Advertisement
Guest User

Untitled

a guest
Jun 16th, 2019
530
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1. [17-6-19 08:31:19] Astrill desktop version 3.7.0.2140 (64-bit)
  2. [17-6-19 08:31:19] Operating system Ubuntu 16.04.6 LTS (4.15.0-51-generic x86_64)
  3. [17-6-19 08:31:19] Detected local IP: 192.168.1.103
  4. [17-6-19 08:31:19] Detected default gateway: 192.168.1.1
  5. [17-6-19 08:31:19] OpenVPN 2019.04.26 Astrill Edition x86_64-pc-linux-gnu [SSL] [LZO2] [EPOLL] built on Apr 26 2019
  6. [17-6-19 08:31:19] Need hold release from management interface, waiting...
  7. [17-6-19 08:31:19] Control Channel Authentication: tls-auth using INLINE static key file
  8. [17-6-19 08:31:19] Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  9. [17-6-19 08:31:19] Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  10. [17-6-19 08:31:19] LZO compression initialized
  11. [17-6-19 08:31:19] Control Channel MTU parms [ L:1560 D:1182 EF:68 EB:0 ET:0 EL:0 ]
  12. [17-6-19 08:31:19] Socket Buffers: R=[87380->87380] S=[16384->16384]
  13. [17-6-19 08:31:19] Data Channel MTU parms [ L:1560 D:1560 EF:60 EB:135 ET:0 EL:0 AF:3/1 ]
  14. [17-6-19 08:31:19] Local Options hash (VER=V4): '0bdd0804'
  15. [17-6-19 08:31:19] Expected Remote Options hash (VER=V4): 'a642654b'
  16. [17-6-19 08:31:19] nice -10 succeeded
  17. [17-6-19 08:31:19] Attempting to establish TCP connection with 168.1.57.90:32870 [nonblock]
  18. [17-6-19 08:31:20] TCP connection established with 168.1.57.90:32870
  19. [17-6-19 08:31:20] TCPv4_CLIENT link local: [undef]
  20. [17-6-19 08:31:20] TCPv4_CLIENT link remote: 168.1.57.90:32870
  21. [17-6-19 08:31:20] Stealth mode initialized (2)
  22. [17-6-19 08:31:21] TLS: Initial packet from 168.1.57.90:32870, sid=9a12f19f 590b0f74
  23. [17-6-19 08:31:21] [Warning] WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  24. [17-6-19 08:31:21] VERIFY OK: depth=1, /C=../ST=../L=../O=../OU=../CN=ASCA2/emailAddress=..
  25. [17-6-19 08:31:21] VERIFY OK: nsCertType=SERVER
  26. [17-6-19 08:31:21] VERIFY OK: depth=0, /CN=SERVER600
  27. [17-6-19 08:31:22] Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  28. [17-6-19 08:31:22] Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  29. [17-6-19 08:31:22] Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
  30. [17-6-19 08:31:22] Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
  31. [17-6-19 08:31:22] Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  32. [17-6-19 08:31:22] [SERVER600] Peer Connection Initiated with 168.1.57.90:32870
  33. [17-6-19 08:31:25] SENT CONTROL [SERVER600]: 'PUSH_REQUEST' (status=1)
  34. [17-6-19 08:31:25] AUTH: Received AUTH_FAILED control message
  35. [17-6-19 08:31:25] [Error] User authentication failed - cannot connect to the API server. Please try again later.
  36. [17-6-19 08:31:25] SIGTERM received, sending exit notification to peer
  37. [17-6-19 08:31:26] TCP/UDP: Closing socket
  38. [17-6-19 08:31:26] SIGTERM[soft,exit-with-notification] received, process exiting
  39. [17-6-19 08:31:26] Terminating VPN client...
  40. [17-6-19 08:31:26] Flushing DNS cache...
  41. [17-6-19 08:31:26] Terminated
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement