Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- [17-6-19 08:31:19] Astrill desktop version 3.7.0.2140 (64-bit)
- [17-6-19 08:31:19] Operating system Ubuntu 16.04.6 LTS (4.15.0-51-generic x86_64)
- [17-6-19 08:31:19] Detected local IP: 192.168.1.103
- [17-6-19 08:31:19] Detected default gateway: 192.168.1.1
- [17-6-19 08:31:19] OpenVPN 2019.04.26 Astrill Edition x86_64-pc-linux-gnu [SSL] [LZO2] [EPOLL] built on Apr 26 2019
- [17-6-19 08:31:19] Need hold release from management interface, waiting...
- [17-6-19 08:31:19] Control Channel Authentication: tls-auth using INLINE static key file
- [17-6-19 08:31:19] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- [17-6-19 08:31:19] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- [17-6-19 08:31:19] LZO compression initialized
- [17-6-19 08:31:19] Control Channel MTU parms [ L:1560 D:1182 EF:68 EB:0 ET:0 EL:0 ]
- [17-6-19 08:31:19] Socket Buffers: R=[87380->87380] S=[16384->16384]
- [17-6-19 08:31:19] Data Channel MTU parms [ L:1560 D:1560 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]
- [17-6-19 08:31:19] Local Options hash (VER=V4): '0bdd0804'
- [17-6-19 08:31:19] Expected Remote Options hash (VER=V4): 'a642654b'
- [17-6-19 08:31:19] nice -10 succeeded
- [17-6-19 08:31:19] Attempting to establish TCP connection with 168.1.57.90:32870 [nonblock]
- [17-6-19 08:31:20] TCP connection established with 168.1.57.90:32870
- [17-6-19 08:31:20] TCPv4_CLIENT link local: [undef]
- [17-6-19 08:31:20] TCPv4_CLIENT link remote: 168.1.57.90:32870
- [17-6-19 08:31:20] Stealth mode initialized (2)
- [17-6-19 08:31:21] TLS: Initial packet from 168.1.57.90:32870, sid=9a12f19f 590b0f74
- [17-6-19 08:31:21] [Warning] WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- [17-6-19 08:31:21] VERIFY OK: depth=1, /C=../ST=../L=../O=../OU=../CN=ASCA2/emailAddress=..
- [17-6-19 08:31:21] VERIFY OK: nsCertType=SERVER
- [17-6-19 08:31:21] VERIFY OK: depth=0, /CN=SERVER600
- [17-6-19 08:31:22] Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- [17-6-19 08:31:22] Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- [17-6-19 08:31:22] Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
- [17-6-19 08:31:22] Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
- [17-6-19 08:31:22] Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- [17-6-19 08:31:22] [SERVER600] Peer Connection Initiated with 168.1.57.90:32870
- [17-6-19 08:31:25] SENT CONTROL [SERVER600]: 'PUSH_REQUEST' (status=1)
- [17-6-19 08:31:25] AUTH: Received AUTH_FAILED control message
- [17-6-19 08:31:25] [Error] User authentication failed - cannot connect to the API server. Please try again later.
- [17-6-19 08:31:25] SIGTERM received, sending exit notification to peer
- [17-6-19 08:31:26] TCP/UDP: Closing socket
- [17-6-19 08:31:26] SIGTERM[soft,exit-with-notification] received, process exiting
- [17-6-19 08:31:26] Terminating VPN client...
- [17-6-19 08:31:26] Flushing DNS cache...
- [17-6-19 08:31:26] Terminated
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement