Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sun May 13 23:25:23 2018 OpenVPN 2.4.5 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Mar 1 2018
- Sun May 13 23:25:23 2018 Windows version 6.1 (Windows 7) 64bit
- Sun May 13 23:25:23 2018 library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10
- Enter Management Password:
- Sun May 13 23:25:23 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25351
- Sun May 13 23:25:23 2018 Need hold release from management interface, waiting...
- Sun May 13 23:25:23 2018 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25351
- Sun May 13 23:25:23 2018 MANAGEMENT: CMD 'state on'
- Sun May 13 23:25:23 2018 MANAGEMENT: CMD 'log all on'
- Sun May 13 23:25:23 2018 MANAGEMENT: CMD 'echo all on'
- Sun May 13 23:25:23 2018 MANAGEMENT: CMD 'bytecount 5'
- Sun May 13 23:25:23 2018 MANAGEMENT: CMD 'hold off'
- Sun May 13 23:25:23 2018 MANAGEMENT: CMD 'hold release'
- Sun May 13 23:25:36 2018 MANAGEMENT: CMD 'username "Auth" "info@aic-informatique.net"'
- Sun May 13 23:25:36 2018 MANAGEMENT: CMD 'password [...]'
- Sun May 13 23:25:36 2018 WARNING: --ping should normally be used with --ping-restart or --ping-exit
- Sun May 13 23:25:36 2018 NOTE: --fast-io is disabled since we are running on Windows
- Sun May 13 23:25:36 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun May 13 23:25:36 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun May 13 23:25:36 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.18.100:443
- Sun May 13 23:25:36 2018 Socket Buffers: R=[8192->8192] S=[8192->8192]
- Sun May 13 23:25:36 2018 Attempting to establish TCP connection with [AF_INET]82.102.18.100:443 [nonblock]
- Sun May 13 23:25:36 2018 MANAGEMENT: >STATE:1526246736,TCP_CONNECT,,,,,,
- Sun May 13 23:25:37 2018 TCP connection established with [AF_INET]82.102.18.100:443
- Sun May 13 23:25:37 2018 TCP_CLIENT link local: (not bound)
- Sun May 13 23:25:37 2018 TCP_CLIENT link remote: [AF_INET]82.102.18.100:443
- Sun May 13 23:25:37 2018 MANAGEMENT: >STATE:1526246737,WAIT,,,,,,
- Sun May 13 23:25:37 2018 MANAGEMENT: >STATE:1526246737,AUTH,,,,,,
- Sun May 13 23:25:37 2018 TLS: Initial packet from [AF_INET]82.102.18.100:443, sid=09d2d540 7a6bdf1c
- Sun May 13 23:25:37 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun May 13 23:25:37 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Sun May 13 23:25:37 2018 VERIFY KU OK
- Sun May 13 23:25:37 2018 Validating certificate extended key usage
- Sun May 13 23:25:37 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun May 13 23:25:37 2018 VERIFY EKU OK
- Sun May 13 23:25:37 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Sun May 13 23:25:37 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun May 13 23:25:37 2018 [fr46.nordvpn.com] Peer Connection Initiated with [AF_INET]82.102.18.100:443
- Sun May 13 23:25:38 2018 MANAGEMENT: >STATE:1526246738,GET_CONFIG,,,,,,
- Sun May 13 23:25:38 2018 SENT CONTROL [fr46.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun May 13 23:25:39 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.199 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun May 13 23:25:39 2018 Socket Buffers: R=[8192->524288] S=[8192->524288]
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: route options modified
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: route-related options modified
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: peer-id set
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: adjusting link_mtu to 1659
- Sun May 13 23:25:39 2018 OPTIONS IMPORT: data channel crypto options modified
- Sun May 13 23:25:39 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
- Sun May 13 23:25:39 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun May 13 23:25:39 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun May 13 23:25:39 2018 interactive service msg_channel=200
- Sun May 13 23:25:39 2018 ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=17 HWADDR=00:e0:4c:36:59:80
- Sun May 13 23:25:39 2018 open_tun
- Sun May 13 23:25:39 2018 TAP-WIN32 device [Connexion au réseau local 4] opened: \\.\Global\{07F609DA-D7B9-4B0B-96D6-292C29B050D3}.tap
- Sun May 13 23:25:39 2018 TAP-Windows Driver Version 9.21
- Sun May 13 23:25:39 2018 Set TAP-Windows TUN subnet mode network/local/netmask = 10.7.7.0/10.7.7.199/255.255.255.0 [SUCCEEDED]
- Sun May 13 23:25:39 2018 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.7.7.199/255.255.255.0 on interface {07F609DA-D7B9-4B0B-96D6-292C29B050D3} [DHCP-serv: 10.7.7.254, lease-time: 31536000]
- Sun May 13 23:25:39 2018 Successful ARP Flush on interface [39] {07F609DA-D7B9-4B0B-96D6-292C29B050D3}
- Sun May 13 23:25:39 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sun May 13 23:25:39 2018 MANAGEMENT: >STATE:1526246739,ASSIGN_IP,,10.7.7.199,,,,
- Sun May 13 23:25:44 2018 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
- Sun May 13 23:25:44 2018 C:\Windows\system32\route.exe ADD 82.102.18.100 MASK 255.255.255.255 192.168.0.1
- Sun May 13 23:25:44 2018 Route addition via service succeeded
- Sun May 13 23:25:44 2018 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Sun May 13 23:25:44 2018 Route addition via service succeeded
- Sun May 13 23:25:44 2018 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Sun May 13 23:25:44 2018 Route addition via service succeeded
- Sun May 13 23:25:44 2018 Initialization Sequence Completed
- Sun May 13 23:25:44 2018 MANAGEMENT: >STATE:1526246744,CONNECTED,SUCCESS,10.7.7.199,82.102.18.100,443,192.168.0.89,60072
- Mon May 14 00:25:37 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 00:25:37 2018 VERIFY KU OK
- Mon May 14 00:25:37 2018 Validating certificate extended key usage
- Mon May 14 00:25:37 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 00:25:37 2018 VERIFY EKU OK
- Mon May 14 00:25:37 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 00:25:38 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 00:25:38 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 00:25:38 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 01:25:37 2018 TLS: tls_process: killed expiring key
- Mon May 14 01:25:39 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 01:25:39 2018 VERIFY KU OK
- Mon May 14 01:25:39 2018 Validating certificate extended key usage
- Mon May 14 01:25:39 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 01:25:39 2018 VERIFY EKU OK
- Mon May 14 01:25:39 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 01:25:39 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 01:25:39 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 01:25:39 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 02:25:38 2018 TLS: tls_process: killed expiring key
- Mon May 14 02:25:40 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 02:25:40 2018 VERIFY KU OK
- Mon May 14 02:25:40 2018 Validating certificate extended key usage
- Mon May 14 02:25:40 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 02:25:40 2018 VERIFY EKU OK
- Mon May 14 02:25:40 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 02:25:40 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 02:25:40 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 02:25:40 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 03:25:39 2018 TLS: tls_process: killed expiring key
- Mon May 14 03:25:41 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 03:25:41 2018 VERIFY KU OK
- Mon May 14 03:25:41 2018 Validating certificate extended key usage
- Mon May 14 03:25:41 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 03:25:41 2018 VERIFY EKU OK
- Mon May 14 03:25:41 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 03:25:41 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 03:25:41 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 03:25:41 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 04:25:40 2018 TLS: tls_process: killed expiring key
- Mon May 14 04:25:42 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 04:25:42 2018 VERIFY KU OK
- Mon May 14 04:25:42 2018 Validating certificate extended key usage
- Mon May 14 04:25:42 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 04:25:42 2018 VERIFY EKU OK
- Mon May 14 04:25:42 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 04:25:42 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 04:25:42 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 04:25:42 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 05:25:41 2018 TLS: tls_process: killed expiring key
- Mon May 14 05:25:43 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 05:25:43 2018 VERIFY KU OK
- Mon May 14 05:25:43 2018 Validating certificate extended key usage
- Mon May 14 05:25:43 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 05:25:43 2018 VERIFY EKU OK
- Mon May 14 05:25:43 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 05:25:43 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 05:25:43 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 05:25:43 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 06:25:42 2018 TLS: tls_process: killed expiring key
- Mon May 14 06:25:44 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 06:25:44 2018 VERIFY KU OK
- Mon May 14 06:25:44 2018 Validating certificate extended key usage
- Mon May 14 06:25:44 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 06:25:44 2018 VERIFY EKU OK
- Mon May 14 06:25:44 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 06:25:44 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 06:25:44 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 06:25:44 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 07:25:43 2018 TLS: tls_process: killed expiring key
- Mon May 14 07:25:45 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 07:25:45 2018 VERIFY KU OK
- Mon May 14 07:25:45 2018 Validating certificate extended key usage
- Mon May 14 07:25:45 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 07:25:45 2018 VERIFY EKU OK
- Mon May 14 07:25:45 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 07:25:45 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 07:25:45 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 07:25:45 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 08:25:44 2018 TLS: tls_process: killed expiring key
- Mon May 14 08:25:45 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 08:25:45 2018 VERIFY KU OK
- Mon May 14 08:25:45 2018 Validating certificate extended key usage
- Mon May 14 08:25:45 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 08:25:45 2018 VERIFY EKU OK
- Mon May 14 08:25:45 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 08:25:45 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 08:25:45 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 08:25:45 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 09:25:45 2018 TLS: tls_process: killed expiring key
- Mon May 14 09:25:46 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 09:25:46 2018 VERIFY KU OK
- Mon May 14 09:25:46 2018 Validating certificate extended key usage
- Mon May 14 09:25:46 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 09:25:46 2018 VERIFY EKU OK
- Mon May 14 09:25:46 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 09:25:46 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 09:25:46 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 09:25:46 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 10:25:46 2018 TLS: tls_process: killed expiring key
- Mon May 14 10:25:47 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 10:25:47 2018 VERIFY KU OK
- Mon May 14 10:25:47 2018 Validating certificate extended key usage
- Mon May 14 10:25:47 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 10:25:47 2018 VERIFY EKU OK
- Mon May 14 10:25:47 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 10:25:47 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 10:25:47 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 10:25:47 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 11:25:47 2018 TLS: tls_process: killed expiring key
- Mon May 14 11:25:47 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 11:25:47 2018 VERIFY KU OK
- Mon May 14 11:25:47 2018 Validating certificate extended key usage
- Mon May 14 11:25:47 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 11:25:47 2018 VERIFY EKU OK
- Mon May 14 11:25:47 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 11:25:47 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 11:25:47 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 11:25:47 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 12:25:47 2018 TLS: tls_process: killed expiring key
- Mon May 14 12:25:47 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 12:25:47 2018 VERIFY KU OK
- Mon May 14 12:25:47 2018 Validating certificate extended key usage
- Mon May 14 12:25:47 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 12:25:47 2018 VERIFY EKU OK
- Mon May 14 12:25:47 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 12:25:48 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 12:25:48 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 12:25:48 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 13:25:47 2018 TLS: tls_process: killed expiring key
- Mon May 14 13:25:48 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 13:25:48 2018 VERIFY KU OK
- Mon May 14 13:25:48 2018 Validating certificate extended key usage
- Mon May 14 13:25:48 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 13:25:48 2018 VERIFY EKU OK
- Mon May 14 13:25:48 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 13:25:49 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 13:25:49 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 13:25:49 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 14:25:48 2018 TLS: tls_process: killed expiring key
- Mon May 14 14:25:49 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 14:25:49 2018 VERIFY KU OK
- Mon May 14 14:25:49 2018 Validating certificate extended key usage
- Mon May 14 14:25:49 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 14:25:49 2018 VERIFY EKU OK
- Mon May 14 14:25:49 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 14:25:49 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 14:25:49 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 14:25:49 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 15:25:49 2018 TLS: tls_process: killed expiring key
- Mon May 14 15:25:50 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 15:25:50 2018 VERIFY KU OK
- Mon May 14 15:25:50 2018 Validating certificate extended key usage
- Mon May 14 15:25:50 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 15:25:50 2018 VERIFY EKU OK
- Mon May 14 15:25:50 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 15:25:50 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 15:25:50 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 15:25:50 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 16:25:50 2018 TLS: tls_process: killed expiring key
- Mon May 14 16:25:51 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 16:25:51 2018 VERIFY KU OK
- Mon May 14 16:25:51 2018 Validating certificate extended key usage
- Mon May 14 16:25:51 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 16:25:51 2018 VERIFY EKU OK
- Mon May 14 16:25:51 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 16:25:52 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 16:25:52 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 16:25:52 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 17:25:50 2018 TLS: tls_process: killed expiring key
- Mon May 14 17:25:53 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 17:25:53 2018 VERIFY KU OK
- Mon May 14 17:25:53 2018 Validating certificate extended key usage
- Mon May 14 17:25:53 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 17:25:53 2018 VERIFY EKU OK
- Mon May 14 17:25:53 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 17:25:54 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 17:25:54 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 17:25:54 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 18:25:52 2018 TLS: tls_process: killed expiring key
- Mon May 14 18:25:55 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 18:25:55 2018 VERIFY KU OK
- Mon May 14 18:25:55 2018 Validating certificate extended key usage
- Mon May 14 18:25:55 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 18:25:55 2018 VERIFY EKU OK
- Mon May 14 18:25:55 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 18:25:57 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 18:25:57 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 18:25:57 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 19:25:54 2018 TLS: tls_process: killed expiring key
- Mon May 14 19:25:59 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 19:25:59 2018 VERIFY KU OK
- Mon May 14 19:25:59 2018 Validating certificate extended key usage
- Mon May 14 19:25:59 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 19:25:59 2018 VERIFY EKU OK
- Mon May 14 19:25:59 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 19:26:00 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 19:26:00 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 19:26:00 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 19:40:17 2018 [fr46.nordvpn.com] Inactivity timeout (--ping-restart), restarting
- Mon May 14 19:40:17 2018 SIGUSR1[soft,ping-restart] received, process restarting
- Mon May 14 19:40:17 2018 MANAGEMENT: >STATE:1526319617,RECONNECTING,ping-restart,,,,,
- Mon May 14 19:40:17 2018 Restart pause, 5 second(s)
- Mon May 14 19:40:22 2018 NOTE: --fast-io is disabled since we are running on Windows
- Mon May 14 19:40:22 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]82.102.18.100:443
- Mon May 14 19:40:22 2018 Socket Buffers: R=[8192->524288] S=[8192->524288]
- Mon May 14 19:40:22 2018 Attempting to establish TCP connection with [AF_INET]82.102.18.100:443 [nonblock]
- Mon May 14 19:40:22 2018 MANAGEMENT: >STATE:1526319622,TCP_CONNECT,,,,,,
- Mon May 14 19:40:23 2018 TCP connection established with [AF_INET]82.102.18.100:443
- Mon May 14 19:40:23 2018 TCP_CLIENT link local: (not bound)
- Mon May 14 19:40:23 2018 TCP_CLIENT link remote: [AF_INET]82.102.18.100:443
- Mon May 14 19:40:23 2018 MANAGEMENT: >STATE:1526319623,WAIT,,,,,,
- Mon May 14 19:40:23 2018 MANAGEMENT: >STATE:1526319623,AUTH,,,,,,
- Mon May 14 19:40:23 2018 TLS: Initial packet from [AF_INET]82.102.18.100:443, sid=b10ba9ed e7761325
- Mon May 14 19:40:23 2018 VERIFY OK: depth=1, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 19:40:23 2018 VERIFY KU OK
- Mon May 14 19:40:23 2018 Validating certificate extended key usage
- Mon May 14 19:40:23 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Mon May 14 19:40:23 2018 VERIFY EKU OK
- Mon May 14 19:40:23 2018 VERIFY OK: depth=0, C=PA, ST=PA, L=Panama, O=NordVPN, OU=NordVPN, CN=fr46.nordvpn.com, name=NordVPN, emailAddress=cert@nordvpn.com
- Mon May 14 19:40:23 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Mon May 14 19:40:23 2018 [fr46.nordvpn.com] Peer Connection Initiated with [AF_INET]82.102.18.100:443
- Mon May 14 19:40:24 2018 MANAGEMENT: >STATE:1526319624,GET_CONFIG,,,,,,
- Mon May 14 19:40:24 2018 SENT CONTROL [fr46.nordvpn.com]: 'PUSH_REQUEST' (status=1)
- Mon May 14 19:40:24 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,sndbuf 524288,rcvbuf 524288,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,route-gateway 10.7.7.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.7.199 255.255.255.0,peer-id 0,cipher AES-256-GCM'
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Mon May 14 19:40:24 2018 Socket Buffers: R=[524288->524288] S=[524288->524288]
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: route options modified
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: route-related options modified
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: peer-id set
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: adjusting link_mtu to 1659
- Mon May 14 19:40:24 2018 OPTIONS IMPORT: data channel crypto options modified
- Mon May 14 19:40:24 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
- Mon May 14 19:40:24 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 19:40:24 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Mon May 14 19:40:24 2018 Preserving previous TUN/TAP instance: Connexion au réseau local 4
- Mon May 14 19:40:24 2018 Initialization Sequence Completed
- Mon May 14 19:40:24 2018 MANAGEMENT: >STATE:1526319624,CONNECTED,SUCCESS,10.7.7.199,82.102.18.100,443,192.168.0.89,51965
- Mon May 14 19:55:57 2018 C:\Windows\system32\route.exe DELETE 82.102.18.100 MASK 255.255.255.255 192.168.0.1
- Mon May 14 19:55:57 2018 Route deletion via service succeeded
- Mon May 14 19:55:57 2018 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 14 19:55:57 2018 Route deletion via service succeeded
- Mon May 14 19:55:57 2018 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.7.7.1
- Mon May 14 19:55:57 2018 Route deletion via service succeeded
- Mon May 14 19:55:57 2018 Closing TUN/TAP interface
- Mon May 14 19:55:57 2018 TAP: DHCP address released
- Mon May 14 19:55:57 2018 SIGTERM[hard,] received, process exiting
- Mon May 14 19:55:57 2018 MANAGEMENT: >STATE:1526320557,EXITING,SIGTERM,,,,,
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement