Advertisement
Guest User

VPN LOG

a guest
Apr 24th, 2018
1,314
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 52.50 KB | None | 0 0
  1. 2018-04-24 23:56:22 official build 0.6.73 running on samsung SM-G935F (universal8890), Android 7.0 (NRD90M) API 24, ABI arm64-v8a, (samsung/hero2ltexx/hero2lte:7.0/NRD90M/G935FXXU2DRC6:user/release-keys)
  2. 2018-04-24 23:56:22 Building configuration…
  3. 2018-04-24 23:56:22 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):
  4. 2018-04-24 23:56:22 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):
  5. 2018-04-24 23:56:22 started Socket Thread
  6. 2018-04-24 23:56:22 Network Status: CONNECTED to WIFI "Anonymous_5GHz"
  7. 2018-04-24 23:56:22 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  8. 2018-04-24 23:56:22 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  9. 2018-04-24 23:56:22 P:Initializing Google Breakpad!
  10. 2018-04-24 23:56:22 Current Parameter Settings:
  11. 2018-04-24 23:56:22 config = '/data/user/0/de.blinkt.openvpn/cache/android.conf'
  12. 2018-04-24 23:56:22 Waiting 0s seconds between connection attempt
  13. 2018-04-24 23:56:22 mode = 0
  14. 2018-04-24 23:56:22 show_ciphers = DISABLED
  15. 2018-04-24 23:56:22 show_digests = DISABLED
  16. 2018-04-24 23:56:22 show_engines = DISABLED
  17. 2018-04-24 23:56:22 genkey = DISABLED
  18. 2018-04-24 23:56:22 key_pass_file = '[UNDEF]'
  19. 2018-04-24 23:56:22 show_tls_ciphers = DISABLED
  20. 2018-04-24 23:56:22 connect_retry_max = 0
  21. 2018-04-24 23:56:22 Connection profiles [0]:
  22. 2018-04-24 23:56:22 proto = tcp-client
  23. 2018-04-24 23:56:22 local = '[UNDEF]'
  24. 2018-04-24 23:56:22 local_port = '[UNDEF]'
  25. 2018-04-24 23:56:22 remote = 'europe.vpn.airdns.org'
  26. 2018-04-24 23:56:22 remote_port = '443'
  27. 2018-04-24 23:56:22 remote_float = DISABLED
  28. 2018-04-24 23:56:22 bind_defined = DISABLED
  29. 2018-04-24 23:56:22 bind_local = DISABLED
  30. 2018-04-24 23:56:22 bind_ipv6_only = DISABLED
  31. 2018-04-24 23:56:22 connect_retry_seconds = 2
  32. 2018-04-24 23:56:22 connect_timeout = 120
  33. 2018-04-24 23:56:22 socks_proxy_server = '[UNDEF]'
  34. 2018-04-24 23:56:22 socks_proxy_port = '[UNDEF]'
  35. 2018-04-24 23:56:22 tun_mtu = 1500
  36. 2018-04-24 23:56:22 tun_mtu_defined = ENABLED
  37. 2018-04-24 23:56:22 link_mtu = 1500
  38. 2018-04-24 23:56:22 link_mtu_defined = DISABLED
  39. 2018-04-24 23:56:22 tun_mtu_extra = 0
  40. 2018-04-24 23:56:22 tun_mtu_extra_defined = DISABLED
  41. 2018-04-24 23:56:22 mtu_discover_type = -1
  42. 2018-04-24 23:56:22 fragment = 0
  43. 2018-04-24 23:56:22 mssfix = 1450
  44. 2018-04-24 23:56:22 explicit_exit_notification = 0
  45. 2018-04-24 23:56:22 Connection profiles END
  46. 2018-04-24 23:56:22 remote_random = DISABLED
  47. 2018-04-24 23:56:22 ipchange = '[UNDEF]'
  48. 2018-04-24 23:56:22 dev = 'tun'
  49. 2018-04-24 23:56:22 dev_type = '[UNDEF]'
  50. 2018-04-24 23:56:22 dev_node = '[UNDEF]'
  51. 2018-04-24 23:56:22 lladdr = '[UNDEF]'
  52. 2018-04-24 23:56:22 topology = 1
  53. 2018-04-24 23:56:22 ifconfig_local = '[UNDEF]'
  54. 2018-04-24 23:56:22 ifconfig_remote_netmask = '[UNDEF]'
  55. 2018-04-24 23:56:22 ifconfig_noexec = DISABLED
  56. 2018-04-24 23:56:22 ifconfig_nowarn = ENABLED
  57. 2018-04-24 23:56:22 ifconfig_ipv6_local = '[UNDEF]'
  58. 2018-04-24 23:56:22 ifconfig_ipv6_netbits = 0
  59. 2018-04-24 23:56:22 ifconfig_ipv6_remote = '[UNDEF]'
  60. 2018-04-24 23:56:22 shaper = 0
  61. 2018-04-24 23:56:22 mtu_test = 0
  62. 2018-04-24 23:56:22 mlock = DISABLED
  63. 2018-04-24 23:56:22 keepalive_ping = 0
  64. 2018-04-24 23:56:22 keepalive_timeout = 0
  65. 2018-04-24 23:56:22 inactivity_timeout = 0
  66. 2018-04-24 23:56:22 ping_send_timeout = 0
  67. 2018-04-24 23:56:22 ping_rec_timeout = 0
  68. 2018-04-24 23:56:22 ping_rec_timeout_action = 0
  69. 2018-04-24 23:56:22 ping_timer_remote = DISABLED
  70. 2018-04-24 23:56:22 remap_sigusr1 = 0
  71. 2018-04-24 23:56:22 persist_tun = ENABLED
  72. 2018-04-24 23:56:22 persist_local_ip = DISABLED
  73. 2018-04-24 23:56:22 persist_remote_ip = DISABLED
  74. 2018-04-24 23:56:22 persist_key = DISABLED
  75. 2018-04-24 23:56:22 passtos = DISABLED
  76. 2018-04-24 23:56:22 resolve_retry_seconds = 1000000000
  77. 2018-04-24 23:56:22 resolve_in_advance = ENABLED
  78. 2018-04-24 23:56:22 username = '[UNDEF]'
  79. 2018-04-24 23:56:22 groupname = '[UNDEF]'
  80. 2018-04-24 23:56:22 chroot_dir = '[UNDEF]'
  81. 2018-04-24 23:56:22 cd_dir = '[UNDEF]'
  82. 2018-04-24 23:56:22 writepid = '[UNDEF]'
  83. 2018-04-24 23:56:22 up_script = '[UNDEF]'
  84. 2018-04-24 23:56:22 down_script = '[UNDEF]'
  85. 2018-04-24 23:56:22 down_pre = DISABLED
  86. 2018-04-24 23:56:22 up_restart = DISABLED
  87. 2018-04-24 23:56:22 up_delay = DISABLED
  88. 2018-04-24 23:56:22 daemon = DISABLED
  89. 2018-04-24 23:56:22 inetd = 0
  90. 2018-04-24 23:56:22 log = DISABLED
  91. 2018-04-24 23:56:22 suppress_timestamps = DISABLED
  92. 2018-04-24 23:56:22 machine_readable_output = ENABLED
  93. 2018-04-24 23:56:22 nice = 0
  94. 2018-04-24 23:56:22 verbosity = 4
  95. 2018-04-24 23:56:22 mute = 0
  96. 2018-04-24 23:56:22 gremlin = 0
  97. 2018-04-24 23:56:22 status_file = '[UNDEF]'
  98. 2018-04-24 23:56:22 status_file_version = 1
  99. 2018-04-24 23:56:22 status_file_update_freq = 60
  100. 2018-04-24 23:56:22 occ = ENABLED
  101. 2018-04-24 23:56:22 rcvbuf = 0
  102. 2018-04-24 23:56:22 sndbuf = 0
  103. 2018-04-24 23:56:22 sockflags = 0
  104. 2018-04-24 23:56:22 fast_io = DISABLED
  105. 2018-04-24 23:56:22 comp.alg = 2
  106. 2018-04-24 23:56:22 comp.flags = 1
  107. 2018-04-24 23:56:22 route_script = '[UNDEF]'
  108. 2018-04-24 23:56:22 route_default_gateway = '[UNDEF]'
  109. 2018-04-24 23:56:22 route_default_metric = 0
  110. 2018-04-24 23:56:22 route_noexec = DISABLED
  111. 2018-04-24 23:56:22 route_delay = 0
  112. 2018-04-24 23:56:22 route_delay_window = 30
  113. 2018-04-24 23:56:22 route_delay_defined = DISABLED
  114. 2018-04-24 23:56:22 route_nopull = DISABLED
  115. 2018-04-24 23:56:22 route_gateway_via_dhcp = DISABLED
  116. 2018-04-24 23:56:22 allow_pull_fqdn = DISABLED
  117. 2018-04-24 23:56:22 management_addr = '/data/user/0/de.blinkt.openvpn/cache/mgmtsocket'
  118. 2018-04-24 23:56:22 management_port = 'unix'
  119. 2018-04-24 23:56:22 management_user_pass = '[UNDEF]'
  120. 2018-04-24 23:56:22 management_log_history_cache = 250
  121. 2018-04-24 23:56:22 management_echo_buffer_size = 100
  122. 2018-04-24 23:56:22 management_write_peer_info_file = '[UNDEF]'
  123. 2018-04-24 23:56:22 management_client_user = '[UNDEF]'
  124. 2018-04-24 23:56:22 management_client_group = '[UNDEF]'
  125. 2018-04-24 23:56:22 management_flags = 4390
  126. 2018-04-24 23:56:22 shared_secret_file = '[UNDEF]'
  127. 2018-04-24 23:56:22 key_direction = 1
  128. 2018-04-24 23:56:22 ciphername = 'AES-256-CBC'
  129. 2018-04-24 23:56:22 ncp_enabled = ENABLED
  130. 2018-04-24 23:56:22 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
  131. 2018-04-24 23:56:22 authname = 'SHA1'
  132. 2018-04-24 23:56:22 prng_hash = 'SHA1'
  133. 2018-04-24 23:56:22 prng_nonce_secret_len = 16
  134. 2018-04-24 23:56:22 keysize = 0
  135. 2018-04-24 23:56:22 engine = DISABLED
  136. 2018-04-24 23:56:22 replay = ENABLED
  137. 2018-04-24 23:56:22 mute_replay_warnings = DISABLED
  138. 2018-04-24 23:56:22 replay_window = 64
  139. 2018-04-24 23:56:22 replay_time = 15
  140. 2018-04-24 23:56:22 packet_id_file = '[UNDEF]'
  141. 2018-04-24 23:56:22 test_crypto = DISABLED
  142. 2018-04-24 23:56:22 tls_server = DISABLED
  143. 2018-04-24 23:56:22 tls_client = ENABLED
  144. 2018-04-24 23:56:22 key_method = 2
  145. 2018-04-24 23:56:22 ca_file = '[[INLINE]]'
  146. 2018-04-24 23:56:22 ca_path = '[UNDEF]'
  147. 2018-04-24 23:56:22 dh_file = '[UNDEF]'
  148. 2018-04-24 23:56:22 cert_file = '[[INLINE]]'
  149. 2018-04-24 23:56:22 extra_certs_file = '[UNDEF]'
  150. 2018-04-24 23:56:22 priv_key_file = '[[INLINE]]'
  151. 2018-04-24 23:56:22 pkcs12_file = '[UNDEF]'
  152. 2018-04-24 23:56:22 cipher_list = '[UNDEF]'
  153. 2018-04-24 23:56:22 tls_verify = '[UNDEF]'
  154. 2018-04-24 23:56:22 tls_export_cert = '[UNDEF]'
  155. 2018-04-24 23:56:22 verify_x509_type = 0
  156. 2018-04-24 23:56:22 verify_x509_name = '[UNDEF]'
  157. 2018-04-24 23:56:22 crl_file = '[UNDEF]'
  158. 2018-04-24 23:56:22 ns_cert_type = 0
  159. 2018-04-24 23:56:22 remote_cert_ku[i] = 65535
  160. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  161. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  162. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  163. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  164. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  165. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  166. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  167. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  168. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  169. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  170. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  171. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  172. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  173. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  174. 2018-04-24 23:56:22 remote_cert_ku[i] = 0
  175. 2018-04-24 23:56:22 remote_cert_eku = 'TLS Web Server Authentication'
  176. 2018-04-24 23:56:22 ssl_flags = 0
  177. 2018-04-24 23:56:22 tls_timeout = 2
  178. 2018-04-24 23:56:22 renegotiate_bytes = -1
  179. 2018-04-24 23:56:22 renegotiate_packets = 0
  180. 2018-04-24 23:56:22 renegotiate_seconds = 3600
  181. 2018-04-24 23:56:22 handshake_window = 60
  182. 2018-04-24 23:56:22 transition_window = 3600
  183. 2018-04-24 23:56:22 single_session = DISABLED
  184. 2018-04-24 23:56:22 push_peer_info = DISABLED
  185. 2018-04-24 23:56:22 tls_exit = DISABLED
  186. 2018-04-24 23:56:22 tls_auth_file = '[[INLINE]]'
  187. 2018-04-24 23:56:22 tls_crypt_file = '[UNDEF]'
  188. 2018-04-24 23:56:22 client = ENABLED
  189. 2018-04-24 23:56:22 pull = ENABLED
  190. 2018-04-24 23:56:22 auth_user_pass_file = '[UNDEF]'
  191. 2018-04-24 23:56:22 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d51333c645c12713+] android-21-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 26 2017
  192. 2018-04-24 23:56:22 library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10
  193. 2018-04-24 23:56:22 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket
  194. 2018-04-24 23:56:22 MANAGEMENT: CMD 'hold release'
  195. 2018-04-24 23:56:41 [server] Inactivity timeout (--ping-restart), restarting
  196. 2018-04-24 23:57:02 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  197. 2018-04-24 23:56:41 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  198. 2018-04-24 23:56:41 TCP/UDP: Closing socket
  199. 2018-04-24 23:57:02 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  200. 2018-04-24 23:56:41 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  201. 2018-04-24 23:56:41 Waiting 2s seconds between connection attempt
  202. 2018-04-24 23:56:41 SIGUSR1[soft,ping-restart] received, process restarting
  203. 2018-04-24 23:56:41 MANAGEMENT: >STATE:1524607001,RECONNECTING,ping-restart,,,,,
  204. 2018-04-24 23:57:02 RESOLVE: Cannot resolve host address: europe.vpn.airdns.org:443 (No address associated with hostname)
  205. 2018-04-24 23:57:02 MANAGEMENT: CMD 'bytecount 2'
  206. 2018-04-24 23:57:02 MANAGEMENT: CMD 'state on'
  207. 2018-04-24 23:57:02 MANAGEMENT: CMD 'hold release'
  208. 2018-04-24 23:57:02 MANAGEMENT: CMD 'proxy NONE'
  209. 2018-04-24 23:57:02 MANAGEMENT: CMD 'bytecount 2'
  210. 2018-04-24 23:57:02 MANAGEMENT: CMD 'state on'
  211. 2018-04-24 23:57:03 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  212. 2018-04-24 23:57:03 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  213. 2018-04-24 23:57:03 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  214. 2018-04-24 23:57:03 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  215. 2018-04-24 23:57:03 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
  216. 2018-04-24 23:57:03 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
  217. 2018-04-24 23:57:03 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
  218. 2018-04-24 23:57:03 Socket Buffers: R=[229376->524288] S=[229376->524288]
  219. 2018-04-24 23:57:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  220. 2018-04-24 23:57:03 UDP link local: (not bound)
  221. 2018-04-24 23:57:03 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  222. 2018-04-24 23:57:03 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  223. 2018-04-24 23:57:03 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  224. 2018-04-24 23:57:03 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  225. 2018-04-24 23:57:03 UDP link remote: [AF_INET]62.102.148.147:443
  226. 2018-04-24 23:57:03 MANAGEMENT: >STATE:1524607023,WAIT,,,,,,
  227. 2018-04-24 23:57:03 MANAGEMENT: >STATE:1524607023,AUTH,,,,,,
  228. 2018-04-24 23:57:03 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=60e9bc2a d4c660cc
  229. 2018-04-24 23:57:03 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  230. 2018-04-24 23:57:03 VERIFY KU OK
  231. 2018-04-24 23:57:03 Validating certificate extended key usage
  232. 2018-04-24 23:57:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  233. 2018-04-24 23:57:03 VERIFY EKU OK
  234. 2018-04-24 23:57:03 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  235. 2018-04-24 23:57:03 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
  236. 2018-04-24 23:57:03 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
  237. 2018-04-24 23:57:03 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  238. 2018-04-24 23:57:03 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  239. 2018-04-24 23:57:03 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
  240. 2018-04-24 23:57:05 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  241. 2018-04-24 23:57:05 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  242. 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,GET_CONFIG,,,,,,
  243. 2018-04-24 23:57:05 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  244. 2018-04-24 23:57:05 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  245. 2018-04-24 23:57:05 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  246. 2018-04-24 23:57:05 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 26,cipher AES-256-GCM'
  247. 2018-04-24 23:57:05 OPTIONS IMPORT: timers and/or timeouts modified
  248. 2018-04-24 23:57:05 OPTIONS IMPORT: compression parms modified
  249. 2018-04-24 23:57:05 OPTIONS IMPORT: --ifconfig/up options modified
  250. 2018-04-24 23:57:05 OPTIONS IMPORT: route options modified
  251. 2018-04-24 23:57:05 OPTIONS IMPORT: route-related options modified
  252. 2018-04-24 23:57:05 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  253. 2018-04-24 23:57:05 OPTIONS IMPORT: peer-id set
  254. 2018-04-24 23:57:05 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  255. 2018-04-24 23:57:05 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  256. 2018-04-24 23:57:05 OPTIONS IMPORT: adjusting link_mtu to 1625
  257. 2018-04-24 23:57:05 OPTIONS IMPORT: data channel crypto options modified
  258. 2018-04-24 23:57:05 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  259. 2018-04-24 23:57:05 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  260. 2018-04-24 23:57:05 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  261. 2018-04-24 23:57:05 GDG: SIOCGIFHWADDR(lo) failed
  262. 2018-04-24 23:57:05 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  263. 2018-04-24 23:57:05 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  264. 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,ASSIGN_IP,,10.4.14.106,,,,
  265. 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  266. 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  267. 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,ADD_ROUTES,,,,,,
  268. 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  269. 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  270. 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  271. 2018-04-24 23:57:05 Opening tun interface:
  272. 2018-04-24 23:57:05 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
  273. 2018-04-24 23:57:05 DNS Server: 10.4.0.1, 10.4.0.1, Domain: null
  274. 2018-04-24 23:57:05 Routes: 0.0.0.0/0, 10.4.0.0/16
  275. 2018-04-24 23:57:05 Routes excluded:
  276. 2018-04-24 23:57:05 VpnService routes installed: 0.0.0.0/0
  277. 2018-04-24 23:57:05 Disallowed VPN apps:
  278. 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  279. 2018-04-24 23:57:05 Initialization Sequence Completed
  280. 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
  281. 2018-04-24 23:57:05 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  282. 2018-04-24 23:57:05 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  283. 2018-04-24 23:57:06 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  284. 2018-04-24 23:57:06 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  285. 2018-04-24 23:57:07 MANAGEMENT: CMD 'proxy NONE'
  286. 2018-04-24 23:57:08 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  287. 2018-04-24 23:57:08 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  288. 2018-04-24 23:57:08 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  289. 2018-04-24 23:57:08 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  290. 2018-04-24 23:57:08 LZO compression initializing
  291. 2018-04-24 23:57:08 Control Channel MTU parms [ L:1624 D:1182 EF:68 EB:0 ET:0 EL:3 ]
  292. 2018-04-24 23:57:08 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
  293. 2018-04-24 23:57:08 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
  294. 2018-04-24 23:57:08 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
  295. 2018-04-24 23:57:08 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.144:443
  296. 2018-04-24 23:57:08 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
  297. 2018-04-24 23:57:08 Attempting to establish TCP connection with [AF_INET]62.102.148.144:443 [nonblock]
  298. 2018-04-24 23:57:08 MANAGEMENT: >STATE:1524607028,TCP_CONNECT,,,,,,
  299. 2018-04-24 23:57:08 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  300. 2018-04-24 23:57:09 TCP connection established with [AF_INET]62.102.148.144:443
  301. 2018-04-24 23:57:09 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  302. 2018-04-24 23:57:09 TCP_CLIENT link local: (not bound)
  303. 2018-04-24 23:57:09 TCP_CLIENT link remote: [AF_INET]62.102.148.144:443
  304. 2018-04-24 23:57:09 MANAGEMENT: >STATE:1524607029,WAIT,,,,,,
  305. 2018-04-24 23:57:09 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  306. 2018-04-24 23:57:09 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  307. 2018-04-24 23:57:09 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  308. 2018-04-24 23:57:09 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  309. 2018-04-24 23:57:09 MANAGEMENT: >STATE:1524607029,AUTH,,,,,,
  310. 2018-04-24 23:57:09 TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=8d779577 0b52d1da
  311. 2018-04-24 23:57:09 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  312. 2018-04-24 23:57:09 VERIFY KU OK
  313. 2018-04-24 23:57:09 Validating certificate extended key usage
  314. 2018-04-24 23:57:09 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  315. 2018-04-24 23:57:09 VERIFY EKU OK
  316. 2018-04-24 23:57:09 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org
  317. 2018-04-24 23:57:10 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  318. 2018-04-24 23:57:10 [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.144:443
  319. 2018-04-24 23:57:11 MANAGEMENT: >STATE:1524607031,GET_CONFIG,,,,,,
  320. 2018-04-24 23:57:11 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  321. 2018-04-24 23:57:11 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  322. 2018-04-24 23:57:11 SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1)
  323. 2018-04-24 23:57:11 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.5.6.56,,,,
  324. 2018-04-24 23:57:11 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.5.6.56,,,,
  325. 2018-04-24 23:57:11 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.6.56 255.255.0.0,peer-id 0,cipher AES-256-GCM'
  326. 2018-04-24 23:57:11 OPTIONS IMPORT: timers and/or timeouts modified
  327. 2018-04-24 23:57:11 OPTIONS IMPORT: compression parms modified
  328. 2018-04-24 23:57:11 OPTIONS IMPORT: --ifconfig/up options modified
  329. 2018-04-24 23:57:11 OPTIONS IMPORT: route options modified
  330. 2018-04-24 23:57:11 OPTIONS IMPORT: route-related options modified
  331. 2018-04-24 23:57:11 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  332. 2018-04-24 23:57:11 OPTIONS IMPORT: peer-id set
  333. 2018-04-24 23:57:11 OPTIONS IMPORT: adjusting link_mtu to 1627
  334. 2018-04-24 23:57:11 OPTIONS IMPORT: data channel crypto options modified
  335. 2018-04-24 23:57:11 Data Channel: using negotiated cipher 'AES-256-GCM'
  336. 2018-04-24 23:57:11 Data Channel MTU parms [ L:1555 D:1450 EF:55 EB:406 ET:0 EL:3 ]
  337. 2018-04-24 23:57:11 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  338. 2018-04-24 23:57:11 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  339. 2018-04-24 23:57:11 GDG: SIOCGIFHWADDR(lo) failed
  340. 2018-04-24 23:57:11 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  341. 2018-04-24 23:57:11 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  342. 2018-04-24 23:57:11 MANAGEMENT: >STATE:1524607031,ASSIGN_IP,,10.5.6.56,,,,
  343. 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  344. 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  345. 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  346. 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  347. 2018-04-24 23:57:11 Opening tun interface:
  348. 2018-04-24 23:57:11 Ignoring multicast route: 224.0.0.0/3
  349. 2018-04-24 23:57:11 Local IPv4: 10.5.6.56/16 IPv6: null MTU: 1500
  350. 2018-04-24 23:57:11 DNS Server: 10.5.0.1, Domain: null
  351. 2018-04-24 23:57:11 Routes: 0.0.0.0/0, 10.5.0.0/16
  352. 2018-04-24 23:57:11 Routes excluded: 192.168.0.5/24
  353. 2018-04-24 23:57:11 VpnService routes installed: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
  354. 2018-04-24 23:57:11 Disallowed VPN apps:
  355. 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  356. 2018-04-24 23:57:11 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  357. 2018-04-24 23:57:11 Initialization Sequence Completed
  358. 2018-04-24 23:57:11 MANAGEMENT: >STATE:1524607031,CONNECTED,SUCCESS,10.5.6.56,62.102.148.144,443,192.168.0.5,44872
  359. 2018-04-24 23:57:11 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.5.6.56,62.102.148.144,443,192.168.0.5,44872
  360. 2018-04-24 23:57:11 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.5.6.56,62.102.148.144,443,192.168.0.5,44872
  361. 2018-04-24 23:58:07 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  362. 2018-04-24 23:58:07 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  363. 2018-04-24 23:59:04 [server] Inactivity timeout (--ping-restart), restarting
  364. 2018-04-24 23:59:04 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  365. 2018-04-24 23:59:04 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  366. 2018-04-24 23:59:04 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  367. 2018-04-24 23:59:04 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  368. 2018-04-24 23:59:04 TCP/UDP: Closing socket
  369. 2018-04-24 23:59:04 SIGUSR1[soft,ping-restart] received, process restarting
  370. 2018-04-24 23:59:04 MANAGEMENT: >STATE:1524607144,RECONNECTING,ping-restart,,,,,
  371. 2018-04-24 23:59:04 Waiting 2s seconds between connection attempt
  372. 2018-04-24 23:59:06 MANAGEMENT: CMD 'hold release'
  373. 2018-04-24 23:59:06 MANAGEMENT: CMD 'bytecount 2'
  374. 2018-04-24 23:59:06 MANAGEMENT: CMD 'proxy NONE'
  375. 2018-04-24 23:59:06 MANAGEMENT: CMD 'state on'
  376. 2018-04-24 23:59:07 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  377. 2018-04-24 23:59:07 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  378. 2018-04-24 23:59:07 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  379. 2018-04-24 23:59:07 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  380. 2018-04-24 23:59:07 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
  381. 2018-04-24 23:59:07 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
  382. 2018-04-24 23:59:07 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  383. 2018-04-24 23:59:07 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  384. 2018-04-24 23:59:07 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
  385. 2018-04-24 23:59:07 Socket Buffers: R=[229376->524288] S=[229376->524288]
  386. 2018-04-24 23:59:07 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  387. 2018-04-24 23:59:07 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  388. 2018-04-24 23:59:07 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  389. 2018-04-24 23:59:07 UDP link local: (not bound)
  390. 2018-04-24 23:59:07 UDP link remote: [AF_INET]62.102.148.147:443
  391. 2018-04-24 23:59:07 MANAGEMENT: >STATE:1524607147,WAIT,,,,,,
  392. 2018-04-24 23:59:07 MANAGEMENT: >STATE:1524607147,AUTH,,,,,,
  393. 2018-04-24 23:59:07 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=dde8ba94 18c3b804
  394. 2018-04-24 23:59:07 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  395. 2018-04-24 23:59:07 VERIFY KU OK
  396. 2018-04-24 23:59:07 Validating certificate extended key usage
  397. 2018-04-24 23:59:07 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  398. 2018-04-24 23:59:07 VERIFY EKU OK
  399. 2018-04-24 23:59:07 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  400. 2018-04-24 23:59:07 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
  401. 2018-04-24 23:59:07 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
  402. 2018-04-24 23:59:07 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  403. 2018-04-24 23:59:07 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  404. 2018-04-24 23:59:07 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
  405. 2018-04-24 23:59:08 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  406. 2018-04-24 23:59:08 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  407. 2018-04-24 23:59:08 MANAGEMENT: >STATE:1524607148,GET_CONFIG,,,,,,
  408. 2018-04-24 23:59:08 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  409. 2018-04-24 23:59:08 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 3,cipher AES-256-GCM'
  410. 2018-04-24 23:59:08 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  411. 2018-04-24 23:59:08 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  412. 2018-04-24 23:59:08 OPTIONS IMPORT: timers and/or timeouts modified
  413. 2018-04-24 23:59:08 OPTIONS IMPORT: compression parms modified
  414. 2018-04-24 23:59:08 OPTIONS IMPORT: --ifconfig/up options modified
  415. 2018-04-24 23:59:08 OPTIONS IMPORT: route options modified
  416. 2018-04-24 23:59:08 OPTIONS IMPORT: route-related options modified
  417. 2018-04-24 23:59:08 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  418. 2018-04-24 23:59:08 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  419. 2018-04-24 23:59:08 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  420. 2018-04-24 23:59:08 OPTIONS IMPORT: peer-id set
  421. 2018-04-24 23:59:08 OPTIONS IMPORT: adjusting link_mtu to 1625
  422. 2018-04-24 23:59:08 OPTIONS IMPORT: data channel crypto options modified
  423. 2018-04-24 23:59:08 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  424. 2018-04-24 23:59:08 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  425. 2018-04-24 23:59:08 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  426. 2018-04-24 23:59:08 GDG: SIOCGIFHWADDR(lo) failed
  427. 2018-04-24 23:59:08 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  428. 2018-04-24 23:59:08 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  429. 2018-04-24 23:59:08 MANAGEMENT: >STATE:1524607148,ASSIGN_IP,,10.4.14.106,,,,
  430. 2018-04-24 23:59:08 Opening tun interface:
  431. 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  432. 2018-04-24 23:59:08 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
  433. 2018-04-24 23:59:08 DNS Server: 10.4.0.1, Domain: null
  434. 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  435. 2018-04-24 23:59:08 Routes: 0.0.0.0/0, 10.4.0.0/16
  436. 2018-04-24 23:59:08 Routes excluded:
  437. 2018-04-24 23:59:08 VpnService routes installed: 0.0.0.0/0
  438. 2018-04-24 23:59:08 Disallowed VPN apps:
  439. 2018-04-24 23:59:08 MANAGEMENT: >STATE:1524607148,ADD_ROUTES,,,,,,
  440. 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  441. 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  442. 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  443. 2018-04-24 23:59:09 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  444. 2018-04-24 23:59:09 Initialization Sequence Completed
  445. 2018-04-24 23:59:09 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  446. 2018-04-24 23:59:09 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  447. 2018-04-24 23:59:09 MANAGEMENT: >STATE:1524607149,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
  448. 2018-04-24 23:59:09 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  449. 2018-04-24 23:59:10 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  450. 2018-04-25 00:00:14 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  451. 2018-04-25 00:00:14 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  452. 2018-04-25 00:00:51 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
  453. 2018-04-25 00:00:55 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
  454. 2018-04-25 00:01:03 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
  455. 2018-04-25 00:01:08 [server] Inactivity timeout (--ping-restart), restarting
  456. 2018-04-25 00:01:08 TCP/UDP: Closing socket
  457. 2018-04-25 00:01:08 SIGUSR1[soft,ping-restart] received, process restarting
  458. 2018-04-25 00:01:08 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  459. 2018-04-25 00:01:08 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  460. 2018-04-25 00:01:08 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  461. 2018-04-25 00:01:08 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  462. 2018-04-25 00:01:08 Waiting 2s seconds between connection attempt
  463. 2018-04-25 00:01:08 MANAGEMENT: >STATE:1524607268,RECONNECTING,ping-restart,,,,,
  464. 2018-04-25 00:01:10 MANAGEMENT: CMD 'hold release'
  465. 2018-04-25 00:01:10 MANAGEMENT: CMD 'proxy NONE'
  466. 2018-04-25 00:01:10 MANAGEMENT: CMD 'bytecount 2'
  467. 2018-04-25 00:01:10 MANAGEMENT: CMD 'state on'
  468. 2018-04-25 00:01:11 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  469. 2018-04-25 00:01:11 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  470. 2018-04-25 00:01:11 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  471. 2018-04-25 00:01:11 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  472. 2018-04-25 00:01:11 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
  473. 2018-04-25 00:01:11 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
  474. 2018-04-25 00:01:11 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
  475. 2018-04-25 00:01:11 Socket Buffers: R=[229376->524288] S=[229376->524288]
  476. 2018-04-25 00:01:11 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  477. 2018-04-25 00:01:11 UDP link local: (not bound)
  478. 2018-04-25 00:01:11 UDP link remote: [AF_INET]62.102.148.147:443
  479. 2018-04-25 00:01:11 MANAGEMENT: >STATE:1524607271,WAIT,,,,,,
  480. 2018-04-25 00:01:11 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  481. 2018-04-25 00:01:11 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  482. 2018-04-25 00:01:11 MANAGEMENT: >STATE:1524607271,AUTH,,,,,,
  483. 2018-04-25 00:01:11 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=79b71bb6 6d310f2e
  484. 2018-04-25 00:01:11 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  485. 2018-04-25 00:01:11 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  486. 2018-04-25 00:01:11 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  487. 2018-04-25 00:01:11 VERIFY KU OK
  488. 2018-04-25 00:01:11 Validating certificate extended key usage
  489. 2018-04-25 00:01:11 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  490. 2018-04-25 00:01:11 VERIFY EKU OK
  491. 2018-04-25 00:01:11 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  492. 2018-04-25 00:01:12 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
  493. 2018-04-25 00:01:12 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
  494. 2018-04-25 00:01:12 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  495. 2018-04-25 00:01:12 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  496. 2018-04-25 00:01:12 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
  497. 2018-04-25 00:01:13 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  498. 2018-04-25 00:01:14 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  499. 2018-04-25 00:01:13 MANAGEMENT: >STATE:1524607273,GET_CONFIG,,,,,,
  500. 2018-04-25 00:01:14 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  501. 2018-04-25 00:01:14 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 46,cipher AES-256-GCM'
  502. 2018-04-25 00:01:14 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  503. 2018-04-25 00:01:14 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  504. 2018-04-25 00:01:14 OPTIONS IMPORT: timers and/or timeouts modified
  505. 2018-04-25 00:01:14 OPTIONS IMPORT: compression parms modified
  506. 2018-04-25 00:01:14 OPTIONS IMPORT: --ifconfig/up options modified
  507. 2018-04-25 00:01:14 OPTIONS IMPORT: route options modified
  508. 2018-04-25 00:01:14 OPTIONS IMPORT: route-related options modified
  509. 2018-04-25 00:01:14 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  510. 2018-04-25 00:01:14 OPTIONS IMPORT: peer-id set
  511. 2018-04-25 00:01:14 OPTIONS IMPORT: adjusting link_mtu to 1625
  512. 2018-04-25 00:01:14 OPTIONS IMPORT: data channel crypto options modified
  513. 2018-04-25 00:01:14 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  514. 2018-04-25 00:01:14 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  515. 2018-04-25 00:01:14 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  516. 2018-04-25 00:01:14 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  517. 2018-04-25 00:01:14 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  518. 2018-04-25 00:01:14 GDG: SIOCGIFHWADDR(lo) failed
  519. 2018-04-25 00:01:14 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  520. 2018-04-25 00:01:14 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  521. 2018-04-25 00:01:14 MANAGEMENT: >STATE:1524607273,ASSIGN_IP,,10.4.14.106,,,,
  522. 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  523. 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  524. 2018-04-25 00:01:14 MANAGEMENT: >STATE:1524607274,ADD_ROUTES,,,,,,
  525. 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  526. 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  527. 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'
  528. 2018-04-25 00:01:14 Initialization Sequence Completed
  529. 2018-04-25 00:01:14 MANAGEMENT: >STATE:1524607274,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
  530. 2018-04-25 00:01:14 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  531. 2018-04-25 00:01:15 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  532. 2018-04-25 00:03:13 [server] Inactivity timeout (--ping-restart), restarting
  533. 2018-04-25 00:03:13 TCP/UDP: Closing socket
  534. 2018-04-25 00:03:13 SIGUSR1[soft,ping-restart] received, process restarting
  535. 2018-04-25 00:03:13 MANAGEMENT: >STATE:1524607393,RECONNECTING,ping-restart,,,,,
  536. 2018-04-25 00:03:13 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  537. 2018-04-25 00:03:13 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  538. 2018-04-25 00:03:13 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  539. 2018-04-25 00:03:13 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  540. 2018-04-25 00:03:13 Waiting 2s seconds between connection attempt
  541. 2018-04-25 00:03:15 MANAGEMENT: CMD 'hold release'
  542. 2018-04-25 00:03:15 MANAGEMENT: CMD 'proxy NONE'
  543. 2018-04-25 00:03:15 MANAGEMENT: CMD 'bytecount 2'
  544. 2018-04-25 00:03:15 MANAGEMENT: CMD 'state on'
  545. 2018-04-25 00:03:16 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  546. 2018-04-25 00:03:16 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  547. 2018-04-25 00:03:16 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  548. 2018-04-25 00:03:16 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  549. 2018-04-25 00:03:16 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
  550. 2018-04-25 00:03:16 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
  551. 2018-04-25 00:03:16 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
  552. 2018-04-25 00:03:16 Socket Buffers: R=[229376->524288] S=[229376->524288]
  553. 2018-04-25 00:03:16 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  554. 2018-04-25 00:03:16 UDP link local: (not bound)
  555. 2018-04-25 00:03:16 UDP link remote: [AF_INET]62.102.148.147:443
  556. 2018-04-25 00:03:16 MANAGEMENT: >STATE:1524607396,WAIT,,,,,,
  557. 2018-04-25 00:03:16 MANAGEMENT: >STATE:1524607396,AUTH,,,,,,
  558. 2018-04-25 00:03:16 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=19a0d371 ccf25948
  559. 2018-04-25 00:03:16 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  560. 2018-04-25 00:03:16 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  561. 2018-04-25 00:03:16 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  562. 2018-04-25 00:03:16 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  563. 2018-04-25 00:03:16 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  564. 2018-04-25 00:03:16 VERIFY KU OK
  565. 2018-04-25 00:03:16 Validating certificate extended key usage
  566. 2018-04-25 00:03:16 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  567. 2018-04-25 00:03:16 VERIFY EKU OK
  568. 2018-04-25 00:03:16 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  569. 2018-04-25 00:03:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
  570. 2018-04-25 00:03:16 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
  571. 2018-04-25 00:03:16 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  572. 2018-04-25 00:03:16 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  573. 2018-04-25 00:03:16 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
  574. 2018-04-25 00:03:17 MANAGEMENT: >STATE:1524607397,GET_CONFIG,,,,,,
  575. 2018-04-25 00:03:17 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  576. 2018-04-25 00:03:17 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  577. 2018-04-25 00:03:17 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  578. 2018-04-25 00:03:19 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 15,cipher AES-256-GCM'
  579. 2018-04-25 00:03:19 OPTIONS IMPORT: timers and/or timeouts modified
  580. 2018-04-25 00:03:19 OPTIONS IMPORT: compression parms modified
  581. 2018-04-25 00:03:19 OPTIONS IMPORT: --ifconfig/up options modified
  582. 2018-04-25 00:03:19 OPTIONS IMPORT: route options modified
  583. 2018-04-25 00:03:19 OPTIONS IMPORT: route-related options modified
  584. 2018-04-25 00:03:19 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  585. 2018-04-25 00:03:19 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  586. 2018-04-25 00:03:19 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  587. 2018-04-25 00:03:19 OPTIONS IMPORT: peer-id set
  588. 2018-04-25 00:03:19 OPTIONS IMPORT: adjusting link_mtu to 1625
  589. 2018-04-25 00:03:19 OPTIONS IMPORT: data channel crypto options modified
  590. 2018-04-25 00:03:19 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  591. 2018-04-25 00:03:19 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  592. 2018-04-25 00:03:19 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  593. 2018-04-25 00:03:19 GDG: SIOCGIFHWADDR(lo) failed
  594. 2018-04-25 00:03:19 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  595. 2018-04-25 00:03:19 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  596. 2018-04-25 00:03:19 MANAGEMENT: >STATE:1524607399,ASSIGN_IP,,10.4.14.106,,,,
  597. 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  598. 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  599. 2018-04-25 00:03:19 MANAGEMENT: >STATE:1524607399,ADD_ROUTES,,,,,,
  600. 2018-04-25 00:03:19 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  601. 2018-04-25 00:03:19 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  602. 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  603. 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  604. 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  605. 2018-04-25 00:03:19 Opening tun interface:
  606. 2018-04-25 00:03:19 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
  607. 2018-04-25 00:03:19 DNS Server: 10.4.0.1, 10.4.0.1, Domain: null
  608. 2018-04-25 00:03:19 Routes: 0.0.0.0/0, 10.4.0.0/16
  609. 2018-04-25 00:03:19 Routes excluded:
  610. 2018-04-25 00:03:19 VpnService routes installed: 0.0.0.0/0
  611. 2018-04-25 00:03:19 Disallowed VPN apps:
  612. 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  613. 2018-04-25 00:03:19 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  614. 2018-04-25 00:03:19 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  615. 2018-04-25 00:03:19 Initialization Sequence Completed
  616. 2018-04-25 00:03:19 MANAGEMENT: >STATE:1524607399,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
  617. 2018-04-25 00:03:19 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  618. 2018-04-25 00:03:20 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  619. 2018-04-25 00:04:21 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  620. 2018-04-25 00:04:21 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  621. 2018-04-25 00:05:16 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
  622. 2018-04-25 00:05:19 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  623. 2018-04-25 00:05:19 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
  624. 2018-04-25 00:05:19 [server] Inactivity timeout (--ping-restart), restarting
  625. 2018-04-25 00:05:19 TCP/UDP: Closing socket
  626. 2018-04-25 00:05:19 SIGUSR1[soft,ping-restart] received, process restarting
  627. 2018-04-25 00:05:19 MANAGEMENT: >STATE:1524607519,RECONNECTING,ping-restart,,,,,
  628. 2018-04-25 00:05:19 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  629. 2018-04-25 00:05:19 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
  630. 2018-04-25 00:05:19 Waiting 2s seconds between connection attempt
  631. 2018-04-25 00:05:21 MANAGEMENT: CMD 'hold release'
  632. 2018-04-25 00:05:21 MANAGEMENT: CMD 'bytecount 2'
  633. 2018-04-25 00:05:21 MANAGEMENT: CMD 'proxy NONE'
  634. 2018-04-25 00:05:21 MANAGEMENT: CMD 'state on'
  635. 2018-04-25 00:05:22 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  636. 2018-04-25 00:05:22 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
  637. 2018-04-25 00:05:22 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
  638. 2018-04-25 00:05:22 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
  639. 2018-04-25 00:05:22 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
  640. 2018-04-25 00:05:22 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
  641. 2018-04-25 00:05:22 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
  642. 2018-04-25 00:05:22 Socket Buffers: R=[229376->524288] S=[229376->524288]
  643. 2018-04-25 00:05:22 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  644. 2018-04-25 00:05:22 UDP link local: (not bound)
  645. 2018-04-25 00:05:22 UDP link remote: [AF_INET]62.102.148.147:443
  646. 2018-04-25 00:05:22 MANAGEMENT: >STATE:1524607522,WAIT,,,,,,
  647. 2018-04-25 00:05:22 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  648. 2018-04-25 00:05:22 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
  649. 2018-04-25 00:05:22 MANAGEMENT: >STATE:1524607522,AUTH,,,,,,
  650. 2018-04-25 00:05:22 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=7db2b4aa 7d87ebce
  651. 2018-04-25 00:05:22 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  652. 2018-04-25 00:05:22 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  653. 2018-04-25 00:05:22 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
  654. 2018-04-25 00:05:22 VERIFY KU OK
  655. 2018-04-25 00:05:22 Validating certificate extended key usage
  656. 2018-04-25 00:05:22 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
  657. 2018-04-25 00:05:22 VERIFY EKU OK
  658. 2018-04-25 00:05:22 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
  659. 2018-04-25 00:05:22 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
  660. 2018-04-25 00:05:22 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
  661. 2018-04-25 00:05:22 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  662. 2018-04-25 00:05:22 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
  663. 2018-04-25 00:05:22 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
  664. 2018-04-25 00:05:23 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  665. 2018-04-25 00:05:23 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  666. 2018-04-25 00:05:23 MANAGEMENT: >STATE:1524607523,GET_CONFIG,,,,,,
  667. 2018-04-25 00:05:23 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  668. 2018-04-25 00:05:26 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 18,cipher AES-256-GCM'
  669. 2018-04-25 00:05:26 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  670. 2018-04-25 00:05:26 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
  671. 2018-04-25 00:05:26 OPTIONS IMPORT: timers and/or timeouts modified
  672. 2018-04-25 00:05:26 OPTIONS IMPORT: compression parms modified
  673. 2018-04-25 00:05:26 OPTIONS IMPORT: --ifconfig/up options modified
  674. 2018-04-25 00:05:26 OPTIONS IMPORT: route options modified
  675. 2018-04-25 00:05:26 OPTIONS IMPORT: route-related options modified
  676. 2018-04-25 00:05:26 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
  677. 2018-04-25 00:05:26 OPTIONS IMPORT: peer-id set
  678. 2018-04-25 00:05:26 OPTIONS IMPORT: adjusting link_mtu to 1625
  679. 2018-04-25 00:05:26 OPTIONS IMPORT: data channel crypto options modified
  680. 2018-04-25 00:05:26 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
  681. 2018-04-25 00:05:26 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  682. 2018-04-25 00:05:26 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
  683. 2018-04-25 00:05:26 GDG: SIOCGIFHWADDR(lo) failed
  684. 2018-04-25 00:05:26 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  685. 2018-04-25 00:05:26 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  686. 2018-04-25 00:05:26 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
  687. 2018-04-25 00:05:26 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  688. 2018-04-25 00:05:26 MANAGEMENT: >STATE:1524607526,ASSIGN_IP,,10.4.14.106,,,,
  689. 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  690. 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  691. 2018-04-25 00:05:26 MANAGEMENT: >STATE:1524607526,ADD_ROUTES,,,,,,
  692. 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  693. 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  694. 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  695. 2018-04-25 00:05:26 Opening tun interface:
  696. 2018-04-25 00:05:26 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
  697. 2018-04-25 00:05:26 DNS Server: 10.4.0.1, Domain: null
  698. 2018-04-25 00:05:26 Routes: 0.0.0.0/0, 10.4.0.0/16
  699. 2018-04-25 00:05:26 Routes excluded:
  700. 2018-04-25 00:05:26 VpnService routes installed: 0.0.0.0/0
  701. 2018-04-25 00:05:26 Disallowed VPN apps:
  702. 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  703. 2018-04-25 00:05:26 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  704. 2018-04-25 00:05:26 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
  705. 2018-04-25 00:05:26 Initialization Sequence Completed
  706. 2018-04-25 00:05:26 MANAGEMENT: >STATE:1524607526,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
  707. 2018-04-25 00:05:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  708. 2018-04-25 00:05:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  709. 2018-04-25 00:06:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
  710. 2018-04-25 00:06:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement