Advertisement
Guest User

Crash logs

a guest
May 22nd, 2018
103
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 8.69 KB | None | 0 0
  1. Tue May 22 22:14:16 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
  2. Tue May 22 22:14:16 2018 Connection reset, restarting [-1]
  3. Tue May 22 22:14:16 2018 SIGUSR1[soft,connection-reset] received, process restarting
  4. Tue May 22 22:14:16 2018 Restart pause, 1 second(s)
  5.  
  6. Tue May 22 22:14:17 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  7. Tue May 22 22:14:17 2018 Attempting to establish TCP connection with [AF_INET]5.135.109.189:443 [nonblock]
  8.  
  9. Tue May 22 22:14:18 2018 TCP connection established with [AF_INET]5.135.109.189:443
  10. Tue May 22 22:14:18 2018 TCPv4_CLIENT link local: [undef]
  11. Tue May 22 22:14:18 2018 TCPv4_CLIENT link remote: [AF_INET]5.135.109.189:443
  12. Tue May 22 22:14:18 2018 TLS: Initial packet from [AF_INET]5.135.109.189:443, sid=f076bdfd ca590425
  13.  
  14. Tue May 22 22:14:18 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
  15. Tue May 22 22:14:18 2018 VERIFY OK: nsCertType=SERVER
  16. Tue May 22 22:14:18 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
  17.  
  18. Tue May 22 22:14:19 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  19. Tue May 22 22:14:19 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  20. Tue May 22 22:14:19 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  21. Tue May 22 22:14:19 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  22. Tue May 22 22:14:19 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  23. Tue May 22 22:14:19 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.189:443
  24.  
  25. Tue May 22 22:14:21 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
  26.  
  27. Tue May 22 22:14:21 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.0.1,dhcp-option WINS 10.10.0.1,route 10.10.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.10.1.38 10.10.1.37'
  28. Tue May 22 22:14:21 2018 OPTIONS IMPORT: --socket-flags option modified
  29. Tue May 22 22:14:21 2018 OPTIONS IMPORT: --ifconfig/up options modified
  30. Tue May 22 22:14:21 2018 OPTIONS IMPORT: route options modified
  31. Tue May 22 22:14:21 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  32. Tue May 22 22:14:21 2018 Preserving previous TUN/TAP instance: FrozenWay
  33. Tue May 22 22:14:21 2018 Initialization Sequence Completed
  34.  
  35. ___________________________________________________________________________________
  36.  
  37. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  38. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  39. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  40. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  41. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  42. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  43. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  44. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  45. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  46. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  47. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  48. Tue May 22 21:01:11 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  49. Tue May 22 21:01:11 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
  50. Tue May 22 21:01:11 2018 Connection reset, restarting [-1]
  51. Tue May 22 21:01:11 2018 SIGUSR1[soft,connection-reset] received, process restarting
  52. Tue May 22 21:01:11 2018 Restart pause, 1 second(s)
  53.  
  54. Tue May 22 21:01:12 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  55. Tue May 22 21:01:12 2018 Attempting to establish TCP connection with [AF_INET]5.135.109.189:443 [nonblock]
  56.  
  57. Tue May 22 21:01:13 2018 TCP connection established with [AF_INET]5.135.109.189:443
  58. Tue May 22 21:01:13 2018 TCPv4_CLIENT link local: [undef]
  59. Tue May 22 21:01:13 2018 TCPv4_CLIENT link remote: [AF_INET]5.135.109.189:443
  60. Tue May 22 21:01:13 2018 TLS: Initial packet from [AF_INET]5.135.109.189:443, sid=6153f043 bcd42c4b
  61.  
  62. Tue May 22 21:01:13 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
  63. Tue May 22 21:01:13 2018 VERIFY OK: nsCertType=SERVER
  64. Tue May 22 21:01:13 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
  65. Tue May 22 21:01:13 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  66. Tue May 22 21:01:13 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  67. Tue May 22 21:01:13 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  68. Tue May 22 21:01:13 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  69. Tue May 22 21:01:13 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  70. Tue May 22 21:01:13 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.189:443
  71.  
  72. Tue May 22 21:01:15 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
  73. Tue May 22 21:01:15 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.0.1,dhcp-option WINS 10.10.0.1,route 10.10.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.10.1.38 10.10.1.37'
  74. Tue May 22 21:01:15 2018 OPTIONS IMPORT: --socket-flags option modified
  75. Tue May 22 21:01:15 2018 OPTIONS IMPORT: --ifconfig/up options modified
  76. Tue May 22 21:01:15 2018 OPTIONS IMPORT: route options modified
  77. Tue May 22 21:01:15 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  78. Tue May 22 21:01:15 2018 Preserving previous TUN/TAP instance: FrozenWay
  79. Tue May 22 21:01:15 2018 Initialization Sequence Completed
  80.  
  81. _________________________________________________________________________
  82.  
  83. Tue May 22 20:42:26 2018 write TCPv4_CLIENT: Connection reset by peer (WSAECONNRESET) (code=10054)
  84. Tue May 22 20:42:26 2018 read TCPv4_CLIENT: Connection timed out (WSAETIMEDOUT) (code=10060)
  85. Tue May 22 20:42:26 2018 Connection reset, restarting [-1]
  86. Tue May 22 20:42:26 2018 SIGUSR1[soft,connection-reset] received, process restarting
  87. Tue May 22 20:42:26 2018 Restart pause, 1 second(s)
  88.  
  89. Tue May 22 20:42:27 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
  90. Tue May 22 20:42:27 2018 Attempting to establish TCP connection with [AF_INET]5.135.109.189:443 [nonblock]
  91.  
  92. Tue May 22 20:42:28 2018 TCP connection established with [AF_INET]5.135.109.189:443
  93. Tue May 22 20:42:28 2018 TCPv4_CLIENT link local: [undef]
  94. Tue May 22 20:42:28 2018 TCPv4_CLIENT link remote: [AF_INET]5.135.109.189:443
  95. Tue May 22 20:42:28 2018 TLS: Initial packet from [AF_INET]5.135.109.189:443, sid=efd8c69a 3345d7e5
  96.  
  97. Tue May 22 20:42:29 2018 VERIFY OK: depth=1, C=FR, ST=France, L=Paris, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
  98. Tue May 22 20:42:29 2018 VERIFY OK: nsCertType=SERVER
  99. Tue May 22 20:42:29 2018 VERIFY OK: depth=0, C=FR, ST=France, O=FrozenWay, OU=FrozenWay, CN=FrozenWay, emailAddress=admin@frozenway.com
  100.  
  101. Tue May 22 20:42:29 2018 Data Channel Encrypt: Cipher 'BF-CBC' initialized with 128 bit key
  102. Tue May 22 20:42:29 2018 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  103. Tue May 22 20:42:29 2018 Data Channel Decrypt: Cipher 'BF-CBC' initialized with 128 bit key
  104. Tue May 22 20:42:29 2018 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  105. Tue May 22 20:42:29 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
  106. Tue May 22 20:42:29 2018 [FrozenWay] Peer Connection Initiated with [AF_INET]5.135.109.189:443
  107.  
  108. Tue May 22 20:42:31 2018 SENT CONTROL [FrozenWay]: 'PUSH_REQUEST' (status=1)
  109. Tue May 22 20:42:31 2018 PUSH: Received control message: 'PUSH_REPLY,dhcp-option DNS 10.10.0.1,dhcp-option WINS 10.10.0.1,route 10.10.0.1,topology net30,socket-flags TCP_NODELAY,ifconfig 10.10.1.38 10.10.1.37'
  110. Tue May 22 20:42:31 2018 OPTIONS IMPORT: --socket-flags option modified
  111. Tue May 22 20:42:31 2018 OPTIONS IMPORT: --ifconfig/up options modified
  112. Tue May 22 20:42:31 2018 OPTIONS IMPORT: route options modified
  113. Tue May 22 20:42:31 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  114. Tue May 22 20:42:31 2018 Preserving previous TUN/TAP instance: FrozenWay
  115. Tue May 22 20:42:31 2018 Initialization Sequence Completed
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement