Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- ExpressVPN client version : 6.5.1
- ExpressVPN client build : 6.5.1 (6.5.1.3605)
- Operating system version : win10.0.0
- Timestamp: 2018-03-07 11:38:41.7675258 +0200 SAST
- Cluster list file version: 20180306|1|
- Cluster list download date: 2018-03-06 20:26:29.7680654 +0200 SAST
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.182, protocol: udp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: true, latency: 2001.2 ms, error: read udp 192.168.1.6:59110->128.248.202.182:9559: i/o timeout
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Disconnected with error: initial packet timeout
- Wed Mar 07 20:35:48 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:35:48 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:35:48 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:35:48 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:61976
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.184, protocol: udp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:35:49 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:35:49 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:49 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:49 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Wed Mar 07 20:35:49 2018 UDPv4 link local: [undef]
- Wed Mar 07 20:35:49 2018 UDPv4 link remote: [AF_INET]128.248.202.182:15362
- Wed Mar 07 20:35:49 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:35:49 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:35:49 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:35:49 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:61997
- Wed Mar 07 20:35:50 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:35:50 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:50 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:50 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Wed Mar 07 20:35:50 2018 UDPv4 link local: [undef]
- Wed Mar 07 20:35:50 2018 UDPv4 link remote: [AF_INET]128.248.202.184:26514
- Wed Mar 07 20:35:50 2018 TLS: Initial packet from [AF_INET]128.248.202.184:26514, sid=2a16c3be a6d429f1
- Wed Mar 07 20:35:50 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:35:51 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:35:51 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:35:51 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2705-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:35:51 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2705-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:35:52 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:35:52 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:52 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:35:52 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:52 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:35:52 2018 [Server-2705-0a] Peer Connection Initiated with [AF_INET]128.248.202.184:26514
- Wed Mar 07 20:35:54 2018 SENT CONTROL [Server-2705-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:35:55 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:35:55 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.191, protocol: udp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:35:58 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:35:58 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:35:58 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:35:58 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62020
- Wed Mar 07 20:35:59 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:35:59 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:59 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:35:59 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Wed Mar 07 20:35:59 2018 UDPv4 link local: [undef]
- Wed Mar 07 20:35:59 2018 UDPv4 link remote: [AF_INET]128.248.202.191:42350
- Wed Mar 07 20:35:59 2018 TLS: Initial packet from [AF_INET]128.248.202.191:42350, sid=54411b63 2b521472
- Wed Mar 07 20:35:59 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:36:00 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:00 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:36:00 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2698-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:00 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2698-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:01 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:01 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:01 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:01 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:01 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:36:01 2018 [Server-2698-0a] Peer Connection Initiated with [AF_INET]128.248.202.191:42350
- Wed Mar 07 20:36:03 2018 SENT CONTROL [Server-2698-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:36:04 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:36:04 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.185, protocol: udp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: true, latency: 2000.1 ms, error: read udp 192.168.1.6:59109->128.248.202.185:9559: i/o timeout
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:36:07 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:36:07 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:36:07 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:36:07 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62045
- Wed Mar 07 20:36:08 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:36:08 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:08 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:08 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Wed Mar 07 20:36:08 2018 UDPv4 link local: [undef]
- Wed Mar 07 20:36:08 2018 UDPv4 link remote: [AF_INET]128.248.202.185:45851
- Wed Mar 07 20:36:09 2018 TLS: Initial packet from [AF_INET]128.248.202.185:45851, sid=7d96f485 a44f9146
- Wed Mar 07 20:36:09 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:36:09 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:09 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:36:09 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2704-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:09 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2704-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:10 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:10 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:10 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:10 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:10 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:36:10 2018 [Server-2704-0a] Peer Connection Initiated with [AF_INET]128.248.202.185:45851
- Wed Mar 07 20:36:13 2018 SENT CONTROL [Server-2704-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:36:13 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:36:13 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.181, protocol: udp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:36:17 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:36:17 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:36:17 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:36:17 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62075
- Wed Mar 07 20:36:17 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:36:17 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:17 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:17 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Wed Mar 07 20:36:17 2018 UDPv4 link local: [undef]
- Wed Mar 07 20:36:17 2018 UDPv4 link remote: [AF_INET]128.248.202.181:30282
- Wed Mar 07 20:36:18 2018 TLS: Initial packet from [AF_INET]128.248.202.181:30282, sid=2b7d0bd7 8641a09b
- Wed Mar 07 20:36:18 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:36:18 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:18 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:36:18 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2690-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:18 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2690-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:19 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:19 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:19 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:19 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:19 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:36:19 2018 [Server-2690-0a] Peer Connection Initiated with [AF_INET]128.248.202.181:30282
- Wed Mar 07 20:36:22 2018 SENT CONTROL [Server-2690-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:36:22 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:36:22 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.190, protocol: udp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: true, latency: 2000.1 ms, error: read udp 192.168.1.6:59108->128.248.202.190:9559: i/o timeout
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:36:26 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:36:26 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:36:26 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:36:26 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62135
- Wed Mar 07 20:36:26 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:36:26 2018 Outgoing Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:26 2018 Incoming Control Channel Authentication: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:26 2018 Socket Buffers: R=[65536->524288] S=[65536->524288]
- Wed Mar 07 20:36:26 2018 UDPv4 link local: [undef]
- Wed Mar 07 20:36:26 2018 UDPv4 link remote: [AF_INET]128.248.202.190:48754
- Wed Mar 07 20:36:27 2018 TLS: Initial packet from [AF_INET]128.248.202.190:48754, sid=5619ebba 484bab91
- Wed Mar 07 20:36:27 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:36:27 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:27 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:36:27 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2699-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:27 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2699-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:28 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:28 2018 Data Channel Encrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:28 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:28 2018 Data Channel Decrypt: Using 256 bit message hash 'SHA256' for HMAC authentication
- Wed Mar 07 20:36:28 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:36:28 2018 [Server-2699-0a] Peer Connection Initiated with [AF_INET]128.248.202.190:48754
- Wed Mar 07 20:36:30 2018 SENT CONTROL [Server-2699-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:36:31 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:36:31 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.168, protocol: tcp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:36:34 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:36:34 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:36:34 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:36:34 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62242
- Wed Mar 07 20:36:35 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:36:35 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:35 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:35 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Mar 07 20:36:35 2018 Attempting to establish TCP connection with [AF_INET]128.248.202.168:443 [nonblock]
- Wed Mar 07 20:36:36 2018 TCP connection established with [AF_INET]128.248.202.168:443
- Wed Mar 07 20:36:36 2018 TCPv4_CLIENT link local: [undef]
- Wed Mar 07 20:36:36 2018 TCPv4_CLIENT link remote: [AF_INET]128.248.202.168:443
- Wed Mar 07 20:36:36 2018 TLS: Initial packet from [AF_INET]128.248.202.168:443, sid=29d38e13 fd28d49b
- Wed Mar 07 20:36:36 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:36:37 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:37 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:36:37 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2702-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:37 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2702-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:39 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:39 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:39 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:39 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:39 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:36:39 2018 [Server-2702-0a] Peer Connection Initiated with [AF_INET]128.248.202.168:443
- Wed Mar 07 20:36:41 2018 SENT CONTROL [Server-2702-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:36:42 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:36:42 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.214, protocol: tcp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:36:45 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:36:45 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:36:45 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:36:45 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62389
- Wed Mar 07 20:36:46 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:36:46 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:46 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:46 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Mar 07 20:36:46 2018 Attempting to establish TCP connection with [AF_INET]128.248.202.214:443 [nonblock]
- Wed Mar 07 20:36:47 2018 TCP connection established with [AF_INET]128.248.202.214:443
- Wed Mar 07 20:36:47 2018 TCPv4_CLIENT link local: [undef]
- Wed Mar 07 20:36:47 2018 TCPv4_CLIENT link remote: [AF_INET]128.248.202.214:443
- Wed Mar 07 20:36:48 2018 TLS: Initial packet from [AF_INET]128.248.202.214:443, sid=5a909a90 9cd74cf8
- Wed Mar 07 20:36:48 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:36:49 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:49 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:36:49 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2704-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:49 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2704-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:36:50 2018 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
- Wed Mar 07 20:36:50 2018 TLS Error: TLS handshake failed
- Wed Mar 07 20:36:51 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:51 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:51 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:36:51 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:51 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:36:51 2018 [Server-2704-0a] Peer Connection Initiated with [AF_INET]128.248.202.214:443
- Wed Mar 07 20:36:53 2018 SENT CONTROL [Server-2704-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:36:54 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:36:54 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.180, protocol: tcp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:36:57 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:36:57 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:36:57 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:36:57 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62540
- Wed Mar 07 20:36:57 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:36:57 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:57 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:36:57 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Mar 07 20:36:57 2018 Attempting to establish TCP connection with [AF_INET]128.248.202.180:443 [nonblock]
- Wed Mar 07 20:36:58 2018 TCP connection established with [AF_INET]128.248.202.180:443
- Wed Mar 07 20:36:58 2018 TCPv4_CLIENT link local: [undef]
- Wed Mar 07 20:36:58 2018 TCPv4_CLIENT link remote: [AF_INET]128.248.202.180:443
- Wed Mar 07 20:36:59 2018 TLS: Initial packet from [AF_INET]128.248.202.180:443, sid=c2fe4dd0 4d140aab
- Wed Mar 07 20:36:59 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:37:00 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:00 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:37:00 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2689-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:00 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2689-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:02 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:02 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:02 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:02 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:02 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:37:02 2018 [Server-2689-0a] Peer Connection Initiated with [AF_INET]128.248.202.180:443
- Wed Mar 07 20:37:04 2018 SENT CONTROL [Server-2689-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:37:05 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:37:05 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.215, protocol: tcp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: true, latency: 2001.2 ms, error: read udp 192.168.1.6:59112->128.248.202.215:9559: i/o timeout
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:37:09 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:37:09 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:37:09 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:37:09 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62705
- Wed Mar 07 20:37:09 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:37:09 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:09 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:09 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Mar 07 20:37:09 2018 Attempting to establish TCP connection with [AF_INET]128.248.202.215:443 [nonblock]
- Wed Mar 07 20:37:10 2018 TCP connection established with [AF_INET]128.248.202.215:443
- Wed Mar 07 20:37:10 2018 TCPv4_CLIENT link local: [undef]
- Wed Mar 07 20:37:10 2018 TCPv4_CLIENT link remote: [AF_INET]128.248.202.215:443
- Wed Mar 07 20:37:11 2018 TLS: Initial packet from [AF_INET]128.248.202.215:443, sid=933c3ae5 e9e2deef
- Wed Mar 07 20:37:11 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:37:12 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:12 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:37:12 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2703-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:12 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2703-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:14 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:14 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:14 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:14 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:14 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:37:14 2018 [Server-2703-0a] Peer Connection Initiated with [AF_INET]128.248.202.215:443
- Wed Mar 07 20:37:16 2018 SENT CONTROL [Server-2703-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:37:17 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:37:17 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.211, protocol: tcp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:37:21 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:37:21 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:37:21 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:37:21 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62870
- Wed Mar 07 20:37:21 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:37:21 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:21 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:21 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Mar 07 20:37:21 2018 Attempting to establish TCP connection with [AF_INET]128.248.202.211:443 [nonblock]
- Wed Mar 07 20:37:22 2018 TCP connection established with [AF_INET]128.248.202.211:443
- Wed Mar 07 20:37:22 2018 TCPv4_CLIENT link local: [undef]
- Wed Mar 07 20:37:22 2018 TCPv4_CLIENT link remote: [AF_INET]128.248.202.211:443
- Wed Mar 07 20:37:23 2018 TLS: Initial packet from [AF_INET]128.248.202.211:443, sid=e0407820 b5ce48d8
- Wed Mar 07 20:37:23 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:37:24 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:24 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:37:24 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2708-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:24 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2708-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:26 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:26 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:26 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:26 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:26 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:37:26 2018 [Server-2708-0a] Peer Connection Initiated with [AF_INET]128.248.202.211:443
- Wed Mar 07 20:37:28 2018 SENT CONTROL [Server-2708-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:37:29 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:37:29 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 128.248.202.165, protocol: tcp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms, x
- cluster packet loss rate: 66.7%
- Wed Mar 07 20:37:33 2018 OpenVPN 2.3.14 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Oct 13 2017
- Wed Mar 07 20:37:33 2018 Windows version 6.2 (Windows 8 or greater) 64bit
- Wed Mar 07 20:37:33 2018 library versions: OpenSSL 1.0.2l 25 May 2017, LZO 2.10
- Wed Mar 07 20:37:33 2018 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:62898
- Wed Mar 07 20:37:33 2018 Control Channel Authentication: tls-auth using INLINE static key file
- Wed Mar 07 20:37:33 2018 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:33 2018 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:33 2018 Socket Buffers: R=[65536->65536] S=[65536->65536]
- Wed Mar 07 20:37:33 2018 Attempting to establish TCP connection with [AF_INET]128.248.202.165:443 [nonblock]
- Wed Mar 07 20:37:34 2018 TCP connection established with [AF_INET]128.248.202.165:443
- Wed Mar 07 20:37:34 2018 TCPv4_CLIENT link local: [undef]
- Wed Mar 07 20:37:34 2018 TCPv4_CLIENT link remote: [AF_INET]128.248.202.165:443
- Wed Mar 07 20:37:35 2018 TLS: Initial packet from [AF_INET]128.248.202.165:443, sid=353d5b92 0f744cab
- Wed Mar 07 20:37:35 2018 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- Wed Mar 07 20:37:36 2018 VERIFY OK: depth=1, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=ExpressVPN CA, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:36 2018 VERIFY OK: nsCertType=SERVER
- Wed Mar 07 20:37:36 2018 VERIFY X509NAME OK: C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2707-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:36 2018 VERIFY OK: depth=0, C=VG, ST=BVI, O=ExpressVPN, OU=ExpressVPN, CN=Server-2707-0a, emailAddress=support@expressvpn.com
- Wed Mar 07 20:37:38 2018 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:38 2018 Data Channel Encrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:38 2018 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
- Wed Mar 07 20:37:38 2018 Data Channel Decrypt: Using 512 bit message hash 'SHA512' for HMAC authentication
- Wed Mar 07 20:37:38 2018 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
- Wed Mar 07 20:37:38 2018 [Server-2707-0a] Peer Connection Initiated with [AF_INET]128.248.202.165:443
- Wed Mar 07 20:37:40 2018 SENT CONTROL [Server-2707-0a]: 'PUSH_REQUEST' (status=1)
- Wed Mar 07 20:37:41 2018 AUTH: Received control message: AUTH_FAILED
- Wed Mar 07 20:37:41 2018 SIGTERM[soft,auth-failure] received, process exiting
- Disconnected with error: auth-failure
- ==============================================
- Connecting to Singapore - Jurong, ip: 24.23.131.148, protocol: l2tp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms
- cluster packet loss rate: 66.7%
- AdapterId=
- CONNECTING
- CONNECTING 5 OpenPort
- CONNECTING 10 PortOpened
- CONNECTING 15 ConnectDevice
- CONNECTING 20 DeviceConnected
- CONNECTING 25 AllDevicesConnected
- CONNECTING 40 Authenticate
- CONNECTING 50 AuthNotify
- CONNECTING 50 AuthNotify
- ERROR: Error while VPN connection is established: [RasDialException] The remote connection was denied because the user name and password combination you provided is not recognized, or the selected authentication protocol is not permitted on the remote acceDisconnected with error: ERROR: Error while VPN connection is established: [RasDialException] The remote connection was denied because the user name and password combination you provided is not recognized, or the selected authentication protocol is not permitted on the remote acce
- ss server.
- DISCONNECTED
- DISCONNECTED
- ==============================================
- Connecting to Singapore - Jurong, ip: 24.23.131.158, protocol: l2tp
- Diagnostics:
- has internet: false
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms
- cluster packet loss rate: 66.7%
- AdapterId=
- CONNECTING
- CONNECTING 5 OpenPort
- CONNECTING 10 PortOpened
- CONNECTING 15 ConnectDevice
- CONNECTING 20 DeviceConnected
- CONNECTING 25 AllDevicesConnected
- CONNECTING 40 Authenticate
- CONNECTING 50 AuthNotify
- CONNECTING 50 AuthNotify
- ERROR: Error while VPN connection is established: [RasDialException] The remote connection was denied because the user name and password combination you provided is not recognized, or the selected authentication protocol is not permitted on the remote acceDisconnected with error: ERROR: Error while VPN connection is established: [RasDialException] The remote connection was denied because the user name and password combination you provided is not recognized, or the selected authentication protocol is not permitted on the remote acce
- ss server.
- DISCONNECTED
- DISCONNECTED
- ==============================================
- Connecting to Singapore - Jurong, ip: 24.23.131.129, protocol: sstp
- Diagnostics:
- has internet: false
- udp ping: is_timeout: false, latency: 503.6 ms
- cluster stats: min/avg/max/stddev = 503.601/1505.858/2001.182/699.824 ms
- cluster packet loss rate: 66.7%
Add Comment
Please, Sign In to add comment