Advertisement
Guest User

Untitled

a guest
Feb 22nd, 2019
2,356
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 15.63 KB | None | 0 0
  1. 2019/02/22 15:22:13 AEAD Decrypt error: bad packet ID (may be a replay): [ #43056 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
  2. 2019/02/22 15:25:36 SIGTERM received, sending exit notification to peer
  3. 2019/02/22 15:25:36 MANAGEMENT: TCP recv error: Connection reset by peer
  4. 2019/02/22 15:25:36 MANAGEMENT: Client disconnected
  5. 2019/02/22 15:25:37 /sbin/route del -net 122.155.174.66 netmask 255.255.255.255
  6. 2019/02/22 15:25:37 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  7. 2019/02/22 15:25:37 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  8. 2019/02/22 15:25:37 Closing TUN/TAP interface
  9. 2019/02/22 15:25:37 /sbin/ifconfig tun0 0.0.0.0
  10. 2019/02/22 15:25:37 SIGTERM[soft,exit-with-notification] received, process exiting
  11. 2019/02/22 15:25:42 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 10 2018
  12. 2019/02/22 15:25:42 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
  13. 2019/02/22 15:25:42 MANAGEMENT: unix domain socket listening on /var/run/nordvpn-openvpn.sock
  14. 2019/02/22 15:25:42 Need password(s) from management interface, waiting...
  15. 2019/02/22 15:25:42 MANAGEMENT: Client connected from /var/run/nordvpn-openvpn.sock
  16. 2019/02/22 15:25:42 MANAGEMENT: CMD 'username "Auth" 4aSJazAsMsryZQjcZusV7qtw'
  17. 2019/02/22 15:25:42 MANAGEMENT: CMD 'password [...]'
  18. 2019/02/22 15:25:42 MANAGEMENT: CMD 'hold release'
  19. 2019/02/22 15:25:42 MANAGEMENT: CMD 'hold off'
  20. 2019/02/22 15:25:42 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  21. 2019/02/22 15:25:42 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  22. 2019/02/22 15:25:42 TCP/UDP: Preserving recently used remote address: [AF_INET]122.155.174.64:1194
  23. 2019/02/22 15:25:42 Socket Buffers: R=[212992->212992] S=[212992->212992]
  24. 2019/02/22 15:25:42 UDP link local: (not bound)
  25. 2019/02/22 15:25:42 UDP link remote: [AF_INET]122.155.174.64:1194
  26. 2019/02/22 15:25:42 TLS: Initial packet from [AF_INET]122.155.174.64:1194, sid=132d551e c76281d5
  27. 2019/02/22 15:25:42 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  28. 2019/02/22 15:25:42 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
  29. 2019/02/22 15:25:42 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
  30. 2019/02/22 15:25:42 VERIFY KU OK
  31. 2019/02/22 15:25:42 Validating certificate extended key usage
  32. 2019/02/22 15:25:42 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  33. 2019/02/22 15:25:42 VERIFY EKU OK
  34. 2019/02/22 15:25:42 VERIFY OK: depth=0, CN=th5.nordvpn.com
  35. 2019/02/22 15:25:42 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
  36. 2019/02/22 15:25:42 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
  37. 2019/02/22 15:25:42 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  38. 2019/02/22 15:25:42 [th5.nordvpn.com] Peer Connection Initiated with [AF_INET]122.155.174.64:1194
  39. 2019/02/22 15:25:43 SENT CONTROL [th5.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  40. 2019/02/22 15:25:43 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.8.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.8.4 255.255.255.0,peer-id 4,cipher AES-256-GCM'
  41. 2019/02/22 15:25:43 OPTIONS IMPORT: timers and/or timeouts modified
  42. 2019/02/22 15:25:43 OPTIONS IMPORT: explicit notify parm(s) modified
  43. 2019/02/22 15:25:43 OPTIONS IMPORT: compression parms modified
  44. 2019/02/22 15:25:43 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  45. 2019/02/22 15:25:43 Socket Buffers: R=[212992->425984] S=[212992->425984]
  46. 2019/02/22 15:25:43 OPTIONS IMPORT: --ifconfig/up options modified
  47. 2019/02/22 15:25:43 OPTIONS IMPORT: route options modified
  48. 2019/02/22 15:25:43 OPTIONS IMPORT: route-related options modified
  49. 2019/02/22 15:25:43 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  50. 2019/02/22 15:25:43 OPTIONS IMPORT: peer-id set
  51. 2019/02/22 15:25:43 OPTIONS IMPORT: adjusting link_mtu to 1656
  52. 2019/02/22 15:25:43 OPTIONS IMPORT: data channel crypto options modified
  53. 2019/02/22 15:25:43 Data Channel: using negotiated cipher 'AES-256-GCM'
  54. 2019/02/22 15:25:43 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  55. 2019/02/22 15:25:43 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  56. 2019/02/22 15:25:43 TUN/TAP device tun0 opened
  57. 2019/02/22 15:25:43 TUN/TAP TX queue length set to 100
  58. 2019/02/22 15:25:43 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  59. 2019/02/22 15:25:43 /sbin/ifconfig tun0 10.8.8.4 netmask 255.255.255.0 mtu 1500 broadcast 10.8.8.255
  60. 2019/02/22 15:25:43 /sbin/route add -net 122.155.174.64 netmask 255.255.255.255 gw 10.0.0.1
  61. 2019/02/22 15:25:43 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.8.1
  62. 2019/02/22 15:25:43 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.8.1
  63. 2019/02/22 15:25:43 Initialization Sequence Completed
  64. 2019/02/22 15:32:15 SIGTERM received, sending exit notification to peer
  65. 2019/02/22 15:32:15 MANAGEMENT: TCP recv error: Connection reset by peer
  66. 2019/02/22 15:32:15 MANAGEMENT: Client disconnected
  67. 2019/02/22 15:32:16 /sbin/route del -net 122.155.174.64 netmask 255.255.255.255
  68. 2019/02/22 15:32:16 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  69. 2019/02/22 15:32:16 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  70. 2019/02/22 15:32:16 Closing TUN/TAP interface
  71. 2019/02/22 15:32:16 /sbin/ifconfig tun0 0.0.0.0
  72. 2019/02/22 15:32:16 SIGTERM[soft,exit-with-notification] received, process exiting
  73. 2019/02/22 15:32:21 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 10 2018
  74. 2019/02/22 15:32:21 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
  75. 2019/02/22 15:32:21 MANAGEMENT: unix domain socket listening on /var/run/nordvpn-openvpn.sock
  76. 2019/02/22 15:32:21 Need password(s) from management interface, waiting...
  77. 2019/02/22 15:32:21 MANAGEMENT: Client connected from /var/run/nordvpn-openvpn.sock
  78. 2019/02/22 15:32:21 MANAGEMENT: CMD 'username "Auth" 4aSJazAsMsryZQjcZusV7qtw'
  79. 2019/02/22 15:32:21 MANAGEMENT: CMD 'password [...]'
  80. 2019/02/22 15:32:21 MANAGEMENT: CMD 'hold release'
  81. 2019/02/22 15:32:21 MANAGEMENT: CMD 'hold off'
  82. 2019/02/22 15:32:21 NOTE: --fast-io is disabled since we are not using UDP
  83. 2019/02/22 15:32:21 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  84. 2019/02/22 15:32:21 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  85. 2019/02/22 15:32:21 TCP/UDP: Preserving recently used remote address: [AF_INET]122.155.174.66:443
  86. 2019/02/22 15:32:21 Socket Buffers: R=[87380->87380] S=[16384->16384]
  87. 2019/02/22 15:32:21 Attempting to establish TCP connection with [AF_INET]122.155.174.66:443 [nonblock]
  88. 2019/02/22 15:32:22 TCP connection established with [AF_INET]122.155.174.66:443
  89. 2019/02/22 15:32:22 TCP_CLIENT link local: (not bound)
  90. 2019/02/22 15:32:22 TCP_CLIENT link remote: [AF_INET]122.155.174.66:443
  91. 2019/02/22 15:32:22 TLS: Initial packet from [AF_INET]122.155.174.66:443, sid=f31f22de 89b83302
  92. 2019/02/22 15:32:22 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  93. 2019/02/22 15:32:22 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
  94. 2019/02/22 15:32:22 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
  95. 2019/02/22 15:32:22 VERIFY KU OK
  96. 2019/02/22 15:32:22 Validating certificate extended key usage
  97. 2019/02/22 15:32:22 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  98. 2019/02/22 15:32:22 VERIFY EKU OK
  99. 2019/02/22 15:32:22 VERIFY OK: depth=0, CN=th6.nordvpn.com
  100. 2019/02/22 15:32:22 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1636'
  101. 2019/02/22 15:32:22 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
  102. 2019/02/22 15:32:22 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  103. 2019/02/22 15:32:22 [th6.nordvpn.com] Peer Connection Initiated with [AF_INET]122.155.174.66:443
  104. 2019/02/22 15:32:23 SENT CONTROL [th6.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  105. 2019/02/22 15:32:23 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  106. 2019/02/22 15:32:23 OPTIONS IMPORT: timers and/or timeouts modified
  107. 2019/02/22 15:32:23 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
  108. 2019/02/22 15:32:23 OPTIONS IMPORT: compression parms modified
  109. 2019/02/22 15:32:23 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  110. 2019/02/22 15:32:23 Socket Buffers: R=[372480->425984] S=[46080->425984]
  111. 2019/02/22 15:32:23 OPTIONS IMPORT: --ifconfig/up options modified
  112. 2019/02/22 15:32:23 OPTIONS IMPORT: route options modified
  113. 2019/02/22 15:32:23 OPTIONS IMPORT: route-related options modified
  114. 2019/02/22 15:32:23 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  115. 2019/02/22 15:32:23 OPTIONS IMPORT: peer-id set
  116. 2019/02/22 15:32:23 OPTIONS IMPORT: adjusting link_mtu to 1658
  117. 2019/02/22 15:32:23 OPTIONS IMPORT: data channel crypto options modified
  118. 2019/02/22 15:32:23 Data Channel: using negotiated cipher 'AES-256-GCM'
  119. 2019/02/22 15:32:23 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  120. 2019/02/22 15:32:23 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  121. 2019/02/22 15:32:23 TUN/TAP device tun0 opened
  122. 2019/02/22 15:32:23 TUN/TAP TX queue length set to 100
  123. 2019/02/22 15:32:24 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  124. 2019/02/22 15:32:24 /sbin/ifconfig tun0 10.7.7.3 netmask 255.255.255.0 mtu 1500 broadcast 10.7.7.255
  125. 2019/02/22 15:32:24 /sbin/route add -net 122.155.174.66 netmask 255.255.255.255 gw 10.0.0.1
  126. 2019/02/22 15:32:24 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
  127. 2019/02/22 15:32:24 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
  128. 2019/02/22 15:32:24 Initialization Sequence Completed
  129. 2019/02/22 15:36:58 /sbin/route del -net 122.155.174.66 netmask 255.255.255.255
  130. 2019/02/22 15:36:58 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  131. 2019/02/22 15:36:58 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  132. 2019/02/22 15:36:58 Closing TUN/TAP interface
  133. 2019/02/22 15:36:58 /sbin/ifconfig tun0 0.0.0.0
  134. 2019/02/22 15:36:58 SIGTERM[hard,] received, process exiting
  135. 2019/02/22 15:43:18 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 10 2018
  136. 2019/02/22 15:43:18 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
  137. 2019/02/22 15:43:18 MANAGEMENT: unix domain socket listening on /var/run/nordvpn-openvpn.sock
  138. 2019/02/22 15:43:18 Need password(s) from management interface, waiting...
  139. 2019/02/22 15:43:18 MANAGEMENT: Client connected from /var/run/nordvpn-openvpn.sock
  140. 2019/02/22 15:43:18 MANAGEMENT: CMD 'username "Auth" 4aSJazAsMsryZQjcZusV7qtw'
  141. 2019/02/22 15:43:18 MANAGEMENT: CMD 'password [...]'
  142. 2019/02/22 15:43:18 MANAGEMENT: CMD 'hold release'
  143. 2019/02/22 15:43:18 MANAGEMENT: CMD 'hold off'
  144. 2019/02/22 15:43:18 NOTE: --fast-io is disabled since we are not using UDP
  145. 2019/02/22 15:43:18 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  146. 2019/02/22 15:43:18 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
  147. 2019/02/22 15:43:18 TCP/UDP: Preserving recently used remote address: [AF_INET]122.155.174.66:443
  148. 2019/02/22 15:43:18 Socket Buffers: R=[87380->87380] S=[16384->16384]
  149. 2019/02/22 15:43:18 Attempting to establish TCP connection with [AF_INET]122.155.174.66:443 [nonblock]
  150. 2019/02/22 15:43:19 TCP connection established with [AF_INET]122.155.174.66:443
  151. 2019/02/22 15:43:19 TCP_CLIENT link local: (not bound)
  152. 2019/02/22 15:43:19 TCP_CLIENT link remote: [AF_INET]122.155.174.66:443
  153. 2019/02/22 15:43:19 TLS: Initial packet from [AF_INET]122.155.174.66:443, sid=527b56df 9f7a0826
  154. 2019/02/22 15:43:19 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  155. 2019/02/22 15:43:20 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
  156. 2019/02/22 15:43:20 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
  157. 2019/02/22 15:43:20 VERIFY KU OK
  158. 2019/02/22 15:43:20 Validating certificate extended key usage
  159. 2019/02/22 15:43:20 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  160. 2019/02/22 15:43:20 VERIFY EKU OK
  161. 2019/02/22 15:43:20 VERIFY OK: depth=0, CN=th6.nordvpn.com
  162. 2019/02/22 15:43:20 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1636'
  163. 2019/02/22 15:43:20 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
  164. 2019/02/22 15:43:20 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  165. 2019/02/22 15:43:20 [th6.nordvpn.com] Peer Connection Initiated with [AF_INET]122.155.174.66:443
  166. 2019/02/22 15:43:21 SENT CONTROL [th6.nordvpn.com]: 'PUSH_REQUEST' (status=1)
  167. 2019/02/22 15:43:21 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
  168. 2019/02/22 15:43:21 OPTIONS IMPORT: timers and/or timeouts modified
  169. 2019/02/22 15:43:21 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
  170. 2019/02/22 15:43:21 OPTIONS IMPORT: compression parms modified
  171. 2019/02/22 15:43:21 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
  172. 2019/02/22 15:43:21 Socket Buffers: R=[372480->425984] S=[46080->425984]
  173. 2019/02/22 15:43:21 OPTIONS IMPORT: --ifconfig/up options modified
  174. 2019/02/22 15:43:21 OPTIONS IMPORT: route options modified
  175. 2019/02/22 15:43:21 OPTIONS IMPORT: route-related options modified
  176. 2019/02/22 15:43:21 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  177. 2019/02/22 15:43:21 OPTIONS IMPORT: peer-id set
  178. 2019/02/22 15:43:21 OPTIONS IMPORT: adjusting link_mtu to 1658
  179. 2019/02/22 15:43:21 OPTIONS IMPORT: data channel crypto options modified
  180. 2019/02/22 15:43:21 Data Channel: using negotiated cipher 'AES-256-GCM'
  181. 2019/02/22 15:43:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  182. 2019/02/22 15:43:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  183. 2019/02/22 15:43:21 TUN/TAP device tun0 opened
  184. 2019/02/22 15:43:21 TUN/TAP TX queue length set to 100
  185. 2019/02/22 15:43:22 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  186. 2019/02/22 15:43:22 /sbin/ifconfig tun0 10.7.7.3 netmask 255.255.255.0 mtu 1500 broadcast 10.7.7.255
  187. 2019/02/22 15:43:22 /sbin/route add -net 122.155.174.66 netmask 255.255.255.255 gw 10.0.0.1
  188. 2019/02/22 15:43:22 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
  189. 2019/02/22 15:43:22 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
  190. 2019/02/22 15:43:22 Initialization Sequence Completed
  191. 2019/02/22 15:58:22 /sbin/route del -net 122.155.174.66 netmask 255.255.255.255
  192. 2019/02/22 15:58:22 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
  193. 2019/02/22 15:58:22 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
  194. 2019/02/22 15:58:22 Closing TUN/TAP interface
  195. 2019/02/22 15:58:22 /sbin/ifconfig tun0 0.0.0.0
  196. 2019/02/22 15:58:22 SIGTERM[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement