Advertisement
Guest User

Untitled

a guest
Feb 22nd, 2020
3,825
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 6.64 KB | None | 0 0
  1. Client Version: 7.7.11
  2. Client Shared Version: v2.0.0-27-g59717f37
  3. OS Name: win
  4. OS Version: win10.0.0.18362
  5. Internal diagnostics data:
  6. D01: 147, OK
  7. D02: 62860, OK
  8. D03: 146, OK
  9. D04: 6743, OK
  10. D05: 6743, OK
  11. D06: 146, OK
  12. D07: 1934
  13. D08: 1934
  14. D09: 7944, OK
  15. D10: 1934
  16. D11: 1934
  17. D12: N, 6143
  18. D13: www.2spb2qq8pnqmv.net/api
  19. D14: USA - New York
  20. D15: tcp
  21. D16: PjA2KGWywm5mZmZmZmZmZmZmZmZmZmZmZmZ3ZmZ2ZlfSbXYRHgwNEBAKSAUJCxEREUhQAgUFAg4HUkgFCQtmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZg==
  22. Network Lock: enabled, block access to local devices
  23. DNS leak protection: enabled
  24. IPv6 leak protection: enabled
  25. Selected location: USA - Chicago
  26.  
  27.  
  28. ==============================================
  29.  
  30. Connecting to USA - Chicago, ip: 152.192.221.197x, protocol: tcp
  31.  
  32. Sat Feb 22 13:53:56 2020 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
  33. Sat Feb 22 13:53:56 2020 OpenVPN 2.4.7 [git:HEAD/efe4e681df718662+] x86_64-w64-mingw32 [SSL (OpenSSL)] [AEAD] built on Dec 6 2019
  34. Sat Feb 22 13:53:56 2020 Windows version 6.2 (Windows 8 or greater) 64bit
  35. Sat Feb 22 13:53:56 2020 library versions: OpenSSL 1.1.0j 20 Nov 2018
  36. Sat Feb 22 13:53:56 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:57491
  37. Sat Feb 22 13:53:56 2020 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  38. Sat Feb 22 13:53:56 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  39. Sat Feb 22 13:53:56 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  40. Sat Feb 22 13:53:56 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]152.192.221.197:443
  41. Sat Feb 22 13:53:56 2020 Socket Buffers: R=[65536->65536] S=[65536->65536]
  42. Sat Feb 22 13:53:56 2020 Attempting to establish TCP connection with [AF_INET]152.192.221.197:443 [nonblock]
  43. Sat Feb 22 13:53:57 2020 TCP connection established with [AF_INET]152.192.221.197:443
  44. Sat Feb 22 13:53:57 2020 TCP_CLIENT link local: (not bound)
  45. Sat Feb 22 13:53:57 2020 TCP_CLIENT link remote: [AF_INET]152.192.221.197:443
  46. Sat Feb 22 13:53:57 2020 TLS: Initial packet from [AF_INET]152.192.221.197:443, sid=22f1a4e6 34fcd5fe
  47. Sat Feb 22 13:53:57 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  48. Sat Feb 22 13:53:57 2020 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  49. Sat Feb 22 13:53:57 2020 VERIFY OK: nsCertType=SERVER
  50. Sat Feb 22 13:53:57 2020 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
  51. Sat Feb 22 13:53:57 2020 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
  52. Sat Feb 22 13:53:57 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  53. Sat Feb 22 13:53:57 2020 [Server-6636-0a] Peer Connection Initiated with [AF_INET]152.192.221.197:443
  54. Sat Feb 22 13:53:58 2020 SENT CONTROL [Server-6636-0a]: 'PUSH_REQUEST' (status=1)
  55. Sat Feb 22 13:53:58 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.172.0.1,route 10.172.0.1,topology net30,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.172.0.26 10.172.0.25,peer-id 0,cipher AES-256-GCM'
  56. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: timers and/or timeouts modified
  57. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: --socket-flags option modified
  58. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: --ifconfig/up options modified
  59. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: route options modified
  60. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  61. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: peer-id set
  62. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: adjusting link_mtu to 1626
  63. Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: data channel crypto options modified
  64. Sat Feb 22 13:53:58 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
  65. Sat Feb 22 13:53:58 2020 NCP: overriding user-set keysize with default
  66. Sat Feb 22 13:53:58 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  67. Sat Feb 22 13:53:58 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  68. Sat Feb 22 13:53:58 2020 interactive service msg_channel=0
  69. Sat Feb 22 13:53:58 2020 open_tun
  70. Sat Feb 22 13:53:58 2020 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B155757D-67F0-4809-BEF2-89CDB00F04BC}.tap
  71. Sat Feb 22 13:53:58 2020 TAP-Windows Driver Version 9.24
  72. Sat Feb 22 13:53:58 2020 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.172.0.26/202.208.229.107 on interface {B155757D-67F0-4809-BEF2-89CDB00F04BC} [DHCP-serv: 10.172.0.25, lease-time: 31536000]
  73. Sat Feb 22 13:53:58 2020 Successful ARP Flush on interface [13] {B155757D-67F0-4809-BEF2-89CDB00F04BC}
  74. Sat Feb 22 13:54:00 2020 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
  75. Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 152.192.221.197 MASK 255.255.255.255 192.168.1.1
  76. Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  77. Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.172.0.25
  78. Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  79. Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.172.0.25
  80. Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  81. Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 10.172.0.1 MASK 255.255.255.255 10.172.0.25
  82. Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
  83. Sat Feb 22 13:54:00 2020 Initialization Sequence Completed
  84. Sat Feb 22 14:53:56 2020 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
  85. Sat Feb 22 14:53:56 2020 VERIFY OK: nsCertType=SERVER
  86. Sat Feb 22 14:53:56 2020 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
  87. Sat Feb 22 14:53:56 2020 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
  88. Sat Feb 22 14:53:56 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  89. Sat Feb 22 14:53:56 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  90. Sat Feb 22 14:53:56 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement