Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2019/02/22 15:22:13 AEAD Decrypt error: bad packet ID (may be a replay): [ #43056 ] -- see the man page entry for --no-replay and --replay-window for more info or silence this warning with --mute-replay-warnings
- 2019/02/22 15:25:36 SIGTERM received, sending exit notification to peer
- 2019/02/22 15:25:36 MANAGEMENT: TCP recv error: Connection reset by peer
- 2019/02/22 15:25:36 MANAGEMENT: Client disconnected
- 2019/02/22 15:25:37 /sbin/route del -net 122.155.174.66 netmask 255.255.255.255
- 2019/02/22 15:25:37 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:25:37 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:25:37 Closing TUN/TAP interface
- 2019/02/22 15:25:37 /sbin/ifconfig tun0 0.0.0.0
- 2019/02/22 15:25:37 SIGTERM[soft,exit-with-notification] received, process exiting
- 2019/02/22 15:25:42 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 10 2018
- 2019/02/22 15:25:42 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
- 2019/02/22 15:25:42 MANAGEMENT: unix domain socket listening on /var/run/nordvpn-openvpn.sock
- 2019/02/22 15:25:42 Need password(s) from management interface, waiting...
- 2019/02/22 15:25:42 MANAGEMENT: Client connected from /var/run/nordvpn-openvpn.sock
- 2019/02/22 15:25:42 MANAGEMENT: CMD 'username "Auth" 4aSJazAsMsryZQjcZusV7qtw'
- 2019/02/22 15:25:42 MANAGEMENT: CMD 'password [...]'
- 2019/02/22 15:25:42 MANAGEMENT: CMD 'hold release'
- 2019/02/22 15:25:42 MANAGEMENT: CMD 'hold off'
- 2019/02/22 15:25:42 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 2019/02/22 15:25:42 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 2019/02/22 15:25:42 TCP/UDP: Preserving recently used remote address: [AF_INET]122.155.174.64:1194
- 2019/02/22 15:25:42 Socket Buffers: R=[212992->212992] S=[212992->212992]
- 2019/02/22 15:25:42 UDP link local: (not bound)
- 2019/02/22 15:25:42 UDP link remote: [AF_INET]122.155.174.64:1194
- 2019/02/22 15:25:42 TLS: Initial packet from [AF_INET]122.155.174.64:1194, sid=132d551e c76281d5
- 2019/02/22 15:25:42 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2019/02/22 15:25:42 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- 2019/02/22 15:25:42 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
- 2019/02/22 15:25:42 VERIFY KU OK
- 2019/02/22 15:25:42 Validating certificate extended key usage
- 2019/02/22 15:25:42 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2019/02/22 15:25:42 VERIFY EKU OK
- 2019/02/22 15:25:42 VERIFY OK: depth=0, CN=th5.nordvpn.com
- 2019/02/22 15:25:42 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1634'
- 2019/02/22 15:25:42 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- 2019/02/22 15:25:42 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2019/02/22 15:25:42 [th5.nordvpn.com] Peer Connection Initiated with [AF_INET]122.155.174.64:1194
- 2019/02/22 15:25:43 SENT CONTROL [th5.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- 2019/02/22 15:25:43 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.8.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.8.8.4 255.255.255.0,peer-id 4,cipher AES-256-GCM'
- 2019/02/22 15:25:43 OPTIONS IMPORT: timers and/or timeouts modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: explicit notify parm(s) modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: compression parms modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- 2019/02/22 15:25:43 Socket Buffers: R=[212992->425984] S=[212992->425984]
- 2019/02/22 15:25:43 OPTIONS IMPORT: --ifconfig/up options modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: route options modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: route-related options modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2019/02/22 15:25:43 OPTIONS IMPORT: peer-id set
- 2019/02/22 15:25:43 OPTIONS IMPORT: adjusting link_mtu to 1656
- 2019/02/22 15:25:43 OPTIONS IMPORT: data channel crypto options modified
- 2019/02/22 15:25:43 Data Channel: using negotiated cipher 'AES-256-GCM'
- 2019/02/22 15:25:43 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019/02/22 15:25:43 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019/02/22 15:25:43 TUN/TAP device tun0 opened
- 2019/02/22 15:25:43 TUN/TAP TX queue length set to 100
- 2019/02/22 15:25:43 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2019/02/22 15:25:43 /sbin/ifconfig tun0 10.8.8.4 netmask 255.255.255.0 mtu 1500 broadcast 10.8.8.255
- 2019/02/22 15:25:43 /sbin/route add -net 122.155.174.64 netmask 255.255.255.255 gw 10.0.0.1
- 2019/02/22 15:25:43 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.8.8.1
- 2019/02/22 15:25:43 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.8.8.1
- 2019/02/22 15:25:43 Initialization Sequence Completed
- 2019/02/22 15:32:15 SIGTERM received, sending exit notification to peer
- 2019/02/22 15:32:15 MANAGEMENT: TCP recv error: Connection reset by peer
- 2019/02/22 15:32:15 MANAGEMENT: Client disconnected
- 2019/02/22 15:32:16 /sbin/route del -net 122.155.174.64 netmask 255.255.255.255
- 2019/02/22 15:32:16 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:32:16 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:32:16 Closing TUN/TAP interface
- 2019/02/22 15:32:16 /sbin/ifconfig tun0 0.0.0.0
- 2019/02/22 15:32:16 SIGTERM[soft,exit-with-notification] received, process exiting
- 2019/02/22 15:32:21 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 10 2018
- 2019/02/22 15:32:21 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
- 2019/02/22 15:32:21 MANAGEMENT: unix domain socket listening on /var/run/nordvpn-openvpn.sock
- 2019/02/22 15:32:21 Need password(s) from management interface, waiting...
- 2019/02/22 15:32:21 MANAGEMENT: Client connected from /var/run/nordvpn-openvpn.sock
- 2019/02/22 15:32:21 MANAGEMENT: CMD 'username "Auth" 4aSJazAsMsryZQjcZusV7qtw'
- 2019/02/22 15:32:21 MANAGEMENT: CMD 'password [...]'
- 2019/02/22 15:32:21 MANAGEMENT: CMD 'hold release'
- 2019/02/22 15:32:21 MANAGEMENT: CMD 'hold off'
- 2019/02/22 15:32:21 NOTE: --fast-io is disabled since we are not using UDP
- 2019/02/22 15:32:21 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 2019/02/22 15:32:21 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 2019/02/22 15:32:21 TCP/UDP: Preserving recently used remote address: [AF_INET]122.155.174.66:443
- 2019/02/22 15:32:21 Socket Buffers: R=[87380->87380] S=[16384->16384]
- 2019/02/22 15:32:21 Attempting to establish TCP connection with [AF_INET]122.155.174.66:443 [nonblock]
- 2019/02/22 15:32:22 TCP connection established with [AF_INET]122.155.174.66:443
- 2019/02/22 15:32:22 TCP_CLIENT link local: (not bound)
- 2019/02/22 15:32:22 TCP_CLIENT link remote: [AF_INET]122.155.174.66:443
- 2019/02/22 15:32:22 TLS: Initial packet from [AF_INET]122.155.174.66:443, sid=f31f22de 89b83302
- 2019/02/22 15:32:22 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2019/02/22 15:32:22 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- 2019/02/22 15:32:22 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
- 2019/02/22 15:32:22 VERIFY KU OK
- 2019/02/22 15:32:22 Validating certificate extended key usage
- 2019/02/22 15:32:22 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2019/02/22 15:32:22 VERIFY EKU OK
- 2019/02/22 15:32:22 VERIFY OK: depth=0, CN=th6.nordvpn.com
- 2019/02/22 15:32:22 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1636'
- 2019/02/22 15:32:22 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- 2019/02/22 15:32:22 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2019/02/22 15:32:22 [th6.nordvpn.com] Peer Connection Initiated with [AF_INET]122.155.174.66:443
- 2019/02/22 15:32:23 SENT CONTROL [th6.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- 2019/02/22 15:32:23 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- 2019/02/22 15:32:23 OPTIONS IMPORT: timers and/or timeouts modified
- 2019/02/22 15:32:23 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
- 2019/02/22 15:32:23 OPTIONS IMPORT: compression parms modified
- 2019/02/22 15:32:23 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- 2019/02/22 15:32:23 Socket Buffers: R=[372480->425984] S=[46080->425984]
- 2019/02/22 15:32:23 OPTIONS IMPORT: --ifconfig/up options modified
- 2019/02/22 15:32:23 OPTIONS IMPORT: route options modified
- 2019/02/22 15:32:23 OPTIONS IMPORT: route-related options modified
- 2019/02/22 15:32:23 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2019/02/22 15:32:23 OPTIONS IMPORT: peer-id set
- 2019/02/22 15:32:23 OPTIONS IMPORT: adjusting link_mtu to 1658
- 2019/02/22 15:32:23 OPTIONS IMPORT: data channel crypto options modified
- 2019/02/22 15:32:23 Data Channel: using negotiated cipher 'AES-256-GCM'
- 2019/02/22 15:32:23 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019/02/22 15:32:23 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019/02/22 15:32:23 TUN/TAP device tun0 opened
- 2019/02/22 15:32:23 TUN/TAP TX queue length set to 100
- 2019/02/22 15:32:24 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2019/02/22 15:32:24 /sbin/ifconfig tun0 10.7.7.3 netmask 255.255.255.0 mtu 1500 broadcast 10.7.7.255
- 2019/02/22 15:32:24 /sbin/route add -net 122.155.174.66 netmask 255.255.255.255 gw 10.0.0.1
- 2019/02/22 15:32:24 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
- 2019/02/22 15:32:24 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
- 2019/02/22 15:32:24 Initialization Sequence Completed
- 2019/02/22 15:36:58 /sbin/route del -net 122.155.174.66 netmask 255.255.255.255
- 2019/02/22 15:36:58 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:36:58 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:36:58 Closing TUN/TAP interface
- 2019/02/22 15:36:58 /sbin/ifconfig tun0 0.0.0.0
- 2019/02/22 15:36:58 SIGTERM[hard,] received, process exiting
- 2019/02/22 15:43:18 OpenVPN 2.4.6 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Oct 10 2018
- 2019/02/22 15:43:18 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.10
- 2019/02/22 15:43:18 MANAGEMENT: unix domain socket listening on /var/run/nordvpn-openvpn.sock
- 2019/02/22 15:43:18 Need password(s) from management interface, waiting...
- 2019/02/22 15:43:18 MANAGEMENT: Client connected from /var/run/nordvpn-openvpn.sock
- 2019/02/22 15:43:18 MANAGEMENT: CMD 'username "Auth" 4aSJazAsMsryZQjcZusV7qtw'
- 2019/02/22 15:43:18 MANAGEMENT: CMD 'password [...]'
- 2019/02/22 15:43:18 MANAGEMENT: CMD 'hold release'
- 2019/02/22 15:43:18 MANAGEMENT: CMD 'hold off'
- 2019/02/22 15:43:18 NOTE: --fast-io is disabled since we are not using UDP
- 2019/02/22 15:43:18 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 2019/02/22 15:43:18 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- 2019/02/22 15:43:18 TCP/UDP: Preserving recently used remote address: [AF_INET]122.155.174.66:443
- 2019/02/22 15:43:18 Socket Buffers: R=[87380->87380] S=[16384->16384]
- 2019/02/22 15:43:18 Attempting to establish TCP connection with [AF_INET]122.155.174.66:443 [nonblock]
- 2019/02/22 15:43:19 TCP connection established with [AF_INET]122.155.174.66:443
- 2019/02/22 15:43:19 TCP_CLIENT link local: (not bound)
- 2019/02/22 15:43:19 TCP_CLIENT link remote: [AF_INET]122.155.174.66:443
- 2019/02/22 15:43:19 TLS: Initial packet from [AF_INET]122.155.174.66:443, sid=527b56df 9f7a0826
- 2019/02/22 15:43:19 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2019/02/22 15:43:20 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
- 2019/02/22 15:43:20 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA3
- 2019/02/22 15:43:20 VERIFY KU OK
- 2019/02/22 15:43:20 Validating certificate extended key usage
- 2019/02/22 15:43:20 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2019/02/22 15:43:20 VERIFY EKU OK
- 2019/02/22 15:43:20 VERIFY OK: depth=0, CN=th6.nordvpn.com
- 2019/02/22 15:43:20 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1635', remote='link-mtu 1636'
- 2019/02/22 15:43:20 WARNING: 'comp-lzo' is present in remote config but missing in local config, remote='comp-lzo'
- 2019/02/22 15:43:20 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- 2019/02/22 15:43:20 [th6.nordvpn.com] Peer Connection Initiated with [AF_INET]122.155.174.66:443
- 2019/02/22 15:43:21 SENT CONTROL [th6.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- 2019/02/22 15:43:21 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- 2019/02/22 15:43:21 OPTIONS IMPORT: timers and/or timeouts modified
- 2019/02/22 15:43:21 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
- 2019/02/22 15:43:21 OPTIONS IMPORT: compression parms modified
- 2019/02/22 15:43:21 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- 2019/02/22 15:43:21 Socket Buffers: R=[372480->425984] S=[46080->425984]
- 2019/02/22 15:43:21 OPTIONS IMPORT: --ifconfig/up options modified
- 2019/02/22 15:43:21 OPTIONS IMPORT: route options modified
- 2019/02/22 15:43:21 OPTIONS IMPORT: route-related options modified
- 2019/02/22 15:43:21 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2019/02/22 15:43:21 OPTIONS IMPORT: peer-id set
- 2019/02/22 15:43:21 OPTIONS IMPORT: adjusting link_mtu to 1658
- 2019/02/22 15:43:21 OPTIONS IMPORT: data channel crypto options modified
- 2019/02/22 15:43:21 Data Channel: using negotiated cipher 'AES-256-GCM'
- 2019/02/22 15:43:21 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019/02/22 15:43:21 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2019/02/22 15:43:21 TUN/TAP device tun0 opened
- 2019/02/22 15:43:21 TUN/TAP TX queue length set to 100
- 2019/02/22 15:43:22 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2019/02/22 15:43:22 /sbin/ifconfig tun0 10.7.7.3 netmask 255.255.255.0 mtu 1500 broadcast 10.7.7.255
- 2019/02/22 15:43:22 /sbin/route add -net 122.155.174.66 netmask 255.255.255.255 gw 10.0.0.1
- 2019/02/22 15:43:22 /sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
- 2019/02/22 15:43:22 /sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.7.1
- 2019/02/22 15:43:22 Initialization Sequence Completed
- 2019/02/22 15:58:22 /sbin/route del -net 122.155.174.66 netmask 255.255.255.255
- 2019/02/22 15:58:22 /sbin/route del -net 0.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:58:22 /sbin/route del -net 128.0.0.0 netmask 128.0.0.0
- 2019/02/22 15:58:22 Closing TUN/TAP interface
- 2019/02/22 15:58:22 /sbin/ifconfig tun0 0.0.0.0
- 2019/02/22 15:58:22 SIGTERM[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement