Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Sun Jun 10 21:04:15 2018 WARNING: file '/home/osmc/.kodi/userdata/addon_data/service.vpn.manager/ExpressVPN/user.key' is group or others accessible
- Sun Jun 10 21:04:15 2018 WARNING: file '/home/osmc/.kodi/addons/service.vpn.manager/ExpressVPN/ta.key' is group or others accessible
- Sun Jun 10 21:04:15 2018 WARNING: file '/home/osmc/.kodi/addons/service.vpn.manager/ExpressVPN/pass.txt' is group or others accessible
- Sun Jun 10 21:04:15 2018 OpenVPN 2.4.0 arm-unknown-linux-gnueabihf [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Jul 18 2017
- Sun Jun 10 21:04:15 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.08
- Sun Jun 10 21:04:15 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Jun 10 21:04:15 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Sun Jun 10 21:04:16 2018 TCP/UDP: Preserving recently used remote address: [AF_INET]104.237.50.60:1195
- Sun Jun 10 21:04:16 2018 Socket Buffers: R=[212992->425984] S=[212992->425984]
- Sun Jun 10 21:04:16 2018 UDP link local: (not bound)
- Sun Jun 10 21:04:16 2018 UDP link remote: [AF_INET]104.237.50.60:1195
- Sun Jun 10 21:04:16 2018 TLS: Initial packet from [AF_INET]104.237.50.60:1195, sid=dbb16f07 ed117c8e
- Sun Jun 10 21:04:16 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Sun Jun 10 21:04:16 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Sun Jun 10 21:04:16 2018 VERIFY OK: nsCertType=SERVER
- Sun Jun 10 21:04:16 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-3363-0a, emailAddress=support@expressvpn.com
- Sun Jun 10 21:04:16 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-3363-0a, emailAddress=support@expressvpn.com
- Sun Jun 10 21:04:17 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Sun Jun 10 21:04:17 2018 [Server-3363-0a] Peer Connection Initiated with [AF_INET]104.237.50.60:1195
- Sun Jun 10 21:04:18 2018 SENT CONTROL [Server-3363-0a]: 'PUSH_REQUEST' (status=1)
- Sun Jun 10 21:04:18 2018 AUTH: Received control message: AUTH_FAILED
- Sun Jun 10 21:04:18 2018 SIGTERM[soft,auth-failure] received, process exiting
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement