Advertisement
Guest User

Log

a guest
Apr 8th, 2019
600
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 101.70 KB | None | 0 0
  1. 08-04-2019 09:05:54 Application version 1.5.9 started
  2. 08-04-2019 08:16:06 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  3. 08-04-2019 08:16:07 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  4. 08-04-2019 08:16:07 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  5. 08-04-2019 08:16:07 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  6. 08-04-2019 08:16:07 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  7. 08-04-2019 08:16:07 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  8. 08-04-2019 08:16:07 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  9. 08-04-2019 08:16:07 MANAGEMENT: >STATE:1554700566,TCP_CONNECT,,,,,,
  10. 08-04-2019 08:16:07 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  11. 08-04-2019 08:16:08 TCP connection established with [AF_INET]149.154.154.61:995
  12. 08-04-2019 08:16:08 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  13. 08-04-2019 08:16:08 TCP_CLIENT link local: (not bound)
  14. 08-04-2019 08:16:08 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  15. 08-04-2019 08:16:08 MANAGEMENT: >STATE:1554700568,WAIT,,,,,,
  16. 08-04-2019 08:16:08 Scrambler: disabled by config
  17. 08-04-2019 08:16:08 MANAGEMENT: >STATE:1554700568,AUTH,,,,,,
  18. 08-04-2019 08:16:08 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=2e636e10 c75f6fd9
  19. 08-04-2019 08:16:08 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  20. 08-04-2019 08:16:08 VERIFY OK: nsCertType=SERVER
  21. 08-04-2019 08:16:08 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  22. 08-04-2019 08:16:08 Connection reset, restarting [0]
  23. 08-04-2019 08:16:08 TCP/UDP: Closing socket
  24. 08-04-2019 08:16:09 SIGUSR1[soft,connection-reset] received, process restarting
  25. 08-04-2019 08:16:09 MANAGEMENT: >STATE:1554700568,RECONNECTING,connection-reset,,,,,
  26. 08-04-2019 08:16:12 MANAGEMENT: CMD 'hold release'
  27. 08-04-2019 08:16:12 MANAGEMENT: CMD 'bytecount 2'
  28. 08-04-2019 08:16:12 MANAGEMENT: CMD 'state on'
  29. 08-04-2019 08:16:12 MANAGEMENT: CMD 'proxy NONE'
  30. 08-04-2019 08:16:13 MANAGEMENT: Client disconnected
  31. 08-04-2019 08:16:13 All connections have been connect-retry-max (5) times unsuccessful, exiting
  32. 08-04-2019 08:16:13 Exiting due to fatal error
  33. 08-04-2019 08:16:13 Process exited with exit value 1
  34. 08-04-2019 08:16:18 Создание конфигурации…
  35. 08-04-2019 08:16:18 started Socket Thread
  36. 08-04-2019 08:16:18 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  37. 08-04-2019 08:16:18 Current Parameter Settings:
  38. 08-04-2019 08:16:18 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  39. 08-04-2019 08:16:18 mode = 0
  40. 08-04-2019 08:16:18 show_ciphers = DISABLED
  41. 08-04-2019 08:16:18 show_digests = DISABLED
  42. 08-04-2019 08:16:18 show_engines = DISABLED
  43. 08-04-2019 08:16:18 genkey = DISABLED
  44. 08-04-2019 08:16:18 key_pass_file = '[UNDEF]'
  45. 08-04-2019 08:16:18 show_tls_ciphers = DISABLED
  46. 08-04-2019 08:16:18 connect_retry_max = 5
  47. 08-04-2019 08:16:18 Connection profiles [0]:
  48. 08-04-2019 08:16:18 proto = tcp-client
  49. 08-04-2019 08:16:18 local = '[UNDEF]'
  50. 08-04-2019 08:16:18 local_port = '[UNDEF]'
  51. 08-04-2019 08:16:18 remote = '149.154.154.61'
  52. 08-04-2019 08:16:18 remote_port = '995'
  53. 08-04-2019 08:16:18 remote_float = DISABLED
  54. 08-04-2019 08:16:18 bind_defined = DISABLED
  55. 08-04-2019 08:16:18 bind_local = DISABLED
  56. 08-04-2019 08:16:18 bind_ipv6_only = DISABLED
  57. 08-04-2019 08:16:18 NOTE: --mute triggered...
  58. 08-04-2019 08:16:18 164 variation(s) on previous 20 message(s) suppressed by --mute
  59. 08-04-2019 08:16:18 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  60. 08-04-2019 08:16:18 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  61. 08-04-2019 08:16:18 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  62. 08-04-2019 08:16:18 MANAGEMENT: CMD 'hold release'
  63. 08-04-2019 08:16:18 MANAGEMENT: CMD 'bytecount 2'
  64. 08-04-2019 08:16:18 MANAGEMENT: CMD 'state on'
  65. 08-04-2019 08:16:18 MANAGEMENT: CMD 'proxy NONE'
  66. 08-04-2019 08:16:19 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  67. 08-04-2019 08:16:19 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  68. 08-04-2019 08:16:19 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  69. 08-04-2019 08:16:19 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  70. 08-04-2019 08:16:19 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  71. 08-04-2019 08:16:19 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  72. 08-04-2019 08:16:19 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  73. 08-04-2019 08:16:19 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  74. 08-04-2019 08:16:19 MANAGEMENT: >STATE:1554700579,TCP_CONNECT,,,,,,
  75. 08-04-2019 08:16:19 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  76. 08-04-2019 08:16:20 TCP connection established with [AF_INET]149.154.154.61:995
  77. 08-04-2019 08:16:20 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  78. 08-04-2019 08:16:20 TCP_CLIENT link local: (not bound)
  79. 08-04-2019 08:16:20 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  80. 08-04-2019 08:16:20 MANAGEMENT: >STATE:1554700580,WAIT,,,,,,
  81. 08-04-2019 08:16:20 Scrambler: disabled by config
  82. 08-04-2019 08:16:20 MANAGEMENT: >STATE:1554700580,AUTH,,,,,,
  83. 08-04-2019 08:16:20 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=d212c5da d247b20b
  84. 08-04-2019 08:16:21 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  85. 08-04-2019 08:16:21 VERIFY OK: nsCertType=SERVER
  86. 08-04-2019 08:16:21 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  87. 08-04-2019 08:16:21 Connection reset, restarting [0]
  88. 08-04-2019 08:16:21 TCP/UDP: Closing socket
  89. 08-04-2019 08:16:21 SIGUSR1[soft,connection-reset] received, process restarting
  90. 08-04-2019 08:16:21 MANAGEMENT: >STATE:1554700581,RECONNECTING,connection-reset,,,,,
  91. 08-04-2019 08:16:24 MANAGEMENT: CMD 'hold release'
  92. 08-04-2019 08:16:24 MANAGEMENT: CMD 'bytecount 2'
  93. 08-04-2019 08:16:24 MANAGEMENT: CMD 'state on'
  94. 08-04-2019 08:16:24 MANAGEMENT: CMD 'proxy NONE'
  95. 08-04-2019 08:16:25 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  96. 08-04-2019 08:16:25 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  97. 08-04-2019 08:16:25 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  98. 08-04-2019 08:16:25 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  99. 08-04-2019 08:16:25 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  100. 08-04-2019 08:16:25 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  101. 08-04-2019 08:16:25 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  102. 08-04-2019 08:16:25 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  103. 08-04-2019 08:16:25 MANAGEMENT: >STATE:1554700585,TCP_CONNECT,,,,,,
  104. 08-04-2019 08:16:25 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  105. 08-04-2019 08:16:26 TCP connection established with [AF_INET]149.154.154.61:995
  106. 08-04-2019 08:16:26 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  107. 08-04-2019 08:16:26 TCP_CLIENT link local: (not bound)
  108. 08-04-2019 08:16:26 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  109. 08-04-2019 08:16:26 MANAGEMENT: >STATE:1554700586,WAIT,,,,,,
  110. 08-04-2019 08:16:26 Scrambler: disabled by config
  111. 08-04-2019 08:16:26 MANAGEMENT: >STATE:1554700586,AUTH,,,,,,
  112. 08-04-2019 08:16:26 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=f4e078ea 939af4cf
  113. 08-04-2019 08:16:27 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  114. 08-04-2019 08:16:27 VERIFY OK: nsCertType=SERVER
  115. 08-04-2019 08:16:27 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  116. 08-04-2019 08:16:27 Connection reset, restarting [0]
  117. 08-04-2019 08:16:27 TCP/UDP: Closing socket
  118. 08-04-2019 08:16:27 SIGUSR1[soft,connection-reset] received, process restarting
  119. 08-04-2019 08:16:27 MANAGEMENT: >STATE:1554700587,RECONNECTING,connection-reset,,,,,
  120. 08-04-2019 08:16:30 MANAGEMENT: CMD 'hold release'
  121. 08-04-2019 08:16:30 MANAGEMENT: CMD 'bytecount 2'
  122. 08-04-2019 08:16:30 MANAGEMENT: CMD 'state on'
  123. 08-04-2019 08:16:30 MANAGEMENT: CMD 'proxy NONE'
  124. 08-04-2019 08:16:31 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  125. 08-04-2019 08:16:31 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  126. 08-04-2019 08:16:32 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  127. 08-04-2019 08:16:32 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  128. 08-04-2019 08:16:32 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  129. 08-04-2019 08:16:32 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  130. 08-04-2019 08:16:32 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  131. 08-04-2019 08:16:32 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  132. 08-04-2019 08:16:32 MANAGEMENT: >STATE:1554700591,TCP_CONNECT,,,,,,
  133. 08-04-2019 08:16:32 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  134. 08-04-2019 08:16:33 TCP connection established with [AF_INET]149.154.154.61:995
  135. 08-04-2019 08:16:33 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  136. 08-04-2019 08:16:33 TCP_CLIENT link local: (not bound)
  137. 08-04-2019 08:16:33 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  138. 08-04-2019 08:16:33 MANAGEMENT: >STATE:1554700593,WAIT,,,,,,
  139. 08-04-2019 08:16:33 Scrambler: disabled by config
  140. 08-04-2019 08:16:33 MANAGEMENT: >STATE:1554700593,AUTH,,,,,,
  141. 08-04-2019 08:16:33 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=46ff8c4e b463f0c1
  142. 08-04-2019 08:16:33 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  143. 08-04-2019 08:16:33 VERIFY OK: nsCertType=SERVER
  144. 08-04-2019 08:16:33 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  145. 08-04-2019 08:16:34 Connection reset, restarting [0]
  146. 08-04-2019 08:16:34 TCP/UDP: Closing socket
  147. 08-04-2019 08:16:34 SIGUSR1[soft,connection-reset] received, process restarting
  148. 08-04-2019 08:16:34 MANAGEMENT: >STATE:1554700594,RECONNECTING,connection-reset,,,,,
  149. 08-04-2019 08:16:37 MANAGEMENT: CMD 'hold release'
  150. 08-04-2019 08:16:37 MANAGEMENT: CMD 'bytecount 2'
  151. 08-04-2019 08:16:37 MANAGEMENT: CMD 'state on'
  152. 08-04-2019 08:16:37 MANAGEMENT: CMD 'proxy NONE'
  153. 08-04-2019 08:16:38 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  154. 08-04-2019 08:16:38 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  155. 08-04-2019 08:16:38 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  156. 08-04-2019 08:16:38 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  157. 08-04-2019 08:16:38 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  158. 08-04-2019 08:16:38 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  159. 08-04-2019 08:16:38 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  160. 08-04-2019 08:16:38 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  161. 08-04-2019 08:16:38 MANAGEMENT: >STATE:1554700598,TCP_CONNECT,,,,,,
  162. 08-04-2019 08:16:38 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  163. 08-04-2019 08:16:39 TCP connection established with [AF_INET]149.154.154.61:995
  164. 08-04-2019 08:16:39 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  165. 08-04-2019 08:16:39 TCP_CLIENT link local: (not bound)
  166. 08-04-2019 08:16:39 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  167. 08-04-2019 08:16:39 MANAGEMENT: >STATE:1554700599,WAIT,,,,,,
  168. 08-04-2019 08:16:39 Scrambler: disabled by config
  169. 08-04-2019 08:16:39 MANAGEMENT: >STATE:1554700599,AUTH,,,,,,
  170. 08-04-2019 08:16:39 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=0d7192fd cd99c0e0
  171. 08-04-2019 08:16:40 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  172. 08-04-2019 08:16:40 VERIFY OK: nsCertType=SERVER
  173. 08-04-2019 08:16:40 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  174. 08-04-2019 08:16:40 Connection reset, restarting [0]
  175. 08-04-2019 08:16:40 TCP/UDP: Closing socket
  176. 08-04-2019 08:16:40 SIGUSR1[soft,connection-reset] received, process restarting
  177. 08-04-2019 08:16:40 MANAGEMENT: >STATE:1554700600,RECONNECTING,connection-reset,,,,,
  178. 08-04-2019 08:16:43 MANAGEMENT: CMD 'hold release'
  179. 08-04-2019 08:16:43 MANAGEMENT: CMD 'bytecount 2'
  180. 08-04-2019 08:16:43 MANAGEMENT: CMD 'state on'
  181. 08-04-2019 08:16:43 MANAGEMENT: CMD 'proxy NONE'
  182. 08-04-2019 08:16:44 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  183. 08-04-2019 08:16:44 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  184. 08-04-2019 08:16:44 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  185. 08-04-2019 08:16:44 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  186. 08-04-2019 08:16:44 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  187. 08-04-2019 08:16:44 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  188. 08-04-2019 08:16:44 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  189. 08-04-2019 08:16:44 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  190. 08-04-2019 08:16:44 MANAGEMENT: >STATE:1554700604,TCP_CONNECT,,,,,,
  191. 08-04-2019 08:16:44 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  192. 08-04-2019 08:16:45 TCP connection established with [AF_INET]149.154.154.61:995
  193. 08-04-2019 08:16:45 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  194. 08-04-2019 08:16:45 TCP_CLIENT link local: (not bound)
  195. 08-04-2019 08:16:45 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  196. 08-04-2019 08:16:45 MANAGEMENT: >STATE:1554700605,WAIT,,,,,,
  197. 08-04-2019 08:16:45 Scrambler: disabled by config
  198. 08-04-2019 08:16:46 MANAGEMENT: >STATE:1554700606,AUTH,,,,,,
  199. 08-04-2019 08:16:46 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=5ac3284a 0cecc972
  200. 08-04-2019 08:16:46 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  201. 08-04-2019 08:16:46 VERIFY OK: nsCertType=SERVER
  202. 08-04-2019 08:16:46 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  203. 08-04-2019 08:16:46 Connection reset, restarting [0]
  204. 08-04-2019 08:16:46 TCP/UDP: Closing socket
  205. 08-04-2019 08:16:46 SIGUSR1[soft,connection-reset] received, process restarting
  206. 08-04-2019 08:16:46 MANAGEMENT: >STATE:1554700606,RECONNECTING,connection-reset,,,,,
  207. 08-04-2019 08:16:49 MANAGEMENT: CMD 'hold release'
  208. 08-04-2019 08:16:49 MANAGEMENT: CMD 'bytecount 2'
  209. 08-04-2019 08:16:49 MANAGEMENT: CMD 'state on'
  210. 08-04-2019 08:16:49 MANAGEMENT: CMD 'proxy NONE'
  211. 08-04-2019 08:16:50 MANAGEMENT: Client disconnected
  212. 08-04-2019 08:16:50 All connections have been connect-retry-max (5) times unsuccessful, exiting
  213. 08-04-2019 08:16:50 Exiting due to fatal error
  214. 08-04-2019 08:16:50 Process exited with exit value 1
  215. 08-04-2019 08:16:56 Создание конфигурации…
  216. 08-04-2019 08:16:56 started Socket Thread
  217. 08-04-2019 08:16:56 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  218. 08-04-2019 08:16:56 Current Parameter Settings:
  219. 08-04-2019 08:16:56 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  220. 08-04-2019 08:16:56 mode = 0
  221. 08-04-2019 08:16:56 show_ciphers = DISABLED
  222. 08-04-2019 08:16:56 show_digests = DISABLED
  223. 08-04-2019 08:16:56 show_engines = DISABLED
  224. 08-04-2019 08:16:56 genkey = DISABLED
  225. 08-04-2019 08:16:56 key_pass_file = '[UNDEF]'
  226. 08-04-2019 08:16:56 show_tls_ciphers = DISABLED
  227. 08-04-2019 08:16:56 connect_retry_max = 5
  228. 08-04-2019 08:16:56 Connection profiles [0]:
  229. 08-04-2019 08:16:56 proto = tcp-client
  230. 08-04-2019 08:16:56 local = '[UNDEF]'
  231. 08-04-2019 08:16:56 local_port = '[UNDEF]'
  232. 08-04-2019 08:16:56 remote = '149.154.154.61'
  233. 08-04-2019 08:16:56 remote_port = '995'
  234. 08-04-2019 08:16:56 remote_float = DISABLED
  235. 08-04-2019 08:16:56 bind_defined = DISABLED
  236. 08-04-2019 08:16:56 bind_local = DISABLED
  237. 08-04-2019 08:16:56 bind_ipv6_only = DISABLED
  238. 08-04-2019 08:16:56 NOTE: --mute triggered...
  239. 08-04-2019 08:16:56 164 variation(s) on previous 20 message(s) suppressed by --mute
  240. 08-04-2019 08:16:56 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  241. 08-04-2019 08:16:56 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  242. 08-04-2019 08:16:56 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  243. 08-04-2019 08:16:56 MANAGEMENT: CMD 'hold release'
  244. 08-04-2019 08:16:56 MANAGEMENT: CMD 'bytecount 2'
  245. 08-04-2019 08:16:56 MANAGEMENT: CMD 'state on'
  246. 08-04-2019 08:16:56 MANAGEMENT: CMD 'proxy NONE'
  247. 08-04-2019 08:16:57 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  248. 08-04-2019 08:16:57 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  249. 08-04-2019 08:16:57 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  250. 08-04-2019 08:16:57 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  251. 08-04-2019 08:16:57 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  252. 08-04-2019 08:16:57 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  253. 08-04-2019 08:16:57 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  254. 08-04-2019 08:16:57 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  255. 08-04-2019 08:16:57 MANAGEMENT: >STATE:1554700617,TCP_CONNECT,,,,,,
  256. 08-04-2019 08:16:57 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  257. 08-04-2019 08:16:58 TCP connection established with [AF_INET]149.154.154.61:995
  258. 08-04-2019 08:16:58 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  259. 08-04-2019 08:16:58 TCP_CLIENT link local: (not bound)
  260. 08-04-2019 08:16:58 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  261. 08-04-2019 08:16:58 MANAGEMENT: >STATE:1554700618,WAIT,,,,,,
  262. 08-04-2019 08:16:58 Scrambler: disabled by config
  263. 08-04-2019 08:16:58 MANAGEMENT: >STATE:1554700618,AUTH,,,,,,
  264. 08-04-2019 08:16:58 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=9ec328fc de9115b0
  265. 08-04-2019 08:16:59 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  266. 08-04-2019 08:16:59 VERIFY OK: nsCertType=SERVER
  267. 08-04-2019 08:16:59 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  268. 08-04-2019 08:16:59 Connection reset, restarting [0]
  269. 08-04-2019 08:16:59 TCP/UDP: Closing socket
  270. 08-04-2019 08:16:59 SIGUSR1[soft,connection-reset] received, process restarting
  271. 08-04-2019 08:16:59 MANAGEMENT: >STATE:1554700619,RECONNECTING,connection-reset,,,,,
  272. 08-04-2019 08:17:02 MANAGEMENT: CMD 'hold release'
  273. 08-04-2019 08:17:02 MANAGEMENT: CMD 'bytecount 2'
  274. 08-04-2019 08:17:02 MANAGEMENT: CMD 'state on'
  275. 08-04-2019 08:17:02 MANAGEMENT: CMD 'proxy NONE'
  276. 08-04-2019 08:17:03 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  277. 08-04-2019 08:17:03 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  278. 08-04-2019 08:17:03 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  279. 08-04-2019 08:17:03 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  280. 08-04-2019 08:17:03 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  281. 08-04-2019 08:17:03 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  282. 08-04-2019 08:17:03 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  283. 08-04-2019 08:17:03 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  284. 08-04-2019 08:17:03 MANAGEMENT: >STATE:1554700623,TCP_CONNECT,,,,,,
  285. 08-04-2019 08:17:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  286. 08-04-2019 08:17:04 TCP connection established with [AF_INET]149.154.154.61:995
  287. 08-04-2019 08:17:04 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  288. 08-04-2019 08:17:04 TCP_CLIENT link local: (not bound)
  289. 08-04-2019 08:17:04 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  290. 08-04-2019 08:17:04 MANAGEMENT: >STATE:1554700624,WAIT,,,,,,
  291. 08-04-2019 08:17:04 Scrambler: disabled by config
  292. 08-04-2019 08:17:04 MANAGEMENT: >STATE:1554700624,AUTH,,,,,,
  293. 08-04-2019 08:17:04 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=3e526a44 54c5be43
  294. 08-04-2019 08:17:04 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  295. 08-04-2019 08:17:05 VERIFY OK: nsCertType=SERVER
  296. 08-04-2019 08:17:05 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  297. 08-04-2019 08:17:05 Connection reset, restarting [0]
  298. 08-04-2019 08:17:05 TCP/UDP: Closing socket
  299. 08-04-2019 08:17:05 SIGUSR1[soft,connection-reset] received, process restarting
  300. 08-04-2019 08:17:05 MANAGEMENT: >STATE:1554700625,RECONNECTING,connection-reset,,,,,
  301. 08-04-2019 08:17:08 MANAGEMENT: CMD 'hold release'
  302. 08-04-2019 08:17:08 MANAGEMENT: CMD 'bytecount 2'
  303. 08-04-2019 08:17:08 MANAGEMENT: CMD 'state on'
  304. 08-04-2019 08:17:08 MANAGEMENT: CMD 'proxy NONE'
  305. 08-04-2019 08:17:09 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  306. 08-04-2019 08:17:09 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  307. 08-04-2019 08:17:09 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  308. 08-04-2019 08:17:09 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  309. 08-04-2019 08:17:09 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  310. 08-04-2019 08:17:09 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  311. 08-04-2019 08:17:09 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  312. 08-04-2019 08:17:09 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  313. 08-04-2019 08:17:09 MANAGEMENT: >STATE:1554700629,TCP_CONNECT,,,,,,
  314. 08-04-2019 08:17:09 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  315. 08-04-2019 08:17:10 TCP connection established with [AF_INET]149.154.154.61:995
  316. 08-04-2019 08:17:10 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  317. 08-04-2019 08:17:10 TCP_CLIENT link local: (not bound)
  318. 08-04-2019 08:17:10 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  319. 08-04-2019 08:17:10 MANAGEMENT: >STATE:1554700630,WAIT,,,,,,
  320. 08-04-2019 08:17:10 Scrambler: disabled by config
  321. 08-04-2019 08:17:10 MANAGEMENT: >STATE:1554700630,AUTH,,,,,,
  322. 08-04-2019 08:17:10 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=cef54716 9c26bd51
  323. 08-04-2019 08:17:11 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  324. 08-04-2019 08:17:11 VERIFY OK: nsCertType=SERVER
  325. 08-04-2019 08:17:11 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  326. 08-04-2019 08:17:11 Connection reset, restarting [0]
  327. 08-04-2019 08:17:11 TCP/UDP: Closing socket
  328. 08-04-2019 08:17:11 SIGUSR1[soft,connection-reset] received, process restarting
  329. 08-04-2019 08:17:11 MANAGEMENT: >STATE:1554700631,RECONNECTING,connection-reset,,,,,
  330. 08-04-2019 08:17:14 MANAGEMENT: CMD 'hold release'
  331. 08-04-2019 08:17:14 MANAGEMENT: CMD 'bytecount 2'
  332. 08-04-2019 08:17:14 MANAGEMENT: CMD 'state on'
  333. 08-04-2019 08:17:14 MANAGEMENT: CMD 'proxy NONE'
  334. 08-04-2019 08:17:15 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  335. 08-04-2019 08:17:15 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  336. 08-04-2019 08:17:15 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  337. 08-04-2019 08:17:15 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  338. 08-04-2019 08:17:15 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  339. 08-04-2019 08:17:15 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  340. 08-04-2019 08:17:15 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  341. 08-04-2019 08:17:15 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  342. 08-04-2019 08:17:15 MANAGEMENT: >STATE:1554700635,TCP_CONNECT,,,,,,
  343. 08-04-2019 08:17:15 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  344. 08-04-2019 08:17:16 TCP connection established with [AF_INET]149.154.154.61:995
  345. 08-04-2019 08:17:16 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  346. 08-04-2019 08:17:16 TCP_CLIENT link local: (not bound)
  347. 08-04-2019 08:17:16 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  348. 08-04-2019 08:17:16 MANAGEMENT: >STATE:1554700636,WAIT,,,,,,
  349. 08-04-2019 08:17:16 Scrambler: disabled by config
  350. 08-04-2019 08:17:17 MANAGEMENT: >STATE:1554700637,AUTH,,,,,,
  351. 08-04-2019 08:17:17 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=15265916 9b75d02f
  352. 08-04-2019 08:17:17 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  353. 08-04-2019 08:17:17 VERIFY OK: nsCertType=SERVER
  354. 08-04-2019 08:17:17 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  355. 08-04-2019 08:17:17 Connection reset, restarting [0]
  356. 08-04-2019 08:17:17 TCP/UDP: Closing socket
  357. 08-04-2019 08:17:17 SIGUSR1[soft,connection-reset] received, process restarting
  358. 08-04-2019 08:17:17 MANAGEMENT: >STATE:1554700637,RECONNECTING,connection-reset,,,,,
  359. 08-04-2019 08:17:20 MANAGEMENT: CMD 'hold release'
  360. 08-04-2019 08:17:20 MANAGEMENT: CMD 'bytecount 2'
  361. 08-04-2019 08:17:20 MANAGEMENT: CMD 'state on'
  362. 08-04-2019 08:17:20 MANAGEMENT: CMD 'proxy NONE'
  363. 08-04-2019 08:17:21 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  364. 08-04-2019 08:17:21 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  365. 08-04-2019 08:17:21 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  366. 08-04-2019 08:17:21 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  367. 08-04-2019 08:17:21 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  368. 08-04-2019 08:17:21 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  369. 08-04-2019 08:17:21 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  370. 08-04-2019 08:17:21 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  371. 08-04-2019 08:17:21 MANAGEMENT: >STATE:1554700641,TCP_CONNECT,,,,,,
  372. 08-04-2019 08:17:21 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  373. 08-04-2019 08:17:22 TCP connection established with [AF_INET]149.154.154.61:995
  374. 08-04-2019 08:17:22 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  375. 08-04-2019 08:17:22 TCP_CLIENT link local: (not bound)
  376. 08-04-2019 08:17:22 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  377. 08-04-2019 08:17:22 MANAGEMENT: >STATE:1554700642,WAIT,,,,,,
  378. 08-04-2019 08:17:22 Scrambler: disabled by config
  379. 08-04-2019 08:17:23 MANAGEMENT: >STATE:1554700643,AUTH,,,,,,
  380. 08-04-2019 08:17:23 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=4450256e 8700eb7a
  381. 08-04-2019 08:17:23 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  382. 08-04-2019 08:17:23 VERIFY OK: nsCertType=SERVER
  383. 08-04-2019 08:17:23 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  384. 08-04-2019 08:17:23 Connection reset, restarting [0]
  385. 08-04-2019 08:17:23 TCP/UDP: Closing socket
  386. 08-04-2019 08:17:23 SIGUSR1[soft,connection-reset] received, process restarting
  387. 08-04-2019 08:17:23 MANAGEMENT: >STATE:1554700643,RECONNECTING,connection-reset,,,,,
  388. 08-04-2019 08:17:26 MANAGEMENT: CMD 'hold release'
  389. 08-04-2019 08:17:26 MANAGEMENT: CMD 'bytecount 2'
  390. 08-04-2019 08:17:26 MANAGEMENT: CMD 'state on'
  391. 08-04-2019 08:17:26 MANAGEMENT: CMD 'proxy NONE'
  392. 08-04-2019 08:17:27 MANAGEMENT: Client disconnected
  393. 08-04-2019 08:17:27 All connections have been connect-retry-max (5) times unsuccessful, exiting
  394. 08-04-2019 08:17:27 Exiting due to fatal error
  395. 08-04-2019 08:17:27 Process exited with exit value 1
  396. 08-04-2019 08:17:33 Создание конфигурации…
  397. 08-04-2019 08:17:33 started Socket Thread
  398. 08-04-2019 08:17:33 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  399. 08-04-2019 08:17:33 Current Parameter Settings:
  400. 08-04-2019 08:17:33 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  401. 08-04-2019 08:17:33 mode = 0
  402. 08-04-2019 08:17:33 show_ciphers = DISABLED
  403. 08-04-2019 08:17:33 show_digests = DISABLED
  404. 08-04-2019 08:17:33 show_engines = DISABLED
  405. 08-04-2019 08:17:33 genkey = DISABLED
  406. 08-04-2019 08:17:33 key_pass_file = '[UNDEF]'
  407. 08-04-2019 08:17:33 show_tls_ciphers = DISABLED
  408. 08-04-2019 08:17:33 connect_retry_max = 5
  409. 08-04-2019 08:17:33 Connection profiles [0]:
  410. 08-04-2019 08:17:33 proto = tcp-client
  411. 08-04-2019 08:17:33 local = '[UNDEF]'
  412. 08-04-2019 08:17:33 local_port = '[UNDEF]'
  413. 08-04-2019 08:17:33 remote = '149.154.154.61'
  414. 08-04-2019 08:17:33 remote_port = '995'
  415. 08-04-2019 08:17:33 remote_float = DISABLED
  416. 08-04-2019 08:17:33 bind_defined = DISABLED
  417. 08-04-2019 08:17:33 bind_local = DISABLED
  418. 08-04-2019 08:17:33 bind_ipv6_only = DISABLED
  419. 08-04-2019 08:17:33 NOTE: --mute triggered...
  420. 08-04-2019 08:17:33 164 variation(s) on previous 20 message(s) suppressed by --mute
  421. 08-04-2019 08:17:33 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  422. 08-04-2019 08:17:33 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  423. 08-04-2019 08:17:33 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  424. 08-04-2019 08:17:33 MANAGEMENT: CMD 'hold release'
  425. 08-04-2019 08:17:33 MANAGEMENT: CMD 'bytecount 2'
  426. 08-04-2019 08:17:33 MANAGEMENT: CMD 'state on'
  427. 08-04-2019 08:17:33 MANAGEMENT: CMD 'proxy NONE'
  428. 08-04-2019 08:17:34 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  429. 08-04-2019 08:17:34 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  430. 08-04-2019 08:17:34 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  431. 08-04-2019 08:17:34 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  432. 08-04-2019 08:17:34 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  433. 08-04-2019 08:17:34 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  434. 08-04-2019 08:17:34 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  435. 08-04-2019 08:17:34 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  436. 08-04-2019 08:17:34 MANAGEMENT: >STATE:1554700654,TCP_CONNECT,,,,,,
  437. 08-04-2019 08:17:34 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  438. 08-04-2019 08:17:35 TCP connection established with [AF_INET]149.154.154.61:995
  439. 08-04-2019 08:17:35 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  440. 08-04-2019 08:17:35 TCP_CLIENT link local: (not bound)
  441. 08-04-2019 08:17:35 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  442. 08-04-2019 08:17:35 MANAGEMENT: >STATE:1554700655,WAIT,,,,,,
  443. 08-04-2019 08:17:35 Scrambler: disabled by config
  444. 08-04-2019 08:17:35 MANAGEMENT: >STATE:1554700655,AUTH,,,,,,
  445. 08-04-2019 08:17:35 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=d656e62a f625b852
  446. 08-04-2019 08:17:35 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  447. 08-04-2019 08:17:35 VERIFY OK: nsCertType=SERVER
  448. 08-04-2019 08:17:35 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  449. 08-04-2019 08:17:36 Connection reset, restarting [0]
  450. 08-04-2019 08:17:36 TCP/UDP: Closing socket
  451. 08-04-2019 08:17:36 SIGUSR1[soft,connection-reset] received, process restarting
  452. 08-04-2019 08:17:36 MANAGEMENT: >STATE:1554700656,RECONNECTING,connection-reset,,,,,
  453. 08-04-2019 08:17:39 MANAGEMENT: CMD 'hold release'
  454. 08-04-2019 08:17:39 MANAGEMENT: CMD 'bytecount 2'
  455. 08-04-2019 08:17:39 MANAGEMENT: CMD 'state on'
  456. 08-04-2019 08:17:39 MANAGEMENT: CMD 'proxy NONE'
  457. 08-04-2019 08:17:40 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  458. 08-04-2019 08:17:40 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  459. 08-04-2019 08:17:40 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  460. 08-04-2019 08:17:40 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  461. 08-04-2019 08:17:40 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  462. 08-04-2019 08:17:40 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  463. 08-04-2019 08:17:40 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  464. 08-04-2019 08:17:40 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  465. 08-04-2019 08:17:40 MANAGEMENT: >STATE:1554700660,TCP_CONNECT,,,,,,
  466. 08-04-2019 08:17:40 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  467. 08-04-2019 08:17:41 TCP connection established with [AF_INET]149.154.154.61:995
  468. 08-04-2019 08:17:41 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  469. 08-04-2019 08:17:41 TCP_CLIENT link local: (not bound)
  470. 08-04-2019 08:17:41 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  471. 08-04-2019 08:17:41 MANAGEMENT: >STATE:1554700661,WAIT,,,,,,
  472. 08-04-2019 08:17:41 Scrambler: disabled by config
  473. 08-04-2019 08:17:41 MANAGEMENT: >STATE:1554700661,AUTH,,,,,,
  474. 08-04-2019 08:17:41 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=e67b6bee c0428f1e
  475. 08-04-2019 08:17:41 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  476. 08-04-2019 08:17:41 VERIFY OK: nsCertType=SERVER
  477. 08-04-2019 08:17:41 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  478. 08-04-2019 08:17:42 Connection reset, restarting [0]
  479. 08-04-2019 08:17:42 TCP/UDP: Closing socket
  480. 08-04-2019 08:17:42 SIGUSR1[soft,connection-reset] received, process restarting
  481. 08-04-2019 08:17:42 MANAGEMENT: >STATE:1554700662,RECONNECTING,connection-reset,,,,,
  482. 08-04-2019 08:17:45 MANAGEMENT: CMD 'hold release'
  483. 08-04-2019 08:17:45 MANAGEMENT: CMD 'bytecount 2'
  484. 08-04-2019 08:17:45 MANAGEMENT: CMD 'state on'
  485. 08-04-2019 08:17:45 MANAGEMENT: CMD 'proxy NONE'
  486. 08-04-2019 08:17:46 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  487. 08-04-2019 08:17:46 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  488. 08-04-2019 08:17:46 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  489. 08-04-2019 08:17:46 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  490. 08-04-2019 08:17:46 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  491. 08-04-2019 08:17:46 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  492. 08-04-2019 08:17:46 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  493. 08-04-2019 08:17:46 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  494. 08-04-2019 08:17:46 MANAGEMENT: >STATE:1554700666,TCP_CONNECT,,,,,,
  495. 08-04-2019 08:17:46 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  496. 08-04-2019 08:18:57 TCP: connect to [AF_INET]149.154.154.61:995 failed: Connection timed out
  497. 08-04-2019 08:18:57 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  498. 08-04-2019 08:18:57 MANAGEMENT: >STATE:1554700737,RECONNECTING,init_instance,,,,,
  499. 08-04-2019 08:18:57 MANAGEMENT: CMD 'hold release'
  500. 08-04-2019 08:18:57 MANAGEMENT: CMD 'bytecount 2'
  501. 08-04-2019 08:18:57 MANAGEMENT: CMD 'state on'
  502. 08-04-2019 08:18:57 MANAGEMENT: CMD 'proxy NONE'
  503. 08-04-2019 08:18:58 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  504. 08-04-2019 08:18:58 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  505. 08-04-2019 08:18:58 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  506. 08-04-2019 08:18:58 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  507. 08-04-2019 08:18:58 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  508. 08-04-2019 08:18:58 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  509. 08-04-2019 08:18:58 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  510. 08-04-2019 08:18:58 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  511. 08-04-2019 08:18:58 MANAGEMENT: >STATE:1554700738,TCP_CONNECT,,,,,,
  512. 08-04-2019 08:18:58 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  513. 08-04-2019 08:20:50 TCP: connect to [AF_INET]149.154.154.61:995 failed: Connection timed out
  514. 08-04-2019 08:20:50 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  515. 08-04-2019 08:20:50 MANAGEMENT: >STATE:1554700850,RECONNECTING,init_instance,,,,,
  516. 08-04-2019 08:20:50 MANAGEMENT: CMD 'hold release'
  517. 08-04-2019 08:20:50 MANAGEMENT: CMD 'bytecount 2'
  518. 08-04-2019 08:20:50 MANAGEMENT: CMD 'state on'
  519. 08-04-2019 08:20:50 MANAGEMENT: CMD 'proxy NONE'
  520. 08-04-2019 08:20:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  521. 08-04-2019 08:20:51 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  522. 08-04-2019 08:20:51 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  523. 08-04-2019 08:20:51 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  524. 08-04-2019 08:20:51 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  525. 08-04-2019 08:20:51 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  526. 08-04-2019 08:20:51 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  527. 08-04-2019 08:20:51 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  528. 08-04-2019 08:20:51 MANAGEMENT: >STATE:1554700851,TCP_CONNECT,,,,,,
  529. 08-04-2019 08:20:51 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  530. 08-04-2019 08:20:52 TCP connection established with [AF_INET]149.154.154.61:995
  531. 08-04-2019 08:20:52 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  532. 08-04-2019 08:20:52 TCP_CLIENT link local: (not bound)
  533. 08-04-2019 08:20:52 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  534. 08-04-2019 08:20:52 MANAGEMENT: >STATE:1554700852,WAIT,,,,,,
  535. 08-04-2019 08:20:52 Scrambler: disabled by config
  536. 08-04-2019 08:20:53 MANAGEMENT: >STATE:1554700853,AUTH,,,,,,
  537. 08-04-2019 08:20:53 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=cfa692f0 0f3e6725
  538. 08-04-2019 08:20:53 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  539. 08-04-2019 08:20:53 VERIFY OK: nsCertType=SERVER
  540. 08-04-2019 08:20:53 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  541. 08-04-2019 08:20:53 Connection reset, restarting [0]
  542. 08-04-2019 08:20:53 TCP/UDP: Closing socket
  543. 08-04-2019 08:20:53 SIGUSR1[soft,connection-reset] received, process restarting
  544. 08-04-2019 08:20:53 MANAGEMENT: >STATE:1554700853,RECONNECTING,connection-reset,,,,,
  545. 08-04-2019 08:20:56 MANAGEMENT: CMD 'hold release'
  546. 08-04-2019 08:20:56 MANAGEMENT: CMD 'bytecount 2'
  547. 08-04-2019 08:20:56 MANAGEMENT: CMD 'state on'
  548. 08-04-2019 08:20:56 MANAGEMENT: CMD 'proxy NONE'
  549. 08-04-2019 08:20:57 MANAGEMENT: Client disconnected
  550. 08-04-2019 08:20:57 All connections have been connect-retry-max (5) times unsuccessful, exiting
  551. 08-04-2019 08:20:57 Exiting due to fatal error
  552. 08-04-2019 08:20:57 Process exited with exit value 1
  553. 08-04-2019 08:31:24 Background loading servers
  554. 08-04-2019 08:31:24 Создание конфигурации…
  555. 08-04-2019 08:31:24 started Socket Thread
  556. 08-04-2019 08:31:24 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  557. 08-04-2019 08:31:24 Current Parameter Settings:
  558. 08-04-2019 08:31:24 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  559. 08-04-2019 08:31:24 mode = 0
  560. 08-04-2019 08:31:24 show_ciphers = DISABLED
  561. 08-04-2019 08:31:24 show_digests = DISABLED
  562. 08-04-2019 08:31:24 show_engines = DISABLED
  563. 08-04-2019 08:31:24 genkey = DISABLED
  564. 08-04-2019 08:31:24 key_pass_file = '[UNDEF]'
  565. 08-04-2019 08:31:24 show_tls_ciphers = DISABLED
  566. 08-04-2019 08:31:24 connect_retry_max = 5
  567. 08-04-2019 08:31:24 Connection profiles [0]:
  568. 08-04-2019 08:31:24 proto = tcp-client
  569. 08-04-2019 08:31:24 local = '[UNDEF]'
  570. 08-04-2019 08:31:24 local_port = '[UNDEF]'
  571. 08-04-2019 08:31:24 remote = '149.154.154.61'
  572. 08-04-2019 08:31:24 remote_port = '995'
  573. 08-04-2019 08:31:24 remote_float = DISABLED
  574. 08-04-2019 08:31:24 bind_defined = DISABLED
  575. 08-04-2019 08:31:24 bind_local = DISABLED
  576. 08-04-2019 08:31:24 bind_ipv6_only = DISABLED
  577. 08-04-2019 08:31:24 NOTE: --mute triggered...
  578. 08-04-2019 08:31:24 164 variation(s) on previous 20 message(s) suppressed by --mute
  579. 08-04-2019 08:31:24 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  580. 08-04-2019 08:31:24 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  581. 08-04-2019 08:31:24 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  582. 08-04-2019 08:31:24 MANAGEMENT: CMD 'hold release'
  583. 08-04-2019 08:31:24 MANAGEMENT: CMD 'bytecount 2'
  584. 08-04-2019 08:31:24 MANAGEMENT: CMD 'state on'
  585. 08-04-2019 08:31:24 MANAGEMENT: CMD 'proxy NONE'
  586. 08-04-2019 08:31:25 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  587. 08-04-2019 08:31:25 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  588. 08-04-2019 08:31:25 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  589. 08-04-2019 08:31:25 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  590. 08-04-2019 08:31:25 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  591. 08-04-2019 08:31:25 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  592. 08-04-2019 08:31:25 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  593. 08-04-2019 08:31:25 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  594. 08-04-2019 08:31:25 MANAGEMENT: >STATE:1554701485,TCP_CONNECT,,,,,,
  595. 08-04-2019 08:31:25 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  596. 08-04-2019 08:31:26 TCP connection established with [AF_INET]149.154.154.61:995
  597. 08-04-2019 08:31:26 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  598. 08-04-2019 08:31:26 TCP_CLIENT link local: (not bound)
  599. 08-04-2019 08:31:26 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  600. 08-04-2019 08:31:26 MANAGEMENT: >STATE:1554701486,WAIT,,,,,,
  601. 08-04-2019 08:31:26 Scrambler: disabled by config
  602. 08-04-2019 08:31:26 MANAGEMENT: >STATE:1554701486,AUTH,,,,,,
  603. 08-04-2019 08:31:26 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=3f4abf03 39a1739d
  604. 08-04-2019 08:31:26 Servers list received
  605. 08-04-2019 08:31:27 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  606. 08-04-2019 08:31:27 VERIFY OK: nsCertType=SERVER
  607. 08-04-2019 08:31:27 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  608. 08-04-2019 08:31:27 Connection reset, restarting [0]
  609. 08-04-2019 08:31:27 TCP/UDP: Closing socket
  610. 08-04-2019 08:31:27 SIGUSR1[soft,connection-reset] received, process restarting
  611. 08-04-2019 08:31:27 MANAGEMENT: >STATE:1554701487,RECONNECTING,connection-reset,,,,,
  612. 08-04-2019 08:31:30 MANAGEMENT: CMD 'hold release'
  613. 08-04-2019 08:31:30 MANAGEMENT: CMD 'bytecount 2'
  614. 08-04-2019 08:31:30 MANAGEMENT: CMD 'state on'
  615. 08-04-2019 08:31:30 MANAGEMENT: CMD 'proxy NONE'
  616. 08-04-2019 08:31:31 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  617. 08-04-2019 08:31:31 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  618. 08-04-2019 08:31:31 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  619. 08-04-2019 08:31:31 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  620. 08-04-2019 08:31:31 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  621. 08-04-2019 08:31:31 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  622. 08-04-2019 08:31:31 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  623. 08-04-2019 08:31:31 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  624. 08-04-2019 08:31:31 MANAGEMENT: >STATE:1554701491,TCP_CONNECT,,,,,,
  625. 08-04-2019 08:31:31 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  626. 08-04-2019 08:31:32 TCP connection established with [AF_INET]149.154.154.61:995
  627. 08-04-2019 08:31:32 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  628. 08-04-2019 08:31:32 TCP_CLIENT link local: (not bound)
  629. 08-04-2019 08:31:32 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  630. 08-04-2019 08:31:32 MANAGEMENT: >STATE:1554701492,WAIT,,,,,,
  631. 08-04-2019 08:31:32 Scrambler: disabled by config
  632. 08-04-2019 08:31:32 MANAGEMENT: >STATE:1554701492,AUTH,,,,,,
  633. 08-04-2019 08:31:32 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=046f1e7b 8c5b8a28
  634. 08-04-2019 08:31:32 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  635. 08-04-2019 08:31:32 VERIFY OK: nsCertType=SERVER
  636. 08-04-2019 08:31:32 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  637. 08-04-2019 08:31:33 Connection reset, restarting [0]
  638. 08-04-2019 08:31:33 TCP/UDP: Closing socket
  639. 08-04-2019 08:31:33 SIGUSR1[soft,connection-reset] received, process restarting
  640. 08-04-2019 08:31:33 MANAGEMENT: >STATE:1554701493,RECONNECTING,connection-reset,,,,,
  641. 08-04-2019 08:31:36 MANAGEMENT: CMD 'hold release'
  642. 08-04-2019 08:31:36 MANAGEMENT: CMD 'bytecount 2'
  643. 08-04-2019 08:31:36 MANAGEMENT: CMD 'state on'
  644. 08-04-2019 08:31:36 MANAGEMENT: CMD 'proxy NONE'
  645. 08-04-2019 08:31:37 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  646. 08-04-2019 08:31:37 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  647. 08-04-2019 08:31:37 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  648. 08-04-2019 08:31:37 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  649. 08-04-2019 08:31:37 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  650. 08-04-2019 08:31:37 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  651. 08-04-2019 08:31:37 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  652. 08-04-2019 08:31:37 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  653. 08-04-2019 08:31:37 MANAGEMENT: >STATE:1554701497,TCP_CONNECT,,,,,,
  654. 08-04-2019 08:31:37 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  655. 08-04-2019 08:31:38 TCP connection established with [AF_INET]149.154.154.61:995
  656. 08-04-2019 08:31:38 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  657. 08-04-2019 08:31:38 TCP_CLIENT link local: (not bound)
  658. 08-04-2019 08:31:38 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  659. 08-04-2019 08:31:38 MANAGEMENT: >STATE:1554701498,WAIT,,,,,,
  660. 08-04-2019 08:31:38 Scrambler: disabled by config
  661. 08-04-2019 08:31:38 MANAGEMENT: >STATE:1554701498,AUTH,,,,,,
  662. 08-04-2019 08:31:38 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=fac917be 3991e6de
  663. 08-04-2019 08:31:38 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  664. 08-04-2019 08:31:38 VERIFY OK: nsCertType=SERVER
  665. 08-04-2019 08:31:38 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  666. 08-04-2019 08:31:39 Connection reset, restarting [0]
  667. 08-04-2019 08:31:39 TCP/UDP: Closing socket
  668. 08-04-2019 08:31:39 SIGUSR1[soft,connection-reset] received, process restarting
  669. 08-04-2019 08:31:39 MANAGEMENT: >STATE:1554701499,RECONNECTING,connection-reset,,,,,
  670. 08-04-2019 08:31:42 MANAGEMENT: CMD 'hold release'
  671. 08-04-2019 08:31:42 MANAGEMENT: CMD 'bytecount 2'
  672. 08-04-2019 08:31:42 MANAGEMENT: CMD 'state on'
  673. 08-04-2019 08:31:42 MANAGEMENT: CMD 'proxy NONE'
  674. 08-04-2019 08:31:43 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  675. 08-04-2019 08:31:43 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  676. 08-04-2019 08:31:43 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  677. 08-04-2019 08:31:43 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  678. 08-04-2019 08:31:43 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  679. 08-04-2019 08:31:43 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  680. 08-04-2019 08:31:43 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  681. 08-04-2019 08:31:43 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  682. 08-04-2019 08:31:43 MANAGEMENT: >STATE:1554701503,TCP_CONNECT,,,,,,
  683. 08-04-2019 08:31:43 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  684. 08-04-2019 08:31:44 TCP connection established with [AF_INET]149.154.154.61:995
  685. 08-04-2019 08:31:44 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  686. 08-04-2019 08:31:44 TCP_CLIENT link local: (not bound)
  687. 08-04-2019 08:31:44 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  688. 08-04-2019 08:31:44 MANAGEMENT: >STATE:1554701504,WAIT,,,,,,
  689. 08-04-2019 08:31:44 Scrambler: disabled by config
  690. 08-04-2019 08:31:44 MANAGEMENT: >STATE:1554701504,AUTH,,,,,,
  691. 08-04-2019 08:31:44 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=4aa32407 81ed5f85
  692. 08-04-2019 08:31:44 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  693. 08-04-2019 08:31:44 VERIFY OK: nsCertType=SERVER
  694. 08-04-2019 08:31:44 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  695. 08-04-2019 08:31:45 Connection reset, restarting [0]
  696. 08-04-2019 08:31:45 TCP/UDP: Closing socket
  697. 08-04-2019 08:31:45 SIGUSR1[soft,connection-reset] received, process restarting
  698. 08-04-2019 08:31:45 MANAGEMENT: >STATE:1554701505,RECONNECTING,connection-reset,,,,,
  699. 08-04-2019 08:31:48 MANAGEMENT: CMD 'hold release'
  700. 08-04-2019 08:31:48 MANAGEMENT: CMD 'bytecount 2'
  701. 08-04-2019 08:31:48 MANAGEMENT: CMD 'state on'
  702. 08-04-2019 08:31:48 MANAGEMENT: CMD 'proxy NONE'
  703. 08-04-2019 08:31:49 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  704. 08-04-2019 08:31:49 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  705. 08-04-2019 08:31:49 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  706. 08-04-2019 08:31:49 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  707. 08-04-2019 08:31:49 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  708. 08-04-2019 08:31:49 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  709. 08-04-2019 08:31:49 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  710. 08-04-2019 08:31:49 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  711. 08-04-2019 08:31:49 MANAGEMENT: >STATE:1554701509,TCP_CONNECT,,,,,,
  712. 08-04-2019 08:31:49 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  713. 08-04-2019 08:31:49 MANAGEMENT: CMD 'signal SIGINT'
  714. 08-04-2019 08:31:49 TCP/UDP: Closing socket
  715. 08-04-2019 08:31:49 SIGINT[hard,init_instance] received, process exiting
  716. 08-04-2019 08:31:49 MANAGEMENT: >STATE:1554701509,EXITING,init_instance,,,,,
  717. 08-04-2019 08:31:55 Создание конфигурации…
  718. 08-04-2019 08:31:55 started Socket Thread
  719. 08-04-2019 08:31:55 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  720. 08-04-2019 08:31:55 Current Parameter Settings:
  721. 08-04-2019 08:31:55 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  722. 08-04-2019 08:31:55 mode = 0
  723. 08-04-2019 08:31:55 show_ciphers = DISABLED
  724. 08-04-2019 08:31:55 show_digests = DISABLED
  725. 08-04-2019 08:31:55 show_engines = DISABLED
  726. 08-04-2019 08:31:55 genkey = DISABLED
  727. 08-04-2019 08:31:55 key_pass_file = '[UNDEF]'
  728. 08-04-2019 08:31:55 show_tls_ciphers = DISABLED
  729. 08-04-2019 08:31:55 connect_retry_max = 5
  730. 08-04-2019 08:31:55 Connection profiles [0]:
  731. 08-04-2019 08:31:55 proto = tcp-client
  732. 08-04-2019 08:31:55 local = '[UNDEF]'
  733. 08-04-2019 08:31:55 local_port = '[UNDEF]'
  734. 08-04-2019 08:31:55 remote = '149.154.154.61'
  735. 08-04-2019 08:31:55 remote_port = '995'
  736. 08-04-2019 08:31:55 remote_float = DISABLED
  737. 08-04-2019 08:31:55 bind_defined = DISABLED
  738. 08-04-2019 08:31:55 bind_local = DISABLED
  739. 08-04-2019 08:31:55 bind_ipv6_only = DISABLED
  740. 08-04-2019 08:31:56 NOTE: --mute triggered...
  741. 08-04-2019 08:31:56 164 variation(s) on previous 20 message(s) suppressed by --mute
  742. 08-04-2019 08:31:56 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  743. 08-04-2019 08:31:56 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  744. 08-04-2019 08:31:56 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  745. 08-04-2019 08:31:56 MANAGEMENT: CMD 'hold release'
  746. 08-04-2019 08:31:56 MANAGEMENT: CMD 'bytecount 2'
  747. 08-04-2019 08:31:56 MANAGEMENT: CMD 'state on'
  748. 08-04-2019 08:31:56 MANAGEMENT: CMD 'proxy NONE'
  749. 08-04-2019 08:31:56 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  750. 08-04-2019 08:31:57 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  751. 08-04-2019 08:31:57 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  752. 08-04-2019 08:31:57 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  753. 08-04-2019 08:31:57 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  754. 08-04-2019 08:31:57 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  755. 08-04-2019 08:31:57 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  756. 08-04-2019 08:31:57 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  757. 08-04-2019 08:31:57 MANAGEMENT: >STATE:1554701516,TCP_CONNECT,,,,,,
  758. 08-04-2019 08:31:57 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  759. 08-04-2019 08:31:58 TCP connection established with [AF_INET]149.154.154.61:995
  760. 08-04-2019 08:31:58 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  761. 08-04-2019 08:31:58 TCP_CLIENT link local: (not bound)
  762. 08-04-2019 08:31:58 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  763. 08-04-2019 08:31:58 MANAGEMENT: >STATE:1554701518,WAIT,,,,,,
  764. 08-04-2019 08:31:58 Scrambler: disabled by config
  765. 08-04-2019 08:31:58 MANAGEMENT: >STATE:1554701518,AUTH,,,,,,
  766. 08-04-2019 08:31:58 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=fe13d174 5bc6603c
  767. 08-04-2019 08:31:58 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  768. 08-04-2019 08:31:58 VERIFY OK: nsCertType=SERVER
  769. 08-04-2019 08:31:58 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  770. 08-04-2019 08:31:58 Connection reset, restarting [0]
  771. 08-04-2019 08:31:58 TCP/UDP: Closing socket
  772. 08-04-2019 08:31:58 SIGUSR1[soft,connection-reset] received, process restarting
  773. 08-04-2019 08:31:58 MANAGEMENT: >STATE:1554701518,RECONNECTING,connection-reset,,,,,
  774. 08-04-2019 08:32:01 MANAGEMENT: CMD 'hold release'
  775. 08-04-2019 08:32:01 MANAGEMENT: CMD 'bytecount 2'
  776. 08-04-2019 08:32:01 MANAGEMENT: CMD 'state on'
  777. 08-04-2019 08:32:01 MANAGEMENT: CMD 'proxy NONE'
  778. 08-04-2019 08:32:02 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  779. 08-04-2019 08:32:02 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  780. 08-04-2019 08:32:02 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  781. 08-04-2019 08:32:02 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  782. 08-04-2019 08:32:02 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  783. 08-04-2019 08:32:02 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  784. 08-04-2019 08:32:02 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  785. 08-04-2019 08:32:02 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  786. 08-04-2019 08:32:02 MANAGEMENT: >STATE:1554701522,TCP_CONNECT,,,,,,
  787. 08-04-2019 08:32:02 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  788. 08-04-2019 08:32:03 TCP connection established with [AF_INET]149.154.154.61:995
  789. 08-04-2019 08:32:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  790. 08-04-2019 08:32:03 TCP_CLIENT link local: (not bound)
  791. 08-04-2019 08:32:03 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  792. 08-04-2019 08:32:03 MANAGEMENT: >STATE:1554701523,WAIT,,,,,,
  793. 08-04-2019 08:32:03 Scrambler: disabled by config
  794. 08-04-2019 08:32:03 MANAGEMENT: >STATE:1554701523,AUTH,,,,,,
  795. 08-04-2019 08:32:04 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=c89205c3 4607b336
  796. 08-04-2019 08:32:04 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  797. 08-04-2019 08:32:04 VERIFY OK: nsCertType=SERVER
  798. 08-04-2019 08:32:04 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  799. 08-04-2019 08:32:04 Connection reset, restarting [0]
  800. 08-04-2019 08:32:04 TCP/UDP: Closing socket
  801. 08-04-2019 08:32:04 SIGUSR1[soft,connection-reset] received, process restarting
  802. 08-04-2019 08:32:04 MANAGEMENT: >STATE:1554701524,RECONNECTING,connection-reset,,,,,
  803. 08-04-2019 08:32:07 MANAGEMENT: CMD 'hold release'
  804. 08-04-2019 08:32:07 MANAGEMENT: CMD 'bytecount 2'
  805. 08-04-2019 08:32:07 MANAGEMENT: CMD 'state on'
  806. 08-04-2019 08:32:07 MANAGEMENT: CMD 'proxy NONE'
  807. 08-04-2019 08:32:08 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  808. 08-04-2019 08:32:08 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  809. 08-04-2019 08:32:08 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  810. 08-04-2019 08:32:08 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  811. 08-04-2019 08:32:08 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  812. 08-04-2019 08:32:08 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  813. 08-04-2019 08:32:08 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  814. 08-04-2019 08:32:08 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  815. 08-04-2019 08:32:08 MANAGEMENT: >STATE:1554701528,TCP_CONNECT,,,,,,
  816. 08-04-2019 08:32:08 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  817. 08-04-2019 08:32:09 TCP connection established with [AF_INET]149.154.154.61:995
  818. 08-04-2019 08:32:09 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  819. 08-04-2019 08:32:09 TCP_CLIENT link local: (not bound)
  820. 08-04-2019 08:32:09 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  821. 08-04-2019 08:32:09 MANAGEMENT: >STATE:1554701529,WAIT,,,,,,
  822. 08-04-2019 08:32:09 Scrambler: disabled by config
  823. 08-04-2019 08:32:09 MANAGEMENT: >STATE:1554701529,AUTH,,,,,,
  824. 08-04-2019 08:32:09 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=8e3f2554 ea93d1df
  825. 08-04-2019 08:32:10 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  826. 08-04-2019 08:32:10 VERIFY OK: nsCertType=SERVER
  827. 08-04-2019 08:32:10 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  828. 08-04-2019 08:32:10 Connection reset, restarting [0]
  829. 08-04-2019 08:32:10 TCP/UDP: Closing socket
  830. 08-04-2019 08:32:10 SIGUSR1[soft,connection-reset] received, process restarting
  831. 08-04-2019 08:32:10 MANAGEMENT: >STATE:1554701530,RECONNECTING,connection-reset,,,,,
  832. 08-04-2019 08:32:13 MANAGEMENT: CMD 'hold release'
  833. 08-04-2019 08:32:13 MANAGEMENT: CMD 'bytecount 2'
  834. 08-04-2019 08:32:13 MANAGEMENT: CMD 'state on'
  835. 08-04-2019 08:32:13 MANAGEMENT: CMD 'proxy NONE'
  836. 08-04-2019 08:32:14 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  837. 08-04-2019 08:32:14 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  838. 08-04-2019 08:32:14 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  839. 08-04-2019 08:32:14 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  840. 08-04-2019 08:32:14 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  841. 08-04-2019 08:32:14 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  842. 08-04-2019 08:32:14 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  843. 08-04-2019 08:32:14 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  844. 08-04-2019 08:32:14 MANAGEMENT: >STATE:1554701534,TCP_CONNECT,,,,,,
  845. 08-04-2019 08:32:14 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  846. 08-04-2019 08:32:15 TCP connection established with [AF_INET]149.154.154.61:995
  847. 08-04-2019 08:32:15 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  848. 08-04-2019 08:32:15 TCP_CLIENT link local: (not bound)
  849. 08-04-2019 08:32:15 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  850. 08-04-2019 08:32:15 MANAGEMENT: >STATE:1554701535,WAIT,,,,,,
  851. 08-04-2019 08:32:15 Scrambler: disabled by config
  852. 08-04-2019 08:32:15 MANAGEMENT: >STATE:1554701535,AUTH,,,,,,
  853. 08-04-2019 08:32:15 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=6d188e61 d72e4085
  854. 08-04-2019 08:32:16 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  855. 08-04-2019 08:32:16 VERIFY OK: nsCertType=SERVER
  856. 08-04-2019 08:32:16 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  857. 08-04-2019 08:32:16 Connection reset, restarting [0]
  858. 08-04-2019 08:32:16 TCP/UDP: Closing socket
  859. 08-04-2019 08:32:16 SIGUSR1[soft,connection-reset] received, process restarting
  860. 08-04-2019 08:32:16 MANAGEMENT: >STATE:1554701536,RECONNECTING,connection-reset,,,,,
  861. 08-04-2019 08:32:19 MANAGEMENT: CMD 'hold release'
  862. 08-04-2019 08:32:19 MANAGEMENT: CMD 'bytecount 2'
  863. 08-04-2019 08:32:19 MANAGEMENT: CMD 'state on'
  864. 08-04-2019 08:32:19 MANAGEMENT: CMD 'proxy NONE'
  865. 08-04-2019 08:32:20 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  866. 08-04-2019 08:32:20 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  867. 08-04-2019 08:32:20 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  868. 08-04-2019 08:32:20 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  869. 08-04-2019 08:32:20 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  870. 08-04-2019 08:32:20 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  871. 08-04-2019 08:32:20 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  872. 08-04-2019 08:32:20 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  873. 08-04-2019 08:32:20 MANAGEMENT: >STATE:1554701540,TCP_CONNECT,,,,,,
  874. 08-04-2019 08:32:20 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  875. 08-04-2019 08:32:21 TCP connection established with [AF_INET]149.154.154.61:995
  876. 08-04-2019 08:32:21 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  877. 08-04-2019 08:32:21 TCP_CLIENT link local: (not bound)
  878. 08-04-2019 08:32:21 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  879. 08-04-2019 08:32:21 MANAGEMENT: >STATE:1554701541,WAIT,,,,,,
  880. 08-04-2019 08:32:21 Scrambler: disabled by config
  881. 08-04-2019 08:32:21 MANAGEMENT: >STATE:1554701541,AUTH,,,,,,
  882. 08-04-2019 08:32:21 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=76aa2a70 ff3f618c
  883. 08-04-2019 08:32:22 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  884. 08-04-2019 08:32:22 VERIFY OK: nsCertType=SERVER
  885. 08-04-2019 08:32:22 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  886. 08-04-2019 08:32:22 Connection reset, restarting [0]
  887. 08-04-2019 08:32:22 TCP/UDP: Closing socket
  888. 08-04-2019 08:32:22 SIGUSR1[soft,connection-reset] received, process restarting
  889. 08-04-2019 08:32:22 MANAGEMENT: >STATE:1554701542,RECONNECTING,connection-reset,,,,,
  890. 08-04-2019 08:32:25 MANAGEMENT: CMD 'hold release'
  891. 08-04-2019 08:32:25 MANAGEMENT: CMD 'bytecount 2'
  892. 08-04-2019 08:32:25 MANAGEMENT: CMD 'state on'
  893. 08-04-2019 08:32:25 MANAGEMENT: CMD 'proxy NONE'
  894. 08-04-2019 08:32:26 MANAGEMENT: Client disconnected
  895. 08-04-2019 08:32:26 All connections have been connect-retry-max (5) times unsuccessful, exiting
  896. 08-04-2019 08:32:26 Exiting due to fatal error
  897. 08-04-2019 08:32:26 Process exited with exit value 1
  898. 08-04-2019 08:32:31 Создание конфигурации…
  899. 08-04-2019 08:32:31 started Socket Thread
  900. 08-04-2019 08:32:31 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  901. 08-04-2019 08:32:31 Current Parameter Settings:
  902. 08-04-2019 08:32:31 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  903. 08-04-2019 08:32:31 mode = 0
  904. 08-04-2019 08:32:31 show_ciphers = DISABLED
  905. 08-04-2019 08:32:31 show_digests = DISABLED
  906. 08-04-2019 08:32:31 show_engines = DISABLED
  907. 08-04-2019 08:32:31 genkey = DISABLED
  908. 08-04-2019 08:32:31 key_pass_file = '[UNDEF]'
  909. 08-04-2019 08:32:31 show_tls_ciphers = DISABLED
  910. 08-04-2019 08:32:31 connect_retry_max = 5
  911. 08-04-2019 08:32:31 Connection profiles [0]:
  912. 08-04-2019 08:32:31 proto = tcp-client
  913. 08-04-2019 08:32:31 local = '[UNDEF]'
  914. 08-04-2019 08:32:31 local_port = '[UNDEF]'
  915. 08-04-2019 08:32:31 remote = '149.154.154.61'
  916. 08-04-2019 08:32:31 remote_port = '995'
  917. 08-04-2019 08:32:31 remote_float = DISABLED
  918. 08-04-2019 08:32:31 bind_defined = DISABLED
  919. 08-04-2019 08:32:31 bind_local = DISABLED
  920. 08-04-2019 08:32:31 bind_ipv6_only = DISABLED
  921. 08-04-2019 08:32:31 NOTE: --mute triggered...
  922. 08-04-2019 08:32:31 164 variation(s) on previous 20 message(s) suppressed by --mute
  923. 08-04-2019 08:32:31 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  924. 08-04-2019 08:32:31 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  925. 08-04-2019 08:32:31 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  926. 08-04-2019 08:32:31 MANAGEMENT: CMD 'hold release'
  927. 08-04-2019 08:32:31 MANAGEMENT: CMD 'bytecount 2'
  928. 08-04-2019 08:32:31 MANAGEMENT: CMD 'state on'
  929. 08-04-2019 08:32:31 MANAGEMENT: CMD 'proxy NONE'
  930. 08-04-2019 08:32:32 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  931. 08-04-2019 08:32:32 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  932. 08-04-2019 08:32:32 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  933. 08-04-2019 08:32:32 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  934. 08-04-2019 08:32:32 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  935. 08-04-2019 08:32:32 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  936. 08-04-2019 08:32:32 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  937. 08-04-2019 08:32:32 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  938. 08-04-2019 08:32:32 MANAGEMENT: >STATE:1554701552,TCP_CONNECT,,,,,,
  939. 08-04-2019 08:32:32 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  940. 08-04-2019 08:32:33 TCP connection established with [AF_INET]149.154.154.61:995
  941. 08-04-2019 08:32:33 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  942. 08-04-2019 08:32:33 TCP_CLIENT link local: (not bound)
  943. 08-04-2019 08:32:33 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  944. 08-04-2019 08:32:33 MANAGEMENT: >STATE:1554701553,WAIT,,,,,,
  945. 08-04-2019 08:32:33 Scrambler: disabled by config
  946. 08-04-2019 08:32:33 MANAGEMENT: >STATE:1554701553,AUTH,,,,,,
  947. 08-04-2019 08:32:33 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=ba8da86a f7080479
  948. 08-04-2019 08:32:34 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  949. 08-04-2019 08:32:34 VERIFY OK: nsCertType=SERVER
  950. 08-04-2019 08:32:34 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  951. 08-04-2019 08:32:34 Connection reset, restarting [0]
  952. 08-04-2019 08:32:34 TCP/UDP: Closing socket
  953. 08-04-2019 08:32:34 SIGUSR1[soft,connection-reset] received, process restarting
  954. 08-04-2019 08:32:34 MANAGEMENT: >STATE:1554701554,RECONNECTING,connection-reset,,,,,
  955. 08-04-2019 08:32:37 MANAGEMENT: CMD 'hold release'
  956. 08-04-2019 08:32:37 MANAGEMENT: CMD 'bytecount 2'
  957. 08-04-2019 08:32:37 MANAGEMENT: CMD 'state on'
  958. 08-04-2019 08:32:37 MANAGEMENT: CMD 'proxy NONE'
  959. 08-04-2019 08:32:38 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  960. 08-04-2019 08:32:38 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  961. 08-04-2019 08:32:38 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  962. 08-04-2019 08:32:38 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  963. 08-04-2019 08:32:38 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  964. 08-04-2019 08:32:38 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  965. 08-04-2019 08:32:38 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  966. 08-04-2019 08:32:38 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  967. 08-04-2019 08:32:38 MANAGEMENT: >STATE:1554701558,TCP_CONNECT,,,,,,
  968. 08-04-2019 08:32:38 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  969. 08-04-2019 08:32:39 TCP connection established with [AF_INET]149.154.154.61:995
  970. 08-04-2019 08:32:39 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  971. 08-04-2019 08:32:39 TCP_CLIENT link local: (not bound)
  972. 08-04-2019 08:32:39 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  973. 08-04-2019 08:32:39 MANAGEMENT: >STATE:1554701559,WAIT,,,,,,
  974. 08-04-2019 08:32:39 Scrambler: disabled by config
  975. 08-04-2019 08:32:39 MANAGEMENT: >STATE:1554701559,AUTH,,,,,,
  976. 08-04-2019 08:32:39 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=95bc584d 3e988f28
  977. 08-04-2019 08:32:39 Obtaining IP address
  978. 08-04-2019 08:32:40 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  979. 08-04-2019 08:32:40 VERIFY OK: nsCertType=SERVER
  980. 08-04-2019 08:32:40 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  981. 08-04-2019 08:32:40 Connection reset, restarting [0]
  982. 08-04-2019 08:32:40 TCP/UDP: Closing socket
  983. 08-04-2019 08:32:40 SIGUSR1[soft,connection-reset] received, process restarting
  984. 08-04-2019 08:32:40 MANAGEMENT: >STATE:1554701560,RECONNECTING,connection-reset,,,,,
  985. 08-04-2019 08:32:40 Obtaining location
  986. 08-04-2019 08:32:40 Current IP received : 95.153.133.31;95.153.133.31
  987. 08-04-2019 08:32:41 Location received
  988. 08-04-2019 08:32:43 MANAGEMENT: CMD 'hold release'
  989. 08-04-2019 08:32:43 MANAGEMENT: CMD 'bytecount 2'
  990. 08-04-2019 08:32:43 MANAGEMENT: CMD 'state on'
  991. 08-04-2019 08:32:43 MANAGEMENT: CMD 'proxy NONE'
  992. 08-04-2019 08:32:44 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  993. 08-04-2019 08:32:44 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  994. 08-04-2019 08:32:44 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  995. 08-04-2019 08:32:44 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  996. 08-04-2019 08:32:44 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  997. 08-04-2019 08:32:44 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  998. 08-04-2019 08:32:44 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  999. 08-04-2019 08:32:44 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  1000. 08-04-2019 08:32:44 MANAGEMENT: >STATE:1554701564,TCP_CONNECT,,,,,,
  1001. 08-04-2019 08:32:44 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1002. 08-04-2019 08:32:44 MANAGEMENT: CMD 'signal SIGINT'
  1003. 08-04-2019 08:32:44 TCP/UDP: Closing socket
  1004. 08-04-2019 08:32:44 SIGINT[hard,init_instance] received, process exiting
  1005. 08-04-2019 08:32:44 MANAGEMENT: >STATE:1554701564,EXITING,init_instance,,,,,
  1006. 08-04-2019 08:32:53 Создание конфигурации…
  1007. 08-04-2019 08:32:54 started Socket Thread
  1008. 08-04-2019 08:32:54 Статус сети: CONNECTED LTE to MOBILE internet.mts.ru
  1009. 08-04-2019 08:32:54 Current Parameter Settings:
  1010. 08-04-2019 08:32:54 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  1011. 08-04-2019 08:32:54 mode = 0
  1012. 08-04-2019 08:32:54 show_ciphers = DISABLED
  1013. 08-04-2019 08:32:54 show_digests = DISABLED
  1014. 08-04-2019 08:32:54 show_engines = DISABLED
  1015. 08-04-2019 08:32:54 genkey = DISABLED
  1016. 08-04-2019 08:32:54 key_pass_file = '[UNDEF]'
  1017. 08-04-2019 08:32:54 show_tls_ciphers = DISABLED
  1018. 08-04-2019 08:32:54 connect_retry_max = 5
  1019. 08-04-2019 08:32:54 Connection profiles [0]:
  1020. 08-04-2019 08:32:54 proto = tcp-client
  1021. 08-04-2019 08:32:54 local = '[UNDEF]'
  1022. 08-04-2019 08:32:54 local_port = '[UNDEF]'
  1023. 08-04-2019 08:32:54 remote = '149.154.154.61'
  1024. 08-04-2019 08:32:54 remote_port = '995'
  1025. 08-04-2019 08:32:54 remote_float = DISABLED
  1026. 08-04-2019 08:32:54 bind_defined = DISABLED
  1027. 08-04-2019 08:32:54 bind_local = DISABLED
  1028. 08-04-2019 08:32:54 bind_ipv6_only = DISABLED
  1029. 08-04-2019 08:32:54 NOTE: --mute triggered...
  1030. 08-04-2019 08:32:54 164 variation(s) on previous 20 message(s) suppressed by --mute
  1031. 08-04-2019 08:32:54 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  1032. 08-04-2019 08:32:54 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  1033. 08-04-2019 08:32:54 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  1034. 08-04-2019 08:32:54 MANAGEMENT: CMD 'hold release'
  1035. 08-04-2019 08:32:54 MANAGEMENT: CMD 'bytecount 2'
  1036. 08-04-2019 08:32:54 MANAGEMENT: CMD 'state on'
  1037. 08-04-2019 08:32:54 MANAGEMENT: CMD 'proxy NONE'
  1038. 08-04-2019 08:32:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  1039. 08-04-2019 08:32:55 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  1040. 08-04-2019 08:32:55 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  1041. 08-04-2019 08:32:55 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  1042. 08-04-2019 08:32:55 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  1043. 08-04-2019 08:32:55 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  1044. 08-04-2019 08:32:55 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  1045. 08-04-2019 08:32:55 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  1046. 08-04-2019 08:32:55 MANAGEMENT: >STATE:1554701575,TCP_CONNECT,,,,,,
  1047. 08-04-2019 08:32:55 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1048. 08-04-2019 08:32:56 TCP connection established with [AF_INET]149.154.154.61:995
  1049. 08-04-2019 08:32:56 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1050. 08-04-2019 08:32:56 TCP_CLIENT link local: (not bound)
  1051. 08-04-2019 08:32:56 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  1052. 08-04-2019 08:32:56 MANAGEMENT: >STATE:1554701576,WAIT,,,,,,
  1053. 08-04-2019 08:32:56 Scrambler: disabled by config
  1054. 08-04-2019 08:32:56 MANAGEMENT: >STATE:1554701576,AUTH,,,,,,
  1055. 08-04-2019 08:32:56 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=c96e49ab ea031645
  1056. 08-04-2019 08:32:57 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  1057. 08-04-2019 08:32:57 VERIFY OK: nsCertType=SERVER
  1058. 08-04-2019 08:32:57 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  1059. 08-04-2019 08:32:57 Connection reset, restarting [0]
  1060. 08-04-2019 08:32:57 TCP/UDP: Closing socket
  1061. 08-04-2019 08:32:57 SIGUSR1[soft,connection-reset] received, process restarting
  1062. 08-04-2019 08:32:57 MANAGEMENT: >STATE:1554701577,RECONNECTING,connection-reset,,,,,
  1063. 08-04-2019 08:33:00 MANAGEMENT: CMD 'hold release'
  1064. 08-04-2019 08:33:00 MANAGEMENT: CMD 'bytecount 2'
  1065. 08-04-2019 08:33:00 MANAGEMENT: CMD 'state on'
  1066. 08-04-2019 08:33:00 MANAGEMENT: CMD 'proxy NONE'
  1067. 08-04-2019 08:33:01 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  1068. 08-04-2019 08:33:01 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  1069. 08-04-2019 08:33:01 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  1070. 08-04-2019 08:33:01 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  1071. 08-04-2019 08:33:01 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  1072. 08-04-2019 08:33:01 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  1073. 08-04-2019 08:33:01 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  1074. 08-04-2019 08:33:01 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  1075. 08-04-2019 08:33:01 MANAGEMENT: >STATE:1554701581,TCP_CONNECT,,,,,,
  1076. 08-04-2019 08:33:01 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1077. 08-04-2019 08:33:02 TCP connection established with [AF_INET]149.154.154.61:995
  1078. 08-04-2019 08:33:02 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1079. 08-04-2019 08:33:02 TCP_CLIENT link local: (not bound)
  1080. 08-04-2019 08:33:02 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  1081. 08-04-2019 08:33:02 MANAGEMENT: >STATE:1554701582,WAIT,,,,,,
  1082. 08-04-2019 08:33:02 Scrambler: disabled by config
  1083. 08-04-2019 08:33:02 MANAGEMENT: >STATE:1554701582,AUTH,,,,,,
  1084. 08-04-2019 08:33:02 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=4ffdad0c 18d8fc63
  1085. 08-04-2019 08:33:03 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  1086. 08-04-2019 08:33:03 VERIFY OK: nsCertType=SERVER
  1087. 08-04-2019 08:33:03 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  1088. 08-04-2019 08:33:03 Connection reset, restarting [0]
  1089. 08-04-2019 08:33:03 TCP/UDP: Closing socket
  1090. 08-04-2019 08:33:03 SIGUSR1[soft,connection-reset] received, process restarting
  1091. 08-04-2019 08:33:03 MANAGEMENT: >STATE:1554701583,RECONNECTING,connection-reset,,,,,
  1092. 08-04-2019 08:33:06 MANAGEMENT: CMD 'hold release'
  1093. 08-04-2019 08:33:06 MANAGEMENT: CMD 'bytecount 2'
  1094. 08-04-2019 08:33:06 MANAGEMENT: CMD 'state on'
  1095. 08-04-2019 08:33:06 MANAGEMENT: CMD 'proxy NONE'
  1096. 08-04-2019 08:33:07 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  1097. 08-04-2019 08:33:07 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  1098. 08-04-2019 08:33:07 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  1099. 08-04-2019 08:33:07 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  1100. 08-04-2019 08:33:07 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  1101. 08-04-2019 08:33:07 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  1102. 08-04-2019 08:33:07 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  1103. 08-04-2019 08:33:07 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  1104. 08-04-2019 08:33:07 MANAGEMENT: >STATE:1554701587,TCP_CONNECT,,,,,,
  1105. 08-04-2019 08:33:07 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1106. 08-04-2019 08:33:08 TCP connection established with [AF_INET]149.154.154.61:995
  1107. 08-04-2019 08:33:08 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1108. 08-04-2019 08:33:08 TCP_CLIENT link local: (not bound)
  1109. 08-04-2019 08:33:08 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  1110. 08-04-2019 08:33:08 MANAGEMENT: >STATE:1554701588,WAIT,,,,,,
  1111. 08-04-2019 08:33:08 Scrambler: disabled by config
  1112. 08-04-2019 08:33:08 MANAGEMENT: >STATE:1554701588,AUTH,,,,,,
  1113. 08-04-2019 08:33:08 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=88c2acf7 1efcdbea
  1114. 08-04-2019 08:33:09 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  1115. 08-04-2019 08:33:09 VERIFY OK: nsCertType=SERVER
  1116. 08-04-2019 08:33:09 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  1117. 08-04-2019 08:33:09 Connection reset, restarting [0]
  1118. 08-04-2019 08:33:09 TCP/UDP: Closing socket
  1119. 08-04-2019 08:33:09 SIGUSR1[soft,connection-reset] received, process restarting
  1120. 08-04-2019 08:33:09 MANAGEMENT: >STATE:1554701589,RECONNECTING,connection-reset,,,,,
  1121. 08-04-2019 08:33:12 MANAGEMENT: CMD 'hold release'
  1122. 08-04-2019 08:33:12 MANAGEMENT: CMD 'bytecount 2'
  1123. 08-04-2019 08:33:12 MANAGEMENT: CMD 'state on'
  1124. 08-04-2019 08:33:12 MANAGEMENT: CMD 'proxy NONE'
  1125. 08-04-2019 08:33:13 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  1126. 08-04-2019 08:33:13 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  1127. 08-04-2019 08:33:13 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  1128. 08-04-2019 08:33:13 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  1129. 08-04-2019 08:33:13 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  1130. 08-04-2019 08:33:13 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  1131. 08-04-2019 08:33:13 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  1132. 08-04-2019 08:33:13 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  1133. 08-04-2019 08:33:13 MANAGEMENT: >STATE:1554701593,TCP_CONNECT,,,,,,
  1134. 08-04-2019 08:33:13 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1135. 08-04-2019 08:33:14 TCP connection established with [AF_INET]149.154.154.61:995
  1136. 08-04-2019 08:33:14 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1137. 08-04-2019 08:33:14 TCP_CLIENT link local: (not bound)
  1138. 08-04-2019 08:33:14 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  1139. 08-04-2019 08:33:14 MANAGEMENT: >STATE:1554701594,WAIT,,,,,,
  1140. 08-04-2019 08:33:14 Scrambler: disabled by config
  1141. 08-04-2019 08:33:14 MANAGEMENT: >STATE:1554701594,AUTH,,,,,,
  1142. 08-04-2019 08:33:14 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=0b2a6458 463361c0
  1143. 08-04-2019 08:33:15 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  1144. 08-04-2019 08:33:15 VERIFY OK: nsCertType=SERVER
  1145. 08-04-2019 08:33:15 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  1146. 08-04-2019 08:33:15 Connection reset, restarting [0]
  1147. 08-04-2019 08:33:15 TCP/UDP: Closing socket
  1148. 08-04-2019 08:33:15 SIGUSR1[soft,connection-reset] received, process restarting
  1149. 08-04-2019 08:33:15 MANAGEMENT: >STATE:1554701595,RECONNECTING,connection-reset,,,,,
  1150. 08-04-2019 08:33:18 MANAGEMENT: CMD 'hold release'
  1151. 08-04-2019 08:33:18 MANAGEMENT: CMD 'bytecount 2'
  1152. 08-04-2019 08:33:18 MANAGEMENT: CMD 'state on'
  1153. 08-04-2019 08:33:18 MANAGEMENT: CMD 'proxy NONE'
  1154. 08-04-2019 08:33:19 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  1155. 08-04-2019 08:33:19 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  1156. 08-04-2019 08:33:19 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  1157. 08-04-2019 08:33:19 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  1158. 08-04-2019 08:33:19 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  1159. 08-04-2019 08:33:19 TCP/UDP: Preserving recently used remote address: [AF_INET]149.154.154.61:995
  1160. 08-04-2019 08:33:19 Socket Buffers: R=[4194304->524288] S=[524288->524288]
  1161. 08-04-2019 08:33:19 Attempting to establish TCP connection with [AF_INET]149.154.154.61:995 [nonblock]
  1162. 08-04-2019 08:33:19 MANAGEMENT: >STATE:1554701599,TCP_CONNECT,,,,,,
  1163. 08-04-2019 08:33:19 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1164. 08-04-2019 08:33:20 TCP connection established with [AF_INET]149.154.154.61:995
  1165. 08-04-2019 08:33:20 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  1166. 08-04-2019 08:33:20 TCP_CLIENT link local: (not bound)
  1167. 08-04-2019 08:33:20 TCP_CLIENT link remote: [AF_INET]149.154.154.61:995
  1168. 08-04-2019 08:33:20 MANAGEMENT: >STATE:1554701600,WAIT,,,,,,
  1169. 08-04-2019 08:33:20 Scrambler: disabled by config
  1170. 08-04-2019 08:33:20 MANAGEMENT: >STATE:1554701600,AUTH,,,,,,
  1171. 08-04-2019 08:33:20 TLS: Initial packet from [AF_INET]149.154.154.61:995, sid=8bc8dcdf 38d70d9e
  1172. 08-04-2019 08:33:21 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  1173. 08-04-2019 08:33:21 VERIFY OK: nsCertType=SERVER
  1174. 08-04-2019 08:33:21 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  1175. 08-04-2019 08:33:21 Connection reset, restarting [0]
  1176. 08-04-2019 08:33:21 TCP/UDP: Closing socket
  1177. 08-04-2019 08:33:21 SIGUSR1[soft,connection-reset] received, process restarting
  1178. 08-04-2019 08:33:21 MANAGEMENT: >STATE:1554701601,RECONNECTING,connection-reset,,,,,
  1179. 08-04-2019 08:33:24 MANAGEMENT: CMD 'hold release'
  1180. 08-04-2019 08:33:24 MANAGEMENT: CMD 'bytecount 2'
  1181. 08-04-2019 08:33:24 MANAGEMENT: CMD 'state on'
  1182. 08-04-2019 08:33:24 MANAGEMENT: CMD 'proxy NONE'
  1183. 08-04-2019 08:33:25 MANAGEMENT: Client disconnected
  1184. 08-04-2019 08:33:25 All connections have been connect-retry-max (5) times unsuccessful, exiting
  1185. 08-04-2019 08:33:25 Exiting due to fatal error
  1186. 08-04-2019 08:33:25 Process exited with exit value 1
  1187. 08-04-2019 08:33:28 Start to create IKEv2 profile...
  1188. 08-04-2019 08:33:28 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 6.0.1 - MMB29M/2018-04-01, Redmi 4 - Xiaomi/markw/Xiaomi, Linux 3.18.24-perf-g233e5d5, aarch64)
  1189. 08-04-2019 08:33:28 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
  1190. 08-04-2019 08:33:28 spawning 16 worker threads
  1191. 08-04-2019 08:33:28 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' and private key
  1192. 08-04-2019 08:33:28 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  1193. 08-04-2019 08:33:28 initiating IKE_SA android[2] to 198.50.183.71
  1194. 08-04-2019 08:33:28 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1195. 08-04-2019 08:33:28 sending packet: from 10.210.97.140[56612] to 198.50.183.71[500] (716 bytes)
  1196. 08-04-2019 08:33:28 received packet: from 198.50.183.71[500] to 10.210.97.140[56612] (38 bytes)
  1197. 08-04-2019 08:33:28 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  1198. 08-04-2019 08:33:28 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 6.0.1 - MMB29M/2018-04-01, Redmi 4 - Xiaomi/markw/Xiaomi, Linux 3.18.24-perf-g233e5d5, aarch64)
  1199. 08-04-2019 08:33:28 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
  1200. 08-04-2019 08:33:28 spawning 16 worker threads
  1201. 08-04-2019 08:33:29 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' and private key
  1202. 08-04-2019 08:33:29 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  1203. 08-04-2019 08:33:29 initiating IKE_SA android[1] to 149.154.154.61
  1204. 08-04-2019 08:33:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1205. 08-04-2019 08:33:29 sending packet: from 10.201.211.159[37822] to 149.154.154.61[500] (716 bytes)
  1206. 08-04-2019 08:33:29 received packet: from 149.154.154.61[500] to 10.201.211.159[37822] (38 bytes)
  1207. 08-04-2019 08:33:29 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  1208. 08-04-2019 08:33:29 peer didn't accept DH group ECP_256, it requested MODP_2048
  1209. 08-04-2019 08:33:29 initiating IKE_SA android[1] to 149.154.154.61
  1210. 08-04-2019 08:33:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1211. 08-04-2019 08:33:29 sending packet: from 10.201.211.159[37822] to 149.154.154.61[500] (908 bytes)
  1212. 08-04-2019 08:33:29 received packet: from 149.154.154.61[500] to 10.201.211.159[37822] (481 bytes)
  1213. 08-04-2019 08:33:29 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  1214. 08-04-2019 08:33:29 local host is behind NAT, sending keep alives
  1215. 08-04-2019 08:33:29 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  1216. 08-04-2019 08:33:29 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  1217. 08-04-2019 08:33:29 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  1218. 08-04-2019 08:33:29 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name"
  1219. 08-04-2019 08:33:29 establishing CHILD_SA android{1}
  1220. 08-04-2019 08:33:29 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
  1221. 08-04-2019 08:33:29 splitting IKE message with length of 2227 bytes into 2 fragments
  1222. 08-04-2019 08:33:29 generating IKE_AUTH request 1 [ EF(1/2) ]
  1223. 08-04-2019 08:33:29 generating IKE_AUTH request 1 [ EF(2/2) ]
  1224. 08-04-2019 08:33:29 sending packet: from 10.201.211.159[41321] to 149.154.154.61[4500] (1368 bytes)
  1225. 08-04-2019 08:33:29 sending packet: from 10.201.211.159[41321] to 149.154.154.61[4500] (924 bytes)
  1226. 08-04-2019 08:33:29 received packet: from 149.154.154.61[4500] to 10.201.211.159[41321] (65 bytes)
  1227. 08-04-2019 08:33:29 parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
  1228. 08-04-2019 08:33:29 received AUTHENTICATION_FAILED notify error
  1229. 08-04-2019 08:34:11 Start to create IKEv2 profile...
  1230. 08-04-2019 08:34:11 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 6.0.1 - MMB29M/2018-04-01, Redmi 4 - Xiaomi/markw/Xiaomi, Linux 3.18.24-perf-g233e5d5, aarch64)
  1231. 08-04-2019 08:34:11 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
  1232. 08-04-2019 08:34:11 spawning 16 worker threads
  1233. 08-04-2019 08:34:11 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' and private key
  1234. 08-04-2019 08:34:11 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  1235. 08-04-2019 08:34:11 initiating IKE_SA android[2] to 149.154.154.61
  1236. 08-04-2019 08:34:11 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1237. 08-04-2019 08:34:11 sending packet: from 10.201.211.159[45844] to 149.154.154.61[500] (716 bytes)
  1238. 08-04-2019 08:34:12 received packet: from 149.154.154.61[500] to 10.201.211.159[45844] (38 bytes)
  1239. 08-04-2019 08:34:12 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  1240. 08-04-2019 08:34:12 peer didn't accept DH group ECP_256, it requested MODP_2048
  1241. 08-04-2019 08:34:12 initiating IKE_SA android[2] to 149.154.154.61
  1242. 08-04-2019 08:34:12 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1243. 08-04-2019 08:34:12 sending packet: from 10.201.211.159[45844] to 149.154.154.61[500] (908 bytes)
  1244. 08-04-2019 08:34:12 received packet: from 149.154.154.61[500] to 10.201.211.159[45844] (481 bytes)
  1245. 08-04-2019 08:34:12 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  1246. 08-04-2019 08:34:12 local host is behind NAT, sending keep alives
  1247. 08-04-2019 08:34:12 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  1248. 08-04-2019 08:34:12 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  1249. 08-04-2019 08:34:12 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  1250. 08-04-2019 08:34:12 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name"
  1251. 08-04-2019 08:34:12 establishing CHILD_SA android{2}
  1252. 08-04-2019 08:34:12 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
  1253. 08-04-2019 08:34:12 splitting IKE message with length of 2227 bytes into 2 fragments
  1254. 08-04-2019 08:34:12 generating IKE_AUTH request 1 [ EF(1/2) ]
  1255. 08-04-2019 08:34:12 generating IKE_AUTH request 1 [ EF(2/2) ]
  1256. 08-04-2019 08:34:12 sending packet: from 10.201.211.159[57765] to 149.154.154.61[4500] (1368 bytes)
  1257. 08-04-2019 08:34:12 sending packet: from 10.201.211.159[57765] to 149.154.154.61[4500] (924 bytes)
  1258. 08-04-2019 08:34:12 received packet: from 149.154.154.61[4500] to 10.201.211.159[57765] (65 bytes)
  1259. 08-04-2019 08:34:12 parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
  1260. 08-04-2019 08:34:12 received AUTHENTICATION_FAILED notify error
  1261. 08-04-2019 08:44:33 Background loading servers
  1262. 08-04-2019 08:44:35 Servers list received
  1263. 08-04-2019 08:44:48 Obtaining IP address
  1264. 08-04-2019 08:44:49 Start to create IKEv2 profile...
  1265. 08-04-2019 08:44:49 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 6.0.1 - MMB29M/2018-04-01, Redmi 4 - Xiaomi/markw/Xiaomi, Linux 3.18.24-perf-g233e5d5, aarch64)
  1266. 08-04-2019 08:44:49 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
  1267. 08-04-2019 08:44:49 spawning 16 worker threads
  1268. 08-04-2019 08:44:49 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' and private key
  1269. 08-04-2019 08:44:49 Obtaining location
  1270. 08-04-2019 08:44:49 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  1271. 08-04-2019 08:44:49 Current IP received : 95.153.133.31;95.153.133.31
  1272. 08-04-2019 08:44:49 initiating IKE_SA android[3] to 95.154.199.21
  1273. 08-04-2019 08:44:49 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1274. 08-04-2019 08:44:49 sending packet: from 10.201.211.159[35876] to 95.154.199.21[500] (716 bytes)
  1275. 08-04-2019 08:44:49 received packet: from 95.154.199.21[500] to 10.201.211.159[35876] (38 bytes)
  1276. 08-04-2019 08:44:49 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  1277. 08-04-2019 08:44:49 peer didn't accept DH group ECP_256, it requested MODP_2048
  1278. 08-04-2019 08:44:49 initiating IKE_SA android[3] to 95.154.199.21
  1279. 08-04-2019 08:44:49 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  1280. 08-04-2019 08:44:49 sending packet: from 10.201.211.159[35876] to 95.154.199.21[500] (908 bytes)
  1281. 08-04-2019 08:44:49 Location received
  1282. 08-04-2019 08:44:49 received packet: from 95.154.199.21[500] to 10.201.211.159[35876] (481 bytes)
  1283. 08-04-2019 08:44:49 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  1284. 08-04-2019 08:44:49 local host is behind NAT, sending keep alives
  1285. 08-04-2019 08:44:49 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  1286. 08-04-2019 08:44:49 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  1287. 08-04-2019 08:44:49 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  1288. 08-04-2019 08:44:49 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_340668146172538, E=feedback@hidemy.name"
  1289. 08-04-2019 08:44:49 establishing CHILD_SA android{3}
  1290. 08-04-2019 08:44:49 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
  1291. 08-04-2019 08:44:49 splitting IKE message with length of 2227 bytes into 2 fragments
  1292. 08-04-2019 08:44:49 generating IKE_AUTH request 1 [ EF(1/2) ]
  1293. 08-04-2019 08:44:49 generating IKE_AUTH request 1 [ EF(2/2) ]
  1294. 08-04-2019 08:44:49 sending packet: from 10.201.211.159[59248] to 95.154.199.21[4500] (1368 bytes)
  1295. 08-04-2019 08:44:49 sending packet: from 10.201.211.159[59248] to 95.154.199.21[4500] (924 bytes)
  1296. 08-04-2019 08:44:50 received packet: from 95.154.199.21[4500] to 10.201.211.159[59248] (65 bytes)
  1297. 08-04-2019 08:44:50 parsed IKE_AUTH response 1 [ N(AUTH_FAILED) ]
  1298. 08-04-2019 08:44:50 received AUTHENTICATION_FAILED notify error
  1299. 08-04-2019 09:01:46 Background loading servers
  1300. 08-04-2019 09:01:59 Servers list received
  1301. 08-04-2019 09:02:59 Obtaining IP address
  1302. 08-04-2019 09:03:00 Obtaining location
  1303. 08-04-2019 09:03:00 Current IP received : 95.153.133.31;95.153.133.31
  1304. 08-04-2019 09:03:00 Location received
  1305. 08-04-2019 09:03:24 Obtaining IP address
  1306. 08-04-2019 09:03:25 Obtaining location
  1307. 08-04-2019 09:03:25 Current IP received : 95.153.133.31;95.153.133.31
  1308. 08-04-2019 09:03:25 Location received
  1309. 08-04-2019 09:04:41 Obtaining IP address
  1310. 08-04-2019 09:04:42 Obtaining location
  1311. 08-04-2019 09:04:42 Current IP received : 95.153.133.31;95.153.133.31
  1312. 08-04-2019 09:04:43 Location received
  1313. 08-04-2019 09:05:09 Obtaining IP address
  1314. 08-04-2019 09:05:10 Obtaining location
  1315. 08-04-2019 09:05:10 Current IP received : 95.153.133.31;95.153.133.31
  1316. 08-04-2019 09:05:10 Location received
  1317. 08-04-2019 09:05:48 Obtaining IP address
  1318. 08-04-2019 09:05:49 Obtaining location
  1319. 08-04-2019 09:05:49 Current IP received : 95.153.133.31;95.153.133.31
  1320. 08-04-2019 09:05:49 Location received
  1321. 08-04-2019 09:05:52 Obtaining IP address
  1322. 08-04-2019 09:05:53 Obtaining location
  1323. 08-04-2019 09:05:53 Current IP received : 95.153.133.31;95.153.133.31
  1324. 08-04-2019 09:05:53 Location received
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement