Mon May 29 13:29:49 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
  106. Mon May 29 13:29:49 2017 Restart pause, 10 second(s)
  107. Mon May 29 17:24:06 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
  108. Mon May 29 17:24:06 2017 NOTE: --fast-io is disabled since we are running on Windows
  109. Mon May 29 17:24:06 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  110. Mon May 29 17:24:06 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  111. Mon May 29 17:24:06 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
  112. Mon May 29 17:24:06 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  113. Mon May 29 17:24:06 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
  114. Mon May 29 17:24:06 2017 MANAGEMENT: >STATE:1496060646,TCP_CONNECT,,,,,,
  115. Mon May 29 17:26:06 2017 TCP: connect to [AF_INET]5.254.86.214:443 failed: Connection timed out (WSAETIMEDOUT)
  116. Mon May 29 17:26:06 2017 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  117. Mon May 29 17:26:06 2017 MANAGEMENT: >STATE:1496060766,RECONNECTING,init_instance,,,,,
  118. Mon May 29 17:26:06 2017 Restart pause, 5 second(s)
  119. Mon May 29 17:26:11 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
  120. Mon May 29 17:26:11 2017 NOTE: --fast-io is disabled since we are running on Windows
  121. Mon May 29 17:26:11 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
  122. Mon May 29 17:26:11 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  123. Mon May 29 17:26:11 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
  124. Mon May 29 17:26:11 2017 MANAGEMENT: >STATE:1496060771,TCP_CONNECT,,,,,,
  125. Mon May 29 17:26:12 2017 TCP connection established with [AF_INET]5.254.86.214:443
  126. Mon May 29 17:26:12 2017 TCP_CLIENT link local: (not bound)
  127. Mon May 29 17:26:12 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
  128. Mon May 29 17:26:12 2017 MANAGEMENT: >STATE:1496060772,WAIT,,,,,,
  129. Mon May 29 17:26:13 2017 MANAGEMENT: >STATE:1496060773,AUTH,,,,,,
  130. Mon May 29 17:26:13 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=f5e50cdc d49e1508
  131. Mon May 29 17:26:13 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  132. Mon May 29 17:26:13 2017 Validating certificate key usage
  133. Mon May 29 17:26:13 2017 ++ Certificate has key usage 00a0, expects 00a0
  134. Mon May 29 17:26:13 2017 VERIFY KU OK
  135. Mon May 29 17:26:13 2017 Validating certificate extended key usage
  136. Mon May 29 17:26:13 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  137. Mon May 29 17:26:13 2017 VERIFY EKU OK
  138. Mon May 29 17:26:13 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  139. Mon May 29 17:26:13 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  140. Mon May 29 17:26:13 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
  141. Mon May 29 17:26:15 2017 MANAGEMENT: >STATE:1496060775,GET_CONFIG,,,,,,
  142. Mon May 29 17:26:15 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  143. Mon May 29 17:26:15 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  144. Mon May 29 17:26:15 2017 OPTIONS IMPORT: timers and/or timeouts modified
  145. Mon May 29 17:26:15 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  146. Mon May 29 17:26:15 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
  147. Mon May 29 17:26:15 2017 OPTIONS IMPORT: --ifconfig/up options modified
  148. Mon May 29 17:26:15 2017 OPTIONS IMPORT: route options modified
  149. Mon May 29 17:26:15 2017 OPTIONS IMPORT: route-related options modified
  150. Mon May 29 17:26:15 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  151. Mon May 29 17:26:15 2017 OPTIONS IMPORT: peer-id set
  152. Mon May 29 17:26:15 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
  153. Mon May 29 17:26:15 2017 OPTIONS IMPORT: data channel crypto options modified
  154. Mon May 29 17:26:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  155. Mon May 29 17:26:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  156. Mon May 29 17:26:15 2017 interactive service msg_channel=0
  157. Mon May 29 17:26:15 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=27 HWADDR=00:23:54:37:4a:30
  158. Mon May 29 17:26:15 2017 open_tun
  159. Mon May 29 17:26:15 2017 TAP-WIN32 device [Ethernet] opened: \\.\Global\{B924712C-AC4F-41CA-BEB6-8811D3F56B7E}.tap
  160. Mon May 29 17:26:15 2017 TAP-Windows Driver Version 9.21
  161. Mon May 29 17:26:15 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.6/255.255.255.0 [SUCCEEDED]
  162. Mon May 29 17:26:15 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.6/255.255.255.0 on interface {B924712C-AC4F-41CA-BEB6-8811D3F56B7E} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
  163. Mon May 29 17:26:15 2017 Successful ARP Flush on interface [20] {B924712C-AC4F-41CA-BEB6-8811D3F56B7E}
  164. Mon May 29 17:26:15 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  165. Mon May 29 17:26:15 2017 MANAGEMENT: >STATE:1496060775,ASSIGN_IP,,10.7.7.6,,,,
  166. Mon May 29 17:26:20 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
  167. Mon May 29 17:26:20 2017 C:\WINDOWS\system32\route.exe ADD 5.254.86.214 MASK 255.255.255.255 192.168.0.1
  168. Mon May 29 17:26:20 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  169. Mon May 29 17:26:20 2017 Route addition via IPAPI succeeded [adaptive]
  170. Mon May 29 17:26:20 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
  171. Mon May 29 17:26:20 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  172. Mon May 29 17:26:20 2017 Route addition via IPAPI succeeded [adaptive]
  173. Mon May 29 17:26:20 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
  174. Mon May 29 17:26:20 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  175. Mon May 29 17:26:20 2017 Route addition via IPAPI succeeded [adaptive]
  176. Mon May 29 17:26:20 2017 Initialization Sequence Completed
  177. Mon May 29 17:26:20 2017 MANAGEMENT: >STATE:1496060780,CONNECTED,SUCCESS,10.7.7.6,5.254.86.214,443,192.168.0.2,65202
  178. Mon May 29 18:26:14 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  179. Mon May 29 18:26:14 2017 Validating certificate key usage
  180. Mon May 29 18:26:14 2017 ++ Certificate has key usage 00a0, expects 00a0
  181. Mon May 29 18:26:14 2017 VERIFY KU OK
  182. Mon May 29 18:26:14 2017 Validating certificate extended key usage
  183. Mon May 29 18:26:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  184. Mon May 29 18:26:14 2017 VERIFY EKU OK
  185. Mon May 29 18:26:14 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  186. Mon May 29 18:26:14 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  187. Mon May 29 18:26:14 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  188. Mon May 29 18:26:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  189. Mon May 29 19:26:13 2017 TLS: tls_process: killed expiring key
  190. Mon May 29 19:26:14 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  191. Mon May 29 19:26:14 2017 Validating certificate key usage
  192. Mon May 29 19:26:14 2017 ++ Certificate has key usage 00a0, expects 00a0
  193. Mon May 29 19:26:14 2017 VERIFY KU OK
  194. Mon May 29 19:26:14 2017 Validating certificate extended key usage
  195. Mon May 29 19:26:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  196. Mon May 29 19:26:14 2017 VERIFY EKU OK
  197. Mon May 29 19:26:14 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  198. Mon May 29 19:26:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  199. Mon May 29 19:26:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  200. Mon May 29 19:26:15 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  201. Mon May 29 20:26:14 2017 TLS: tls_process: killed expiring key
  202. Mon May 29 20:26:15 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  203. Mon May 29 20:26:15 2017 Validating certificate key usage
  204. Mon May 29 20:26:15 2017 ++ Certificate has key usage 00a0, expects 00a0
  205. Mon May 29 20:26:15 2017 VERIFY KU OK
  206. Mon May 29 20:26:15 2017 Validating certificate extended key usage
  207. Mon May 29 20:26:15 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  208. Mon May 29 20:26:15 2017 VERIFY EKU OK
  209. Mon May 29 20:26:15 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  210. Mon May 29 20:26:16 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  211. Mon May 29 20:26:16 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  212. Mon May 29 20:26:16 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  213. Mon May 29 21:26:15 2017 TLS: tls_process: killed expiring key
  214. Mon May 29 21:26:16 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  215. Mon May 29 21:26:16 2017 Validating certificate key usage
  216. Mon May 29 21:26:16 2017 ++ Certificate has key usage 00a0, expects 00a0
  217. Mon May 29 21:26:16 2017 VERIFY KU OK
  218. Mon May 29 21:26:16 2017 Validating certificate extended key usage
  219. Mon May 29 21:26:16 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  220. Mon May 29 21:26:16 2017 VERIFY EKU OK
  221. Mon May 29 21:26:16 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  222. Mon May 29 21:26:17 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  223. Mon May 29 21:26:17 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  224. Mon May 29 21:26:17 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  225. Mon May 29 22:26:17 2017 TLS: tls_process: killed expiring key
  226. Mon May 29 22:26:17 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  227. Mon May 29 22:26:17 2017 Validating certificate key usage
  228. Mon May 29 22:26:17 2017 ++ Certificate has key usage 00a0, expects 00a0
  229. Mon May 29 22:26:17 2017 VERIFY KU OK
  230. Mon May 29 22:26:17 2017 Validating certificate extended key usage
  231. Mon May 29 22:26:17 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  232. Mon May 29 22:26:17 2017 VERIFY EKU OK
  233. Mon May 29 22:26:17 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  234. Mon May 29 22:26:18 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  235. Mon May 29 22:26:18 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  236. Mon May 29 22:26:18 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  237. Mon May 29 22:29:09 2017 TUN/TAP I/O operation aborted, restarting
  238. Mon May 29 22:29:09 2017 C:\WINDOWS\system32\route.exe DELETE 5.254.86.214 MASK 255.255.255.255 192.168.0.1
  239. Mon May 29 22:29:09 2017 Route deletion via IPAPI succeeded [adaptive]
  240. Mon May 29 22:29:09 2017 C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.7.1
  241. Mon May 29 22:29:09 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
  242. Mon May 29 22:29:09 2017 Route deletion via IPAPI failed [adaptive]
  243. Mon May 29 22:29:09 2017 Route deletion fallback to route.exe
  244. Mon May 29 22:29:09 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  245. Mon May 29 22:29:09 2017 C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.7.1
  246. Mon May 29 22:29:09 2017 Warning: route gateway is not reachable on any active network adapters: 10.7.7.1
  247. Mon May 29 22:29:09 2017 Route deletion via IPAPI failed [adaptive]
  248. Mon May 29 22:29:09 2017 Route deletion fallback to route.exe
  249. Mon May 29 22:29:09 2017 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  250. Mon May 29 22:29:09 2017 Closing TUN/TAP interface
  251. Mon May 29 22:29:09 2017 SIGHUP[soft,tun-abort] received, process restarting
  252. Mon May 29 22:29:09 2017 MANAGEMENT: >STATE:1496078949,RECONNECTING,tun-abort,,,,,
  253. Mon May 29 22:29:09 2017 OpenVPN 2.4.0 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Jan 31 2017
  254. Mon May 29 22:29:09 2017 Windows version 6.2 (Windows 8 or greater) 64bit
  255. Mon May 29 22:29:09 2017 library versions: OpenSSL 1.0.2k 26 Jan 2017, LZO 2.09
  256. Mon May 29 22:29:09 2017 Restart pause, 10 second(s)
  257. Tue May 30 07:55:23 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
  258. Tue May 30 07:55:23 2017 NOTE: --fast-io is disabled since we are running on Windows
  259. Tue May 30 07:55:23 2017 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  260. Tue May 30 07:55:23 2017 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  261. Tue May 30 07:55:23 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
  262. Tue May 30 07:55:23 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  263. Tue May 30 07:55:23 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
  264. Tue May 30 07:55:23 2017 MANAGEMENT: >STATE:1496112923,TCP_CONNECT,,,,,,
  265. Tue May 30 07:55:27 2017 TCP connection established with [AF_INET]5.254.86.214:443
  266. Tue May 30 07:55:27 2017 TCP_CLIENT link local: (not bound)
  267. Tue May 30 07:55:27 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
  268. Tue May 30 07:55:27 2017 MANAGEMENT: >STATE:1496112927,WAIT,,,,,,
  269. Tue May 30 07:55:28 2017 MANAGEMENT: >STATE:1496112928,AUTH,,,,,,
  270. Tue May 30 07:55:28 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=84ba878b 0da69185
  271. Tue May 30 07:55:28 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  272. Tue May 30 07:55:28 2017 Validating certificate key usage
  273. Tue May 30 07:55:28 2017 ++ Certificate has key usage 00a0, expects 00a0
  274. Tue May 30 07:55:28 2017 VERIFY KU OK
  275. Tue May 30 07:55:28 2017 Validating certificate extended key usage
  276. Tue May 30 07:55:28 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  277. Tue May 30 07:55:28 2017 VERIFY EKU OK
  278. Tue May 30 07:55:28 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  279. Tue May 30 07:55:31 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  280. Tue May 30 07:55:31 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
  281. Tue May 30 07:55:32 2017 MANAGEMENT: >STATE:1496112932,GET_CONFIG,,,,,,
  282. Tue May 30 07:55:32 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  283. Tue May 30 07:55:32 2017 AUTH: Received control message: AUTH_FAILED
  284. Tue May 30 07:55:35 2017 SIGUSR1[soft,auth-failure] received, process restarting
  285. Tue May 30 07:55:35 2017 MANAGEMENT: >STATE:1496112935,RECONNECTING,auth-failure,,,,,
  286. Tue May 30 07:55:35 2017 Restart pause, 5 second(s)
  287. Tue May 30 08:01:03 2017 MANAGEMENT: CMD 'username "Auth" "max@antisupport.ru"'
  288. Tue May 30 08:01:03 2017 MANAGEMENT: CMD 'password [...]'
  289. Tue May 30 08:01:03 2017 WARNING: --ping should normally be used with --ping-restart or --ping-exit
  290. Tue May 30 08:01:03 2017 NOTE: --fast-io is disabled since we are running on Windows
  291. Tue May 30 08:01:03 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
  292. Tue May 30 08:01:03 2017 Socket Buffers: R=[65536->65536] S=[65536->65536]
  293. Tue May 30 08:01:03 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
  294. Tue May 30 08:01:03 2017 MANAGEMENT: >STATE:1496113263,TCP_CONNECT,,,,,,
  295. Tue May 30 08:01:04 2017 TCP connection established with [AF_INET]5.254.86.214:443
  296. Tue May 30 08:01:04 2017 TCP_CLIENT link local: (not bound)
  297. Tue May 30 08:01:04 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
  298. Tue May 30 08:01:04 2017 MANAGEMENT: >STATE:1496113264,WAIT,,,,,,
  299. Tue May 30 08:01:04 2017 MANAGEMENT: >STATE:1496113264,AUTH,,,,,,
  300. Tue May 30 08:01:04 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=8bc773d1 2caf18fe
  301. Tue May 30 08:01:05 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  302. Tue May 30 08:01:05 2017 Validating certificate key usage
  303. Tue May 30 08:01:05 2017 ++ Certificate has key usage 00a0, expects 00a0
  304. Tue May 30 08:01:05 2017 VERIFY KU OK
  305. Tue May 30 08:01:05 2017 Validating certificate extended key usage
  306. Tue May 30 08:01:05 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  307. Tue May 30 08:01:05 2017 VERIFY EKU OK
  308. Tue May 30 08:01:05 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  309. Tue May 30 08:01:05 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  310. Tue May 30 08:01:05 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
  311. Tue May 30 08:01:07 2017 MANAGEMENT: >STATE:1496113267,GET_CONFIG,,,,,,
  312. Tue May 30 08:01:07 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  313. Tue May 30 08:01:07 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  314. Tue May 30 08:01:07 2017 OPTIONS IMPORT: timers and/or timeouts modified
  315. Tue May 30 08:01:07 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  316. Tue May 30 08:01:07 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
  317. Tue May 30 08:01:07 2017 OPTIONS IMPORT: --ifconfig/up options modified
  318. Tue May 30 08:01:07 2017 OPTIONS IMPORT: route options modified
  319. Tue May 30 08:01:07 2017 OPTIONS IMPORT: route-related options modified
  320. Tue May 30 08:01:07 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  321. Tue May 30 08:01:07 2017 OPTIONS IMPORT: peer-id set
  322. Tue May 30 08:01:07 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
  323. Tue May 30 08:01:07 2017 OPTIONS IMPORT: data channel crypto options modified
  324. Tue May 30 08:01:07 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  325. Tue May 30 08:01:07 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  326. Tue May 30 08:01:07 2017 interactive service msg_channel=0
  327. Tue May 30 08:01:07 2017 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=27 HWADDR=00:23:54:37:4a:30
  328. Tue May 30 08:01:07 2017 open_tun
  329. Tue May 30 08:01:07 2017 TAP-WIN32 device [Ethernet] opened: \\.\Global\{B924712C-AC4F-41CA-BEB6-8811D3F56B7E}.tap
  330. Tue May 30 08:01:07 2017 TAP-Windows Driver Version 9.21
  331. Tue May 30 08:01:07 2017 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.6/255.255.255.0 [SUCCEEDED]
  332. Tue May 30 08:01:07 2017 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.6/255.255.255.0 on interface {B924712C-AC4F-41CA-BEB6-8811D3F56B7E} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
  333. Tue May 30 08:01:07 2017 Successful ARP Flush on interface [20] {B924712C-AC4F-41CA-BEB6-8811D3F56B7E}
  334. Tue May 30 08:01:07 2017 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  335. Tue May 30 08:01:07 2017 MANAGEMENT: >STATE:1496113267,ASSIGN_IP,,10.7.7.6,,,,
  336. Tue May 30 08:01:12 2017 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
  337. Tue May 30 08:01:12 2017 C:\WINDOWS\system32\route.exe ADD 5.254.86.214 MASK 255.255.255.255 192.168.0.1
  338. Tue May 30 08:01:12 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
  339. Tue May 30 08:01:12 2017 Route addition via IPAPI succeeded [adaptive]
  340. Tue May 30 08:01:12 2017 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
  341. Tue May 30 08:01:12 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  342. Tue May 30 08:01:12 2017 Route addition via IPAPI succeeded [adaptive]
  343. Tue May 30 08:01:12 2017 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
  344. Tue May 30 08:01:12 2017 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4
  345. Tue May 30 08:01:12 2017 Route addition via IPAPI succeeded [adaptive]
  346. Tue May 30 08:01:12 2017 Initialization Sequence Completed
  347. Tue May 30 08:01:12 2017 MANAGEMENT: >STATE:1496113272,CONNECTED,SUCCESS,10.7.7.6,5.254.86.214,443,192.168.0.2,57185
  348. Tue May 30 09:01:07 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  349. Tue May 30 09:01:07 2017 Validating certificate key usage
  350. Tue May 30 09:01:07 2017 ++ Certificate has key usage 00a0, expects 00a0
  351. Tue May 30 09:01:07 2017 VERIFY KU OK
  352. Tue May 30 09:01:07 2017 Validating certificate extended key usage
  353. Tue May 30 09:01:07 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  354. Tue May 30 09:01:07 2017 VERIFY EKU OK
  355. Tue May 30 09:01:07 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  356. Tue May 30 09:01:07 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  357. Tue May 30 09:01:07 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  358. Tue May 30 09:01:07 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  359. Tue May 30 10:01:06 2017 TLS: tls_process: killed expiring key
  360. Tue May 30 10:01:08 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  361. Tue May 30 10:01:08 2017 Validating certificate key usage
  362. Tue May 30 10:01:08 2017 ++ Certificate has key usage 00a0, expects 00a0
  363. Tue May 30 10:01:08 2017 VERIFY KU OK
  364. Tue May 30 10:01:08 2017 Validating certificate extended key usage
  365. Tue May 30 10:01:08 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  366. Tue May 30 10:01:08 2017 VERIFY EKU OK
  367. Tue May 30 10:01:08 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  368. Tue May 30 10:01:08 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  369. Tue May 30 10:01:08 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  370. Tue May 30 10:01:08 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  371. Tue May 30 11:01:07 2017 TLS: tls_process: killed expiring key
  372. Tue May 30 11:01:09 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  373. Tue May 30 11:01:09 2017 Validating certificate key usage
  374. Tue May 30 11:01:09 2017 ++ Certificate has key usage 00a0, expects 00a0
  375. Tue May 30 11:01:09 2017 VERIFY KU OK
  376. Tue May 30 11:01:09 2017 Validating certificate extended key usage
  377. Tue May 30 11:01:09 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  378. Tue May 30 11:01:09 2017 VERIFY EKU OK
  379. Tue May 30 11:01:09 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  380. Tue May 30 11:01:12 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  381. Tue May 30 11:01:12 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  382. Tue May 30 11:01:12 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  383. Tue May 30 11:08:07 2017 Connection reset, restarting [0]
  384. Tue May 30 11:08:07 2017 SIGUSR1[soft,connection-reset] received, process restarting
  385. Tue May 30 11:08:07 2017 MANAGEMENT: >STATE:1496124487,RECONNECTING,connection-reset,,,,,
  386. Tue May 30 11:08:07 2017 Restart pause, 5 second(s)
  387. Tue May 30 11:08:12 2017 NOTE: --fast-io is disabled since we are running on Windows
  388. Tue May 30 11:08:12 2017 TCP/UDP: Preserving recently used remote address: [AF_INET]5.254.86.214:443
  389. Tue May 30 11:08:12 2017 Socket Buffers: R=[65536->524288] S=[65536->524288]
  390. Tue May 30 11:08:12 2017 Attempting to establish TCP connection with [AF_INET]5.254.86.214:443 [nonblock]
  391. Tue May 30 11:08:12 2017 MANAGEMENT: >STATE:1496124492,TCP_CONNECT,,,,,,
  392. Tue May 30 11:08:13 2017 TCP connection established with [AF_INET]5.254.86.214:443
  393. Tue May 30 11:08:13 2017 TCP_CLIENT link local: (not bound)
  394. Tue May 30 11:08:13 2017 TCP_CLIENT link remote: [AF_INET]5.254.86.214:443
  395. Tue May 30 11:08:13 2017 MANAGEMENT: >STATE:1496124493,WAIT,,,,,,
  396. Tue May 30 11:08:13 2017 MANAGEMENT: >STATE:1496124493,AUTH,,,,,,
  397. Tue May 30 11:08:13 2017 TLS: Initial packet from [AF_INET]5.254.86.214:443, sid=2bd64a5c 5f57468f
  398. Tue May 30 11:08:14 2017 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  399. Tue May 30 11:08:14 2017 Validating certificate key usage
  400. Tue May 30 11:08:14 2017 ++ Certificate has key usage 00a0, expects 00a0
  401. Tue May 30 11:08:14 2017 VERIFY KU OK
  402. Tue May 30 11:08:14 2017 Validating certificate extended key usage
  403. Tue May 30 11:08:14 2017 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  404. Tue May 30 11:08:14 2017 VERIFY EKU OK
  405. Tue May 30 11:08:14 2017 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=de142.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
  406. Tue May 30 11:08:14 2017 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  407. Tue May 30 11:08:14 2017 [de142.nordvpn.com] Peer Connection Initiated with [AF_INET]5.254.86.214:443
  408. Tue May 30 11:08:15 2017 MANAGEMENT: >STATE:1496124495,GET_CONFIG,,,,,,
  409. Tue May 30 11:08:15 2017 SENT CONTROL [de142.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  410. Tue May 30 11:08:15 2017 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 78.46.223.24,dhcp-option DNS 162.242.211.137,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  411. Tue May 30 11:08:15 2017 OPTIONS IMPORT: timers and/or timeouts modified
  412. Tue May 30 11:08:15 2017 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  413. Tue May 30 11:08:15 2017 Socket Buffers: R=[524288->524288] S=[524288->524288]
  414. Tue May 30 11:08:15 2017 OPTIONS IMPORT: --ifconfig/up options modified
  415. Tue May 30 11:08:15 2017 OPTIONS IMPORT: route options modified
  416. Tue May 30 11:08:15 2017 OPTIONS IMPORT: route-related options modified
  417. Tue May 30 11:08:15 2017 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  418. Tue May 30 11:08:15 2017 OPTIONS IMPORT: peer-id set
  419. Tue May 30 11:08:15 2017 OPTIONS IMPORT: adjusting link_mtu to 1659
  420. Tue May 30 11:08:15 2017 OPTIONS IMPORT: data channel crypto options modified
  421. Tue May 30 11:08:15 2017 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  422. Tue May 30 11:08:15 2017 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  423. Tue May 30 11:08:15 2017 Preserving previous TUN/TAP instance: Ethernet
  424. Tue May 30 11:08:15 2017 Initialization Sequence Completed
  425. Tue May 30 11:08:15 2017 MANAGEMENT: >STATE:1496124495,CONNECTED,SUCCESS,10.7.7.6,5.254.86.214,443,192.168.0.2,56732
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement