Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- sudo openvpn us-ca-09.protonvpn.com.udp1194.ovpn
- [sudo] password for katnip:
- Sun Oct 7 07:59:30 2018 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 5 2018
- Sun Oct 7 07:59:30 2018 library versions: OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08
- Enter Auth Username: 6whokKCVxUieHiK44aMUcjnS
- Enter Auth Password: ************************
- Sun Oct 7 08:00:07 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Sun Oct 7 08:00:07 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 7 08:00:07 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Oct 7 08:00:07 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:00:07 2018 Socket Buffers: R=[212992->212992] S=[212992->212992]
- Sun Oct 7 08:00:07 2018 UDP link local: (not bound)
- Sun Oct 7 08:00:07 2018 UDP link remote: [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:00:21 2018 TLS: Initial packet from [AF_INET]198.52.38.56:1194, sid=22f69243 42f9ee15
- Sun Oct 7 08:00:21 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Oct 7 08:00:21 2018 VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA
- Sun Oct 7 08:00:21 2018 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1
- Sun Oct 7 08:00:21 2018 VERIFY KU OK
- Sun Oct 7 08:00:21 2018 Validating certificate extended key usage
- Sun Oct 7 08:00:21 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Oct 7 08:00:21 2018 VERIFY EKU OK
- Sun Oct 7 08:00:21 2018 VERIFY OK: depth=0, CN=us-ca-09.protonvpn.com
- Sun Oct 7 08:00:21 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Sun Oct 7 08:00:21 2018 [us-ca-09.protonvpn.com] Peer Connection Initiated with [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:00:22 2018 SENT CONTROL [us-ca-09.protonvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun Oct 7 08:00:22 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.8.8.1,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.8.5 255.255.255.0,peer-id 3,cipher AES-256-GCM'
- Sun Oct 7 08:00:22 2018 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:5 is ignored by previous <connection> blocks
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: explicit notify parm(s) modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: compression parms modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Oct 7 08:00:22 2018 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: route options modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: route-related options modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: peer-id set
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: adjusting link_mtu to 1657
- Sun Oct 7 08:00:22 2018 OPTIONS IMPORT: data channel crypto options modified
- Sun Oct 7 08:00:22 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
- Sun Oct 7 08:00:22 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 08:00:22 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 08:00:22 2018 ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=4e:d9:fc:d7:93:2a
- Sun Oct 7 08:00:22 2018 TUN/TAP device tun0 opened
- Sun Oct 7 08:00:22 2018 TUN/TAP TX queue length set to 100
- Sun Oct 7 08:00:22 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sun Oct 7 08:00:22 2018 /sbin/ip link set dev tun0 up mtu 1500
- Sun Oct 7 08:00:22 2018 /sbin/ip addr add dev tun0 10.8.8.5/24 broadcast 10.8.8.255
- Sun Oct 7 08:00:22 2018 /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.8.5 255.255.255.0 init
- dhcp-option DNS 10.8.8.1
- Sun Oct 7 08:00:28 2018 /sbin/ip route add 198.52.38.56/32 via 192.168.254.254
- Sun Oct 7 08:00:28 2018 /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
- Sun Oct 7 08:00:28 2018 /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
- Sun Oct 7 08:00:28 2018 Initialization Sequence Completed
- Sun Oct 7 08:26:05 2018 [us-ca-09.protonvpn.com] Inactivity timeout (--ping-restart), restarting
- Sun Oct 7 08:26:05 2018 SIGUSR1[soft,ping-restart] received, process restarting
- Sun Oct 7 08:26:05 2018 Restart pause, 5 second(s)
- Sun Oct 7 08:26:10 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Sun Oct 7 08:26:10 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:26:10 2018 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Sun Oct 7 08:26:10 2018 UDP link local: (not bound)
- Sun Oct 7 08:26:10 2018 UDP link remote: [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:26:10 2018 TLS: Initial packet from [AF_INET]198.52.38.56:1194, sid=811ad631 87198831
- Sun Oct 7 08:26:10 2018 VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA
- Sun Oct 7 08:26:10 2018 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1
- Sun Oct 7 08:26:10 2018 VERIFY KU OK
- Sun Oct 7 08:26:10 2018 Validating certificate extended key usage
- Sun Oct 7 08:26:10 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Oct 7 08:26:10 2018 VERIFY EKU OK
- Sun Oct 7 08:26:10 2018 VERIFY OK: depth=0, CN=us-ca-09.protonvpn.com
- Sun Oct 7 08:26:10 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Sun Oct 7 08:26:10 2018 [us-ca-09.protonvpn.com] Peer Connection Initiated with [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:26:11 2018 SENT CONTROL [us-ca-09.protonvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun Oct 7 08:26:16 2018 SENT CONTROL [us-ca-09.protonvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun Oct 7 08:26:16 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.8.8.1,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.8.6 255.255.255.0,peer-id 5,cipher AES-256-GCM'
- Sun Oct 7 08:26:16 2018 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:5 is ignored by previous <connection> blocks
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: explicit notify parm(s) modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: compression parms modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Oct 7 08:26:16 2018 Socket Buffers: R=[425984->425984] S=[425984->425984]
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: route options modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: route-related options modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: peer-id set
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: adjusting link_mtu to 1657
- Sun Oct 7 08:26:16 2018 OPTIONS IMPORT: data channel crypto options modified
- Sun Oct 7 08:26:16 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
- Sun Oct 7 08:26:16 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 08:26:16 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 08:26:16 2018 Preserving previous TUN/TAP instance: tun0
- Sun Oct 7 08:26:16 2018 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Sun Oct 7 08:26:16 2018 /sbin/ip route del 198.52.38.56/32
- Sun Oct 7 08:26:16 2018 /sbin/ip route del 0.0.0.0/1
- Sun Oct 7 08:26:16 2018 /sbin/ip route del 128.0.0.0/1
- Sun Oct 7 08:26:16 2018 Closing TUN/TAP interface
- Sun Oct 7 08:26:16 2018 /sbin/ip addr del dev tun0 10.8.8.5/24
- Sun Oct 7 08:26:16 2018 /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.8.5 255.255.255.0 init
- Sun Oct 7 08:26:17 2018 ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=4e:d9:fc:d7:93:2a
- Sun Oct 7 08:26:17 2018 TUN/TAP device tun0 opened
- Sun Oct 7 08:26:17 2018 TUN/TAP TX queue length set to 100
- Sun Oct 7 08:26:17 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sun Oct 7 08:26:17 2018 /sbin/ip link set dev tun0 up mtu 1500
- Sun Oct 7 08:26:17 2018 /sbin/ip addr add dev tun0 10.8.8.6/24 broadcast 10.8.8.255
- Sun Oct 7 08:26:17 2018 /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.8.6 255.255.255.0 init
- dhcp-option DNS 10.8.8.1
- Sun Oct 7 08:26:22 2018 /sbin/ip route add 198.52.38.56/32 via 192.168.254.254
- Sun Oct 7 08:26:22 2018 /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
- Sun Oct 7 08:26:22 2018 /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
- Sun Oct 7 08:26:22 2018 Initialization Sequence Completed
- Sun Oct 7 08:58:31 2018 [us-ca-09.protonvpn.com] Inactivity timeout (--ping-restart), restarting
- Sun Oct 7 08:58:31 2018 SIGUSR1[soft,ping-restart] received, process restarting
- Sun Oct 7 08:58:31 2018 Restart pause, 5 second(s)
- Sun Oct 7 08:58:36 2018 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
- Sun Oct 7 08:58:36 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:58:36 2018 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Sun Oct 7 08:58:36 2018 UDP link local: (not bound)
- Sun Oct 7 08:58:36 2018 UDP link remote: [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:58:50 2018 TLS: Initial packet from [AF_INET]198.52.38.56:1194, sid=623724e4 3c5c0e75
- Sun Oct 7 08:58:50 2018 VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA
- Sun Oct 7 08:58:50 2018 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1
- Sun Oct 7 08:58:50 2018 VERIFY KU OK
- Sun Oct 7 08:58:50 2018 Validating certificate extended key usage
- Sun Oct 7 08:58:50 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Oct 7 08:58:50 2018 VERIFY EKU OK
- Sun Oct 7 08:58:50 2018 VERIFY OK: depth=0, CN=us-ca-09.protonvpn.com
- Sun Oct 7 08:58:50 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- Sun Oct 7 08:58:50 2018 [us-ca-09.protonvpn.com] Peer Connection Initiated with [AF_INET]198.52.38.56:1194
- Sun Oct 7 08:58:51 2018 SENT CONTROL [us-ca-09.protonvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun Oct 7 08:58:56 2018 SENT CONTROL [us-ca-09.protonvpn.com]: 'PUSH_REQUEST' (status=1)
- Sun Oct 7 08:58:56 2018 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.8.8.1,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.8.8.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.8.8.7 255.255.255.0,peer-id 3,cipher AES-256-GCM'
- Sun Oct 7 08:58:56 2018 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:5 is ignored by previous <connection> blocks
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: timers and/or timeouts modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: explicit notify parm(s) modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: compression parms modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
- Sun Oct 7 08:58:56 2018 Socket Buffers: R=[425984->425984] S=[425984->425984]
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: --ifconfig/up options modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: route options modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: route-related options modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: peer-id set
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: adjusting link_mtu to 1657
- Sun Oct 7 08:58:56 2018 OPTIONS IMPORT: data channel crypto options modified
- Sun Oct 7 08:58:56 2018 Data Channel: using negotiated cipher 'AES-256-GCM'
- Sun Oct 7 08:58:56 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 08:58:56 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 08:58:56 2018 Preserving previous TUN/TAP instance: tun0
- Sun Oct 7 08:58:56 2018 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
- Sun Oct 7 08:58:56 2018 /sbin/ip route del 198.52.38.56/32
- Sun Oct 7 08:58:56 2018 /sbin/ip route del 0.0.0.0/1
- Sun Oct 7 08:58:56 2018 /sbin/ip route del 128.0.0.0/1
- Sun Oct 7 08:58:56 2018 Closing TUN/TAP interface
- Sun Oct 7 08:58:56 2018 /sbin/ip addr del dev tun0 10.8.8.6/24
- Sun Oct 7 08:58:56 2018 /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.8.6 255.255.255.0 init
- Sun Oct 7 08:58:57 2018 ROUTE_GATEWAY 192.168.254.254/255.255.255.0 IFACE=enp2s0 HWADDR=4e:d9:fc:d7:93:2a
- Sun Oct 7 08:58:57 2018 TUN/TAP device tun0 opened
- Sun Oct 7 08:58:57 2018 TUN/TAP TX queue length set to 100
- Sun Oct 7 08:58:57 2018 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- Sun Oct 7 08:58:57 2018 /sbin/ip link set dev tun0 up mtu 1500
- Sun Oct 7 08:58:57 2018 /sbin/ip addr add dev tun0 10.8.8.7/24 broadcast 10.8.8.255
- Sun Oct 7 08:58:57 2018 /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.8.7 255.255.255.0 init
- dhcp-option DNS 10.8.8.1
- Sun Oct 7 08:59:02 2018 /sbin/ip route add 198.52.38.56/32 via 192.168.254.254
- Sun Oct 7 08:59:02 2018 /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
- Sun Oct 7 08:59:02 2018 /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
- Sun Oct 7 08:59:02 2018 Initialization Sequence Completed
- Sun Oct 7 09:59:04 2018 VERIFY OK: depth=2, C=CH, O=ProtonVPN AG, CN=ProtonVPN Root CA
- Sun Oct 7 09:59:04 2018 VERIFY OK: depth=1, C=CH, O=ProtonVPN AG, CN=ProtonVPN Intermediate CA 1
- Sun Oct 7 09:59:04 2018 VERIFY KU OK
- Sun Oct 7 09:59:04 2018 Validating certificate extended key usage
- Sun Oct 7 09:59:04 2018 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- Sun Oct 7 09:59:04 2018 VERIFY EKU OK
- Sun Oct 7 09:59:04 2018 VERIFY OK: depth=0, CN=us-ca-09.protonvpn.com
- Sun Oct 7 09:59:04 2018 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 09:59:04 2018 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
- Sun Oct 7 09:59:04 2018 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- ^CSun Oct 7 10:12:25 2018 event_wait : Interrupted system call (code=4)
- Sun Oct 7 10:12:25 2018 SIGTERM received, sending exit notification to peer
- ^CSun Oct 7 10:12:25 2018 event_wait : Interrupted system call (code=4)
- Sun Oct 7 10:12:25 2018 /sbin/ip route del 198.52.38.56/32
- Sun Oct 7 10:12:25 2018 /sbin/ip route del 0.0.0.0/1
- Sun Oct 7 10:12:25 2018 /sbin/ip route del 128.0.0.0/1
- Sun Oct 7 10:12:25 2018 Closing TUN/TAP interface
- Sun Oct 7 10:12:25 2018 /sbin/ip addr del dev tun0 10.8.8.7/24
- Sun Oct 7 10:12:25 2018 /etc/openvpn/update-resolv-conf tun0 1500 1585 10.8.8.7 255.255.255.0 init
- Sun Oct 7 10:12:25 2018 SIGINT[hard,] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement