Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Client Version: 7.7.11
- Client Shared Version: v2.0.0-27-g59717f37
- OS Name: win
- OS Version: win10.0.0.18362
- Internal diagnostics data:
- D01: 147, OK
- D02: 62860, OK
- D03: 146, OK
- D04: 6743, OK
- D05: 6743, OK
- D06: 146, OK
- D07: 1934
- D08: 1934
- D09: 7944, OK
- D10: 1934
- D11: 1934
- D12: N, 6143
- D13: www.2spb2qq8pnqmv.net/api
- D14: USA - New York
- D15: tcp
- D16: PjA2KGWywm5mZmZmZmZmZmZmZmZmZmZmZmZ3ZmZ2ZlfSbXYRHgwNEBAKSAUJCxEREUhQAgUFAg4HUkgFCQtmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZmZg==
- Network Lock: enabled, block access to local devices
- DNS leak protection: enabled
- IPv6 leak protection: enabled
- Selected location: USA - Chicago
- ==============================================
- Connecting to USA - Chicago, ip: 152.192.221.197x, protocol: tcp
- Sat Feb 22 13:53:56 2020 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Sat Feb 22 13:53:56 2020 OpenVPN 2.4.7 [git:HEAD/efe4e681df718662+] x86_64-w64-mingw32 [SSL (OpenSSL)] [AEAD] built on Dec 6 2019
- Sat Feb 22 13:53:56 2020 Windows version 6.2 (Windows 8 or greater) 64bit
- Sat Feb 22 13:53:56 2020 library versions: OpenSSL 1.1.0j 20 Nov 2018
- Sat Feb 22 13:53:56 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:57491
- Sat Feb 22 13:53:56 2020 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Sat Feb 22 13:53:56 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sat Feb 22 13:53:56 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sat Feb 22 13:53:56 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]152.192.221.197:443
- Sat Feb 22 13:53:56 2020 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Sat Feb 22 13:53:56 2020 Attempting to establish TCP connection with [AF_INET]152.192.221.197:443 [nonblock]
- Sat Feb 22 13:53:57 2020 TCP connection established with [AF_INET]152.192.221.197:443
- Sat Feb 22 13:53:57 2020 TCP_CLIENT link local: (not bound)
- Sat Feb 22 13:53:57 2020 TCP_CLIENT link remote: [AF_INET]152.192.221.197:443
- Sat Feb 22 13:53:57 2020 TLS: Initial packet from [AF_INET]152.192.221.197:443, sid=22f1a4e6 34fcd5fe
- Sat Feb 22 13:53:57 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sat Feb 22 13:53:57 2020 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sat Feb 22 13:53:57 2020 VERIFY OK: nsCertType=SERVER
- Sat Feb 22 13:53:57 2020 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
- Sat Feb 22 13:53:57 2020 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
- Sat Feb 22 13:53:57 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sat Feb 22 13:53:57 2020 [Server-6636-0a] Peer Connection Initiated with [AF_INET]152.192.221.197:443
- Sat Feb 22 13:53:58 2020 SENT CONTROL [Server-6636-0a]: 'PUSH_REQUEST' (status=1)
- Sat Feb 22 13:53:58 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.172.0.1,route 10.172.0.1,topology net30,ping 10,ping-restart 60,socket-flags TCP_NODELAY,ifconfig 10.172.0.26 10.172.0.25,peer-id 0,cipher AES-256-GCM'
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: timers and/or timeouts modified
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: --socket-flags option modified
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: --ifconfig/up options modified
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: route options modified
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: peer-id set
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: adjusting link_mtu to 1626
- Sat Feb 22 13:53:58 2020 OPTIONS IMPORT: data channel crypto options modified
- Sat Feb 22 13:53:58 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
- Sat Feb 22 13:53:58 2020 NCP: overriding user-set keysize with default
- Sat Feb 22 13:53:58 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sat Feb 22 13:53:58 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sat Feb 22 13:53:58 2020 interactive service msg_channel=0
- Sat Feb 22 13:53:58 2020 open_tun
- Sat Feb 22 13:53:58 2020 TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{B155757D-67F0-4809-BEF2-89CDB00F04BC}.tap
- Sat Feb 22 13:53:58 2020 TAP-Windows Driver Version 9.24
- Sat Feb 22 13:53:58 2020 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.172.0.26/202.208.229.107 on interface {B155757D-67F0-4809-BEF2-89CDB00F04BC} [DHCP-serv: 10.172.0.25, lease-time: 31536000]
- Sat Feb 22 13:53:58 2020 Successful ARP Flush on interface [13] {B155757D-67F0-4809-BEF2-89CDB00F04BC}
- Sat Feb 22 13:54:00 2020 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
- Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 152.192.221.197 MASK 255.255.255.255 192.168.1.1
- Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.172.0.25
- Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.172.0.25
- Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Sat Feb 22 13:54:00 2020 C:\WINDOWS\system32\route.exe ADD 10.172.0.1 MASK 255.255.255.255 10.172.0.25
- Sat Feb 22 13:54:00 2020 env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
- Sat Feb 22 13:54:00 2020 Initialization Sequence Completed
- Sat Feb 22 14:53:56 2020 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sat Feb 22 14:53:56 2020 VERIFY OK: nsCertType=SERVER
- Sat Feb 22 14:53:56 2020 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
- Sat Feb 22 14:53:56 2020 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6636-0a, emailAddress=support@expressvpn.com
- Sat Feb 22 14:53:56 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sat Feb 22 14:53:56 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sat Feb 22 14:53:56 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement