Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Client Version: 2.1.0
- Client Shared Version: v1.5.2
- OS Name: linux
- OS Version: Arch Linux
- Internal diagnostics data:
- D01: 29017, OK
- D02: 592635, OK
- D03: 29013
- D04: 30807
- D05: 30807
- D06: 29013
- D07: 30212
- D08: 30212
- D09: 41613
- D10: 30212
- D11: 30212
- D12: 7, 27
- D13: https://www.hgm2akdl.net
- D14: Japan - Tokyo - 1
- D15: auto
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:29:52 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:29:52 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:29:52 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:29:52 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:34141
- Thu May 23 07:29:52 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:29:52 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:29:52 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:29:52 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:29:52 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:29:52 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:29:52 2019 UDP link local: (not bound)
- Thu May 23 07:29:52 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:29:55 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:34141
- Thu May 23 07:29:55 2019 MANAGEMENT: CMD ''
- Thu May 23 07:29:55 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:29:55 2019 MANAGEMENT: CMD ''
- Thu May 23 07:29:55 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:29:56 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:29:56 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:29:56 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:29:56 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:45993
- Thu May 23 07:29:56 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:29:56 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:29:56 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:29:56 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:29:56 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:29:56 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:29:56 2019 UDP link local: (not bound)
- Thu May 23 07:29:56 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:29:59 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:45993
- Thu May 23 07:29:59 2019 MANAGEMENT: CMD ''
- Thu May 23 07:29:59 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:29:59 2019 MANAGEMENT: CMD ''
- Thu May 23 07:29:59 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:30:00 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:00 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:00 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:00 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:43839
- Thu May 23 07:30:00 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:00 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:00 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:00 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:00 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:00 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:00 2019 UDP link local: (not bound)
- Thu May 23 07:30:00 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:05 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:43839
- Thu May 23 07:30:05 2019 MANAGEMENT: CMD ''
- Thu May 23 07:30:05 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:30:05 2019 MANAGEMENT: CMD ''
- Thu May 23 07:30:05 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:30:07 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:07 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:07 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:07 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:43369
- Thu May 23 07:30:07 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:07 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:07 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:07 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:07 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:07 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:07 2019 UDP link local: (not bound)
- Thu May 23 07:30:07 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:12 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:43369
- Thu May 23 07:30:12 2019 MANAGEMENT: CMD ''
- Thu May 23 07:30:12 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Thu May 23 07:30:12 2019 MANAGEMENT: CMD ''
- Thu May 23 07:30:12 2019 SIGTERM[hard,] received, process exiting
- Disconnected with error: initial packet timeout
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:30:13 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:13 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:13 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:13 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:35517
- Thu May 23 07:30:13 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:13 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:13 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:13 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:13 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:13 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:13 2019 UDP link local: (not bound)
- Thu May 23 07:30:13 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:13 2019 TLS: Initial packet from [AF_INET]189.191.47.171:43575, sid=96f01e72 3d030800
- Thu May 23 07:30:13 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:30:13 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:30:13 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:30:13 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:13 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:14 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu May 23 07:30:14 2019 [Server-6386-0a] Peer Connection Initiated with [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:15 2019 SENT CONTROL [Server-6386-0a]: 'PUSH_REQUEST' (status=1)
- Thu May 23 07:30:15 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.63.0.1,route 10.63.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.63.0.110 10.63.0.109,peer-id 28,cipher AES-256-GCM'
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: route options modified
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: peer-id set
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: adjusting link_mtu to 1628
- Thu May 23 07:30:15 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu May 23 07:30:15 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu May 23 07:30:15 2019 NCP: overriding user-set keysize with default
- Thu May 23 07:30:15 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:15 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:15 2019 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
- Thu May 23 07:30:15 2019 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:30:16 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:16 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:16 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:16 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:33367
- Thu May 23 07:30:16 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:16 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:16 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:16 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:16 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:16 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:16 2019 UDP link local: (not bound)
- Thu May 23 07:30:16 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:16 2019 TLS: Initial packet from [AF_INET]166.100.70.121:11731, sid=f20399be d55685cc
- Thu May 23 07:30:16 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:30:17 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:30:17 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:30:17 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6439-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:17 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6439-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:46 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:33367
- Thu May 23 07:30:46 2019 MANAGEMENT: CMD ''
- Thu May 23 07:30:46 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: vpn connection timeout
- Thu May 23 07:30:46 2019 MANAGEMENT: CMD ''
- Thu May 23 07:30:46 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:30:47 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:47 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:47 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:47 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:33363
- Thu May 23 07:30:47 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:47 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:47 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:47 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:47 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:47 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:47 2019 UDP link local: (not bound)
- Thu May 23 07:30:47 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:48 2019 TLS: Initial packet from [AF_INET]189.191.47.171:43575, sid=34ba3697 741a9df5
- Thu May 23 07:30:48 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:30:48 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:30:48 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:30:48 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:48 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:48 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu May 23 07:30:48 2019 [Server-6386-0a] Peer Connection Initiated with [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:49 2019 SENT CONTROL [Server-6386-0a]: 'PUSH_REQUEST' (status=1)
- Thu May 23 07:30:49 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.63.0.1,route 10.63.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.63.0.122 10.63.0.121,peer-id 31,cipher AES-256-GCM'
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: route options modified
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: peer-id set
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: adjusting link_mtu to 1628
- Thu May 23 07:30:49 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu May 23 07:30:49 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu May 23 07:30:49 2019 NCP: overriding user-set keysize with default
- Thu May 23 07:30:49 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:49 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:49 2019 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
- Thu May 23 07:30:49 2019 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:30:51 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:51 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:51 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:51 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:36237
- Thu May 23 07:30:51 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:51 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:51 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:51 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:51 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:51 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:51 2019 UDP link local: (not bound)
- Thu May 23 07:30:51 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:51 2019 TLS: Initial packet from [AF_INET]166.100.70.121:11731, sid=fffb45e7 93e5ac32
- Thu May 23 07:30:51 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:30:51 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:30:51 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:30:51 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6439-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:51 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6439-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:51 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu May 23 07:30:51 2019 [Server-6439-0a] Peer Connection Initiated with [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:52 2019 SENT CONTROL [Server-6439-0a]: 'PUSH_REQUEST' (status=1)
- Thu May 23 07:30:52 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.27.0.1,route 10.27.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.27.0.130 10.27.0.129,peer-id 22,cipher AES-256-GCM'
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: route options modified
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: peer-id set
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: adjusting link_mtu to 1628
- Thu May 23 07:30:52 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu May 23 07:30:52 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu May 23 07:30:52 2019 NCP: overriding user-set keysize with default
- Thu May 23 07:30:52 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:52 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:52 2019 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
- Thu May 23 07:30:52 2019 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:30:53 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:53 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:53 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:53 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:44431
- Thu May 23 07:30:53 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:53 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:53 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:53 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:53 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:53 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:53 2019 UDP link local: (not bound)
- Thu May 23 07:30:53 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:54 2019 TLS: Initial packet from [AF_INET]189.191.47.171:43575, sid=7968e5d0 b49fd70e
- Thu May 23 07:30:54 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:30:54 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:30:54 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:30:54 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:54 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:54 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu May 23 07:30:54 2019 [Server-6386-0a] Peer Connection Initiated with [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:55 2019 SENT CONTROL [Server-6386-0a]: 'PUSH_REQUEST' (status=1)
- Thu May 23 07:30:55 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.63.0.1,route 10.63.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.63.0.46 10.63.0.45,peer-id 15,cipher AES-256-GCM'
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: route options modified
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: peer-id set
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: adjusting link_mtu to 1628
- Thu May 23 07:30:55 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu May 23 07:30:55 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu May 23 07:30:55 2019 NCP: overriding user-set keysize with default
- Thu May 23 07:30:55 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:55 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:55 2019 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
- Thu May 23 07:30:55 2019 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:30:56 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:56 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:56 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:56 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:44013
- Thu May 23 07:30:56 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:56 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:56 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:56 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:56 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:56 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:56 2019 UDP link local: (not bound)
- Thu May 23 07:30:56 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:57 2019 TLS: Initial packet from [AF_INET]166.100.70.121:11731, sid=2168c0a4 f87ec21f
- Thu May 23 07:30:57 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:30:57 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:30:57 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:30:57 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6439-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:57 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6439-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:30:57 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu May 23 07:30:57 2019 [Server-6439-0a] Peer Connection Initiated with [AF_INET]166.100.70.121:11731
- Thu May 23 07:30:58 2019 SENT CONTROL [Server-6439-0a]: 'PUSH_REQUEST' (status=1)
- Thu May 23 07:30:58 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.27.0.1,route 10.27.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.27.0.142 10.27.0.141,peer-id 34,cipher AES-256-GCM'
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: route options modified
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: peer-id set
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: adjusting link_mtu to 1628
- Thu May 23 07:30:58 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu May 23 07:30:58 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu May 23 07:30:58 2019 NCP: overriding user-set keysize with default
- Thu May 23 07:30:58 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:58 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:30:58 2019 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
- Thu May 23 07:30:58 2019 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:30:59 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:30:59 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:30:59 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:30:59 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:42939
- Thu May 23 07:30:59 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:30:59 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:30:59 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:59 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:30:59 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:30:59 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:30:59 2019 UDP link local: (not bound)
- Thu May 23 07:30:59 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:31:00 2019 TLS: Initial packet from [AF_INET]189.191.47.171:43575, sid=f1180924 6f662a55
- Thu May 23 07:31:00 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Thu May 23 07:31:00 2019 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Thu May 23 07:31:00 2019 VERIFY OK: nsCertType=SERVER
- Thu May 23 07:31:00 2019 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:31:00 2019 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-6386-0a, emailAddress=support@expressvpn.com
- Thu May 23 07:31:00 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Thu May 23 07:31:00 2019 [Server-6386-0a] Peer Connection Initiated with [AF_INET]189.191.47.171:43575
- Thu May 23 07:31:01 2019 SENT CONTROL [Server-6386-0a]: 'PUSH_REQUEST' (status=1)
- Thu May 23 07:31:01 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.63.0.1,route 10.63.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.63.0.126 10.63.0.125,peer-id 32,cipher AES-256-GCM'
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: timers and/or timeouts modified
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: --ifconfig/up options modified
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: route options modified
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: peer-id set
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: adjusting link_mtu to 1628
- Thu May 23 07:31:01 2019 OPTIONS IMPORT: data channel crypto options modified
- Thu May 23 07:31:01 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
- Thu May 23 07:31:01 2019 NCP: overriding user-set keysize with default
- Thu May 23 07:31:01 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:31:01 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Thu May 23 07:31:01 2019 ERROR: Cannot open TUN/TAP dev /dev/net/tun: No such device (errno=19)
- Thu May 23 07:31:01 2019 Exiting due to fatal error
- Disconnected with error: vpn process terminated unexpectedly
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:31:02 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:31:02 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:31:02 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:31:02 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:39723
- Thu May 23 07:31:02 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:31:02 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:31:02 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:02 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:02 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:31:02 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:31:02 2019 UDP link local: (not bound)
- Thu May 23 07:31:02 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:31:05 2019 TLS: Initial packet from [AF_INET]166.100.70.121:11731, sid=b4c1363b 9ab0fec4
- Thu May 23 07:31:32 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:39723
- Thu May 23 07:31:32 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:32 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Thu May 23 07:31:32 2019 MANAGEMENT: CMD ''
- Disconnected with error: vpn connection timeout
- Thu May 23 07:31:32 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:31:33 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:31:33 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:31:33 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:31:33 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:33169
- Thu May 23 07:31:33 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:31:33 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:31:33 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:33 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:33 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:31:33 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:31:33 2019 UDP link local: (not bound)
- Thu May 23 07:31:33 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:31:38 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:33169
- Thu May 23 07:31:38 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:38 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Thu May 23 07:31:38 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:38 2019 SIGTERM[hard,] received, process exiting
- Disconnected with error: initial packet timeout
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.121s, protocol: udp
- Thu May 23 07:31:40 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:31:40 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:31:40 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:31:40 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:33249
- Thu May 23 07:31:40 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:31:40 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:31:40 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:40 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:40 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.121:11731
- Thu May 23 07:31:40 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:31:40 2019 UDP link local: (not bound)
- Thu May 23 07:31:40 2019 UDP link remote: [AF_INET]166.100.70.121:11731
- Thu May 23 07:31:45 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:33249
- Thu May 23 07:31:45 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:45 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:31:45 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:45 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 189.191.47.171s, protocol: udp
- Thu May 23 07:31:46 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:31:46 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:31:46 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:31:46 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:46703
- Thu May 23 07:31:46 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:31:46 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:31:46 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:46 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:31:46 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]189.191.47.171:43575
- Thu May 23 07:31:46 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:31:46 2019 UDP link local: (not bound)
- Thu May 23 07:31:46 2019 UDP link remote: [AF_INET]189.191.47.171:43575
- Thu May 23 07:31:51 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:46703
- Thu May 23 07:31:51 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:51 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:31:51 2019 MANAGEMENT: CMD ''
- Thu May 23 07:31:51 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.82x, protocol: tcp
- Thu May 23 07:31:52 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:31:52 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:31:52 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:31:52 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:33389
- Thu May 23 07:31:52 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:31:52 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:31:52 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu May 23 07:31:52 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu May 23 07:31:52 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.82:443
- Thu May 23 07:31:52 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
- Thu May 23 07:31:52 2019 Attempting to establish TCP connection with [AF_INET]166.100.70.82:443 [nonblock]
- Thu May 23 07:32:02 2019 TCP: connect to [AF_INET]166.100.70.82:443 failed: Connection timed out
- Disconnected with error: Connection timed out
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.50x, protocol: tcp
- Thu May 23 07:32:03 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:32:03 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:32:03 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:32:03 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:40123
- Thu May 23 07:32:03 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:32:03 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:32:03 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu May 23 07:32:03 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu May 23 07:32:03 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.50:443
- Thu May 23 07:32:03 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
- Thu May 23 07:32:03 2019 Attempting to establish TCP connection with [AF_INET]166.100.70.50:443 [nonblock]
- Thu May 23 07:32:13 2019 TCP: connect to [AF_INET]166.100.70.50:443 failed: Connection timed out
- Disconnected with error: Connection timed out
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 166.100.70.42x, protocol: tcp
- Thu May 23 07:32:14 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:32:14 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:32:14 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:32:14 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:46391
- Thu May 23 07:32:14 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:32:14 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:32:14 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu May 23 07:32:14 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Thu May 23 07:32:14 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]166.100.70.42:443
- Thu May 23 07:32:14 2019 Socket Buffers: R=[131072->131072] S=[16384->16384]
- Thu May 23 07:32:14 2019 Attempting to establish TCP connection with [AF_INET]166.100.70.42:443 [nonblock]
- Thu May 23 07:32:24 2019 TCP: connect to [AF_INET]166.100.70.42:443 failed: Connection timed out
- Disconnected with error: Connection timed out
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 105.89.21.9x, protocol: udp
- Thu May 23 07:32:25 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:32:25 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:32:25 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:32:25 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:46757
- Thu May 23 07:32:25 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:32:25 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:32:25 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:32:25 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:32:25 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]105.89.21.9:48772
- Thu May 23 07:32:25 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:32:25 2019 UDP link local: (not bound)
- Thu May 23 07:32:25 2019 UDP link remote: [AF_INET]105.89.21.9:48772
- Thu May 23 07:32:28 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:46757
- Thu May 23 07:32:28 2019 MANAGEMENT: CMD ''
- Thu May 23 07:32:28 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:32:28 2019 MANAGEMENT: CMD ''
- Thu May 23 07:32:28 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 105.89.21.144x, protocol: udp
- Thu May 23 07:32:30 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:32:30 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:32:30 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:32:30 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:42571
- Thu May 23 07:32:30 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:32:30 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:32:30 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:32:30 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:32:30 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]105.89.21.144:30034
- Thu May 23 07:32:30 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:32:30 2019 UDP link local: (not bound)
- Thu May 23 07:32:30 2019 UDP link remote: [AF_INET]105.89.21.144:30034
- Thu May 23 07:32:33 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:42571
- Thu May 23 07:32:33 2019 MANAGEMENT: CMD ''
- Thu May 23 07:32:33 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:32:33 2019 MANAGEMENT: CMD ''
- Thu May 23 07:32:33 2019 SIGTERM[hard,] received, process exiting
- ==============================================
- Connecting to Japan - Tokyo - 1, ip: 105.89.21.9x, protocol: udp
- Thu May 23 07:32:34 2019 WARNING: --keysize is DEPRECATED and will be removed in OpenVPN 2.6
- Thu May 23 07:32:34 2019 OpenVPN 2.4.7 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Feb 28 2019
- Thu May 23 07:32:34 2019 library versions: OpenSSL 1.1.1b 26 Feb 2019, LZO 2.10
- Thu May 23 07:32:34 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:36283
- Thu May 23 07:32:34 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
- Thu May 23 07:32:34 2019 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Thu May 23 07:32:34 2019 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:32:34 2019 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Thu May 23 07:32:34 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]105.89.21.9:48772
- Thu May 23 07:32:34 2019 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Thu May 23 07:32:34 2019 UDP link local: (not bound)
- Thu May 23 07:32:34 2019 UDP link remote: [AF_INET]105.89.21.9:48772
- Thu May 23 07:32:39 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:36283
- Thu May 23 07:32:39 2019 MANAGEMENT: CMD ''
- Thu May 23 07:32:39 2019 MANAGEMENT: CMD 'signal SIGTERM'
- Disconnected with error: initial packet timeout
- Thu May 23 07:32:39 2019 MANAGEMENT: CMD ''
- Thu May 23 07:32:39 2019 SIGTERM[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement