Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Tue May 22 22:14:16 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
- Tue May 22 22:14:16 2018 Connection reset, restarting [-1]
- Tue May 22 22:14:16 2018 SIGUSR1[soft,connection-reset] received, process restarting
- Tue May 22 22:14:16 2018 Restart pause, 1 second(s)
- Tue May 22 22:14:17 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Tue May 22 22:14:17 2018 Attempting to establish TCP connection with [AF_INET]5.135.109.189:443 [nonblock]
- Tue May 22 22:14:18 2018 TCP connection established with [AF_INET]5.135.109.189:443
- Tue May 22 22:14:18 2018 TCPv4_CLIENT link local: [undef]
- Tue May 22 22:14:18 2018 TCPv4_CLIENT link remote: [AF_INET]5.135.109.189:443
- Tue May 22 22:14:18 2018 TLS: Initial packet from [AF_INET]5.135.109.189:443, sid=f076bdfd ca590425
- Tue May 22 22:14:18 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
- Tue May 22 22:14:18 2018 VERIFY OK: nsCertType=SERVER
- Tue May 22 22:14:18 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
- Tue May 22 22:14:19 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 22 22:14:19 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 22 22:14:19 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 22 22:14:19 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 22 22:14:19 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Tue May 22 22:14:19 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.189:443
- Tue May 22 22:14:21 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
- Tue May 22 22:14:21 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.0.1,dhcp-option WINS 10.10.0.1,route 10.10.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.10.1.38 10.10.1.37'
- Tue May 22 22:14:21 2018 OPTIONS IMPORT: --socket-flags option modified
- Tue May 22 22:14:21 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 22 22:14:21 2018 OPTIONS IMPORT: route options modified
- Tue May 22 22:14:21 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue May 22 22:14:21 2018 Preserving previous TUN/TAP instance: FrozenWay
- Tue May 22 22:14:21 2018 Initialization Sequence Completed
- ___________________________________________________________________________________
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 21:01:11 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
- Tue May 22 21:01:11 2018 Connection reset, restarting [-1]
- Tue May 22 21:01:11 2018 SIGUSR1[soft,connection-reset] received, process restarting
- Tue May 22 21:01:11 2018 Restart pause, 1 second(s)
- Tue May 22 21:01:12 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Tue May 22 21:01:12 2018 Attempting to establish TCP connection with [AF_INET]5.135.109.189:443 [nonblock]
- Tue May 22 21:01:13 2018 TCP connection established with [AF_INET]5.135.109.189:443
- Tue May 22 21:01:13 2018 TCPv4_CLIENT link local: [undef]
- Tue May 22 21:01:13 2018 TCPv4_CLIENT link remote: [AF_INET]5.135.109.189:443
- Tue May 22 21:01:13 2018 TLS: Initial packet from [AF_INET]5.135.109.189:443, sid=6153f043 bcd42c4b
- Tue May 22 21:01:13 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
- Tue May 22 21:01:13 2018 VERIFY OK: nsCertType=SERVER
- Tue May 22 21:01:13 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
- Tue May 22 21:01:13 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 22 21:01:13 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 22 21:01:13 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 22 21:01:13 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 22 21:01:13 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Tue May 22 21:01:13 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.189:443
- Tue May 22 21:01:15 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
- Tue May 22 21:01:15 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.0.1,dhcp-option WINS 10.10.0.1,route 10.10.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.10.1.38 10.10.1.37'
- Tue May 22 21:01:15 2018 OPTIONS IMPORT: --socket-flags option modified
- Tue May 22 21:01:15 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 22 21:01:15 2018 OPTIONS IMPORT: route options modified
- Tue May 22 21:01:15 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue May 22 21:01:15 2018 Preserving previous TUN/TAP instance: FrozenWay
- Tue May 22 21:01:15 2018 Initialization Sequence Completed
- _________________________________________________________________________
- Tue May 22 20:42:26 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
- Tue May 22 20:42:26 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
- Tue May 22 20:42:26 2018 Connection reset, restarting [-1]
- Tue May 22 20:42:26 2018 SIGUSR1[soft,connection-reset] received, process restarting
- Tue May 22 20:42:26 2018 Restart pause, 1 second(s)
- Tue May 22 20:42:27 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Tue May 22 20:42:27 2018 Attempting to establish TCP connection with [AF_INET]5.135.109.189:443 [nonblock]
- Tue May 22 20:42:28 2018 TCP connection established with [AF_INET]5.135.109.189:443
- Tue May 22 20:42:28 2018 TCPv4_CLIENT link local: [undef]
- Tue May 22 20:42:28 2018 TCPv4_CLIENT link remote: [AF_INET]5.135.109.189:443
- Tue May 22 20:42:28 2018 TLS: Initial packet from [AF_INET]5.135.109.189:443, sid=efd8c69a 3345d7e5
- Tue May 22 20:42:29 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
- Tue May 22 20:42:29 2018 VERIFY OK: nsCertType=SERVER
- Tue May 22 20:42:29 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
- Tue May 22 20:42:29 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 22 20:42:29 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 22 20:42:29 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
- Tue May 22 20:42:29 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- Tue May 22 20:42:29 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
- Tue May 22 20:42:29 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.189:443
- Tue May 22 20:42:31 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
- Tue May 22 20:42:31 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.0.1,dhcp-option WINS 10.10.0.1,route 10.10.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.10.1.38 10.10.1.37'
- Tue May 22 20:42:31 2018 OPTIONS IMPORT: --socket-flags option modified
- Tue May 22 20:42:31 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Tue May 22 20:42:31 2018 OPTIONS IMPORT: route options modified
- Tue May 22 20:42:31 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Tue May 22 20:42:31 2018 Preserving previous TUN/TAP instance: FrozenWay
- Tue May 22 20:42:31 2018 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement