Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 2018-04-24 23:56:22 official build 0.6.73 running on samsung SM-G935F (universal8890), Android 7.0 (NRD90M) API 24, ABI arm64-v8a, (samsung/hero2ltexx/hero2lte:7.0/NRD90M/G935FXXU2DRC6:user/release-keys)
- 2018-04-24 23:56:22 Building configuration…
- 2018-04-24 23:56:22 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):
- 2018-04-24 23:56:22 New OpenVPN Status (VPN_GENERATE_CONFIG->LEVEL_START):
- 2018-04-24 23:56:22 started Socket Thread
- 2018-04-24 23:56:22 Network Status: CONNECTED to WIFI "Anonymous_5GHz"
- 2018-04-24 23:56:22 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:56:22 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:56:22 P:Initializing Google Breakpad!
- 2018-04-24 23:56:22 Current Parameter Settings:
- 2018-04-24 23:56:22 config = '/data/user/0/de.blinkt.openvpn/cache/android.conf'
- 2018-04-24 23:56:22 Waiting 0s seconds between connection attempt
- 2018-04-24 23:56:22 mode = 0
- 2018-04-24 23:56:22 show_ciphers = DISABLED
- 2018-04-24 23:56:22 show_digests = DISABLED
- 2018-04-24 23:56:22 show_engines = DISABLED
- 2018-04-24 23:56:22 genkey = DISABLED
- 2018-04-24 23:56:22 key_pass_file = '[UNDEF]'
- 2018-04-24 23:56:22 show_tls_ciphers = DISABLED
- 2018-04-24 23:56:22 connect_retry_max = 0
- 2018-04-24 23:56:22 Connection profiles [0]:
- 2018-04-24 23:56:22 proto = tcp-client
- 2018-04-24 23:56:22 local = '[UNDEF]'
- 2018-04-24 23:56:22 local_port = '[UNDEF]'
- 2018-04-24 23:56:22 remote = 'europe.vpn.airdns.org'
- 2018-04-24 23:56:22 remote_port = '443'
- 2018-04-24 23:56:22 remote_float = DISABLED
- 2018-04-24 23:56:22 bind_defined = DISABLED
- 2018-04-24 23:56:22 bind_local = DISABLED
- 2018-04-24 23:56:22 bind_ipv6_only = DISABLED
- 2018-04-24 23:56:22 connect_retry_seconds = 2
- 2018-04-24 23:56:22 connect_timeout = 120
- 2018-04-24 23:56:22 socks_proxy_server = '[UNDEF]'
- 2018-04-24 23:56:22 socks_proxy_port = '[UNDEF]'
- 2018-04-24 23:56:22 tun_mtu = 1500
- 2018-04-24 23:56:22 tun_mtu_defined = ENABLED
- 2018-04-24 23:56:22 link_mtu = 1500
- 2018-04-24 23:56:22 link_mtu_defined = DISABLED
- 2018-04-24 23:56:22 tun_mtu_extra = 0
- 2018-04-24 23:56:22 tun_mtu_extra_defined = DISABLED
- 2018-04-24 23:56:22 mtu_discover_type = -1
- 2018-04-24 23:56:22 fragment = 0
- 2018-04-24 23:56:22 mssfix = 1450
- 2018-04-24 23:56:22 explicit_exit_notification = 0
- 2018-04-24 23:56:22 Connection profiles END
- 2018-04-24 23:56:22 remote_random = DISABLED
- 2018-04-24 23:56:22 ipchange = '[UNDEF]'
- 2018-04-24 23:56:22 dev = 'tun'
- 2018-04-24 23:56:22 dev_type = '[UNDEF]'
- 2018-04-24 23:56:22 dev_node = '[UNDEF]'
- 2018-04-24 23:56:22 lladdr = '[UNDEF]'
- 2018-04-24 23:56:22 topology = 1
- 2018-04-24 23:56:22 ifconfig_local = '[UNDEF]'
- 2018-04-24 23:56:22 ifconfig_remote_netmask = '[UNDEF]'
- 2018-04-24 23:56:22 ifconfig_noexec = DISABLED
- 2018-04-24 23:56:22 ifconfig_nowarn = ENABLED
- 2018-04-24 23:56:22 ifconfig_ipv6_local = '[UNDEF]'
- 2018-04-24 23:56:22 ifconfig_ipv6_netbits = 0
- 2018-04-24 23:56:22 ifconfig_ipv6_remote = '[UNDEF]'
- 2018-04-24 23:56:22 shaper = 0
- 2018-04-24 23:56:22 mtu_test = 0
- 2018-04-24 23:56:22 mlock = DISABLED
- 2018-04-24 23:56:22 keepalive_ping = 0
- 2018-04-24 23:56:22 keepalive_timeout = 0
- 2018-04-24 23:56:22 inactivity_timeout = 0
- 2018-04-24 23:56:22 ping_send_timeout = 0
- 2018-04-24 23:56:22 ping_rec_timeout = 0
- 2018-04-24 23:56:22 ping_rec_timeout_action = 0
- 2018-04-24 23:56:22 ping_timer_remote = DISABLED
- 2018-04-24 23:56:22 remap_sigusr1 = 0
- 2018-04-24 23:56:22 persist_tun = ENABLED
- 2018-04-24 23:56:22 persist_local_ip = DISABLED
- 2018-04-24 23:56:22 persist_remote_ip = DISABLED
- 2018-04-24 23:56:22 persist_key = DISABLED
- 2018-04-24 23:56:22 passtos = DISABLED
- 2018-04-24 23:56:22 resolve_retry_seconds = 1000000000
- 2018-04-24 23:56:22 resolve_in_advance = ENABLED
- 2018-04-24 23:56:22 username = '[UNDEF]'
- 2018-04-24 23:56:22 groupname = '[UNDEF]'
- 2018-04-24 23:56:22 chroot_dir = '[UNDEF]'
- 2018-04-24 23:56:22 cd_dir = '[UNDEF]'
- 2018-04-24 23:56:22 writepid = '[UNDEF]'
- 2018-04-24 23:56:22 up_script = '[UNDEF]'
- 2018-04-24 23:56:22 down_script = '[UNDEF]'
- 2018-04-24 23:56:22 down_pre = DISABLED
- 2018-04-24 23:56:22 up_restart = DISABLED
- 2018-04-24 23:56:22 up_delay = DISABLED
- 2018-04-24 23:56:22 daemon = DISABLED
- 2018-04-24 23:56:22 inetd = 0
- 2018-04-24 23:56:22 log = DISABLED
- 2018-04-24 23:56:22 suppress_timestamps = DISABLED
- 2018-04-24 23:56:22 machine_readable_output = ENABLED
- 2018-04-24 23:56:22 nice = 0
- 2018-04-24 23:56:22 verbosity = 4
- 2018-04-24 23:56:22 mute = 0
- 2018-04-24 23:56:22 gremlin = 0
- 2018-04-24 23:56:22 status_file = '[UNDEF]'
- 2018-04-24 23:56:22 status_file_version = 1
- 2018-04-24 23:56:22 status_file_update_freq = 60
- 2018-04-24 23:56:22 occ = ENABLED
- 2018-04-24 23:56:22 rcvbuf = 0
- 2018-04-24 23:56:22 sndbuf = 0
- 2018-04-24 23:56:22 sockflags = 0
- 2018-04-24 23:56:22 fast_io = DISABLED
- 2018-04-24 23:56:22 comp.alg = 2
- 2018-04-24 23:56:22 comp.flags = 1
- 2018-04-24 23:56:22 route_script = '[UNDEF]'
- 2018-04-24 23:56:22 route_default_gateway = '[UNDEF]'
- 2018-04-24 23:56:22 route_default_metric = 0
- 2018-04-24 23:56:22 route_noexec = DISABLED
- 2018-04-24 23:56:22 route_delay = 0
- 2018-04-24 23:56:22 route_delay_window = 30
- 2018-04-24 23:56:22 route_delay_defined = DISABLED
- 2018-04-24 23:56:22 route_nopull = DISABLED
- 2018-04-24 23:56:22 route_gateway_via_dhcp = DISABLED
- 2018-04-24 23:56:22 allow_pull_fqdn = DISABLED
- 2018-04-24 23:56:22 management_addr = '/data/user/0/de.blinkt.openvpn/cache/mgmtsocket'
- 2018-04-24 23:56:22 management_port = 'unix'
- 2018-04-24 23:56:22 management_user_pass = '[UNDEF]'
- 2018-04-24 23:56:22 management_log_history_cache = 250
- 2018-04-24 23:56:22 management_echo_buffer_size = 100
- 2018-04-24 23:56:22 management_write_peer_info_file = '[UNDEF]'
- 2018-04-24 23:56:22 management_client_user = '[UNDEF]'
- 2018-04-24 23:56:22 management_client_group = '[UNDEF]'
- 2018-04-24 23:56:22 management_flags = 4390
- 2018-04-24 23:56:22 shared_secret_file = '[UNDEF]'
- 2018-04-24 23:56:22 key_direction = 1
- 2018-04-24 23:56:22 ciphername = 'AES-256-CBC'
- 2018-04-24 23:56:22 ncp_enabled = ENABLED
- 2018-04-24 23:56:22 ncp_ciphers = 'AES-256-GCM:AES-128-GCM'
- 2018-04-24 23:56:22 authname = 'SHA1'
- 2018-04-24 23:56:22 prng_hash = 'SHA1'
- 2018-04-24 23:56:22 prng_nonce_secret_len = 16
- 2018-04-24 23:56:22 keysize = 0
- 2018-04-24 23:56:22 engine = DISABLED
- 2018-04-24 23:56:22 replay = ENABLED
- 2018-04-24 23:56:22 mute_replay_warnings = DISABLED
- 2018-04-24 23:56:22 replay_window = 64
- 2018-04-24 23:56:22 replay_time = 15
- 2018-04-24 23:56:22 packet_id_file = '[UNDEF]'
- 2018-04-24 23:56:22 test_crypto = DISABLED
- 2018-04-24 23:56:22 tls_server = DISABLED
- 2018-04-24 23:56:22 tls_client = ENABLED
- 2018-04-24 23:56:22 key_method = 2
- 2018-04-24 23:56:22 ca_file = '[[INLINE]]'
- 2018-04-24 23:56:22 ca_path = '[UNDEF]'
- 2018-04-24 23:56:22 dh_file = '[UNDEF]'
- 2018-04-24 23:56:22 cert_file = '[[INLINE]]'
- 2018-04-24 23:56:22 extra_certs_file = '[UNDEF]'
- 2018-04-24 23:56:22 priv_key_file = '[[INLINE]]'
- 2018-04-24 23:56:22 pkcs12_file = '[UNDEF]'
- 2018-04-24 23:56:22 cipher_list = '[UNDEF]'
- 2018-04-24 23:56:22 tls_verify = '[UNDEF]'
- 2018-04-24 23:56:22 tls_export_cert = '[UNDEF]'
- 2018-04-24 23:56:22 verify_x509_type = 0
- 2018-04-24 23:56:22 verify_x509_name = '[UNDEF]'
- 2018-04-24 23:56:22 crl_file = '[UNDEF]'
- 2018-04-24 23:56:22 ns_cert_type = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 65535
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_ku[i] = 0
- 2018-04-24 23:56:22 remote_cert_eku = 'TLS Web Server Authentication'
- 2018-04-24 23:56:22 ssl_flags = 0
- 2018-04-24 23:56:22 tls_timeout = 2
- 2018-04-24 23:56:22 renegotiate_bytes = -1
- 2018-04-24 23:56:22 renegotiate_packets = 0
- 2018-04-24 23:56:22 renegotiate_seconds = 3600
- 2018-04-24 23:56:22 handshake_window = 60
- 2018-04-24 23:56:22 transition_window = 3600
- 2018-04-24 23:56:22 single_session = DISABLED
- 2018-04-24 23:56:22 push_peer_info = DISABLED
- 2018-04-24 23:56:22 tls_exit = DISABLED
- 2018-04-24 23:56:22 tls_auth_file = '[[INLINE]]'
- 2018-04-24 23:56:22 tls_crypt_file = '[UNDEF]'
- 2018-04-24 23:56:22 client = ENABLED
- 2018-04-24 23:56:22 pull = ENABLED
- 2018-04-24 23:56:22 auth_user_pass_file = '[UNDEF]'
- 2018-04-24 23:56:22 OpenVPN 2.5-icsopenvpn [git:icsopenvpn-d51333c645c12713+] android-21-arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jun 26 2017
- 2018-04-24 23:56:22 library versions: OpenSSL 1.1.0f 25 May 2017, LZO 2.10
- 2018-04-24 23:56:22 MANAGEMENT: Connected to management server at /data/user/0/de.blinkt.openvpn/cache/mgmtsocket
- 2018-04-24 23:56:22 MANAGEMENT: CMD 'hold release'
- 2018-04-24 23:56:41 [server] Inactivity timeout (--ping-restart), restarting
- 2018-04-24 23:57:02 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-24 23:56:41 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-24 23:56:41 TCP/UDP: Closing socket
- 2018-04-24 23:57:02 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-24 23:56:41 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-24 23:56:41 Waiting 2s seconds between connection attempt
- 2018-04-24 23:56:41 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-04-24 23:56:41 MANAGEMENT: >STATE:1524607001,RECONNECTING,ping-restart,,,,,
- 2018-04-24 23:57:02 RESOLVE: Cannot resolve host address: europe.vpn.airdns.org:443 (No address associated with hostname)
- 2018-04-24 23:57:02 MANAGEMENT: CMD 'bytecount 2'
- 2018-04-24 23:57:02 MANAGEMENT: CMD 'state on'
- 2018-04-24 23:57:02 MANAGEMENT: CMD 'hold release'
- 2018-04-24 23:57:02 MANAGEMENT: CMD 'proxy NONE'
- 2018-04-24 23:57:02 MANAGEMENT: CMD 'bytecount 2'
- 2018-04-24 23:57:02 MANAGEMENT: CMD 'state on'
- 2018-04-24 23:57:03 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-24 23:57:03 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-24 23:57:03 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2018-04-24 23:57:03 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 2018-04-24 23:57:03 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
- 2018-04-24 23:57:03 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
- 2018-04-24 23:57:03 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
- 2018-04-24 23:57:03 Socket Buffers: R=[229376->524288] S=[229376->524288]
- 2018-04-24 23:57:03 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-24 23:57:03 UDP link local: (not bound)
- 2018-04-24 23:57:03 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:57:03 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:57:03 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:03 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:03 UDP link remote: [AF_INET]62.102.148.147:443
- 2018-04-24 23:57:03 MANAGEMENT: >STATE:1524607023,WAIT,,,,,,
- 2018-04-24 23:57:03 MANAGEMENT: >STATE:1524607023,AUTH,,,,,,
- 2018-04-24 23:57:03 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=60e9bc2a d4c660cc
- 2018-04-24 23:57:03 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- 2018-04-24 23:57:03 VERIFY KU OK
- 2018-04-24 23:57:03 Validating certificate extended key usage
- 2018-04-24 23:57:03 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2018-04-24 23:57:03 VERIFY EKU OK
- 2018-04-24 23:57:03 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- 2018-04-24 23:57:03 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
- 2018-04-24 23:57:03 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
- 2018-04-24 23:57:03 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
- 2018-04-24 23:57:03 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2018-04-24 23:57:03 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
- 2018-04-24 23:57:05 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:05 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,GET_CONFIG,,,,,,
- 2018-04-24 23:57:05 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2018-04-24 23:57:05 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-24 23:57:05 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-24 23:57:05 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 26,cipher AES-256-GCM'
- 2018-04-24 23:57:05 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-04-24 23:57:05 OPTIONS IMPORT: compression parms modified
- 2018-04-24 23:57:05 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-04-24 23:57:05 OPTIONS IMPORT: route options modified
- 2018-04-24 23:57:05 OPTIONS IMPORT: route-related options modified
- 2018-04-24 23:57:05 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-04-24 23:57:05 OPTIONS IMPORT: peer-id set
- 2018-04-24 23:57:05 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:05 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:05 OPTIONS IMPORT: adjusting link_mtu to 1625
- 2018-04-24 23:57:05 OPTIONS IMPORT: data channel crypto options modified
- 2018-04-24 23:57:05 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- 2018-04-24 23:57:05 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-24 23:57:05 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-24 23:57:05 GDG: SIOCGIFHWADDR(lo) failed
- 2018-04-24 23:57:05 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 2018-04-24 23:57:05 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,ASSIGN_IP,,10.4.14.106,,,,
- 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,ADD_ROUTES,,,,,,
- 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2018-04-24 23:57:05 Opening tun interface:
- 2018-04-24 23:57:05 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
- 2018-04-24 23:57:05 DNS Server: 10.4.0.1, 10.4.0.1, Domain: null
- 2018-04-24 23:57:05 Routes: 0.0.0.0/0, 10.4.0.0/16
- 2018-04-24 23:57:05 Routes excluded:
- 2018-04-24 23:57:05 VpnService routes installed: 0.0.0.0/0
- 2018-04-24 23:57:05 Disallowed VPN apps:
- 2018-04-24 23:57:05 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2018-04-24 23:57:05 Initialization Sequence Completed
- 2018-04-24 23:57:05 MANAGEMENT: >STATE:1524607025,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-24 23:57:05 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-24 23:57:05 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-24 23:57:06 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:57:06 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:57:07 MANAGEMENT: CMD 'proxy NONE'
- 2018-04-24 23:57:08 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-24 23:57:08 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:57:08 New OpenVPN Status (TCP_CONNECT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:57:08 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-24 23:57:08 LZO compression initializing
- 2018-04-24 23:57:08 Control Channel MTU parms [ L:1624 D:1182 EF:68 EB:0 ET:0 EL:3 ]
- 2018-04-24 23:57:08 Data Channel MTU parms [ L:1624 D:1450 EF:124 EB:406 ET:0 EL:3 ]
- 2018-04-24 23:57:08 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'
- 2018-04-24 23:57:08 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'
- 2018-04-24 23:57:08 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.144:443
- 2018-04-24 23:57:08 Socket Buffers: R=[1048576->1048576] S=[1048576->1048576]
- 2018-04-24 23:57:08 Attempting to establish TCP connection with [AF_INET]62.102.148.144:443 [nonblock]
- 2018-04-24 23:57:08 MANAGEMENT: >STATE:1524607028,TCP_CONNECT,,,,,,
- 2018-04-24 23:57:08 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-24 23:57:09 TCP connection established with [AF_INET]62.102.148.144:443
- 2018-04-24 23:57:09 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-24 23:57:09 TCP_CLIENT link local: (not bound)
- 2018-04-24 23:57:09 TCP_CLIENT link remote: [AF_INET]62.102.148.144:443
- 2018-04-24 23:57:09 MANAGEMENT: >STATE:1524607029,WAIT,,,,,,
- 2018-04-24 23:57:09 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:57:09 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:57:09 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:09 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:09 MANAGEMENT: >STATE:1524607029,AUTH,,,,,,
- 2018-04-24 23:57:09 TLS: Initial packet from [AF_INET]62.102.148.144:443, sid=8d779577 0b52d1da
- 2018-04-24 23:57:09 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- 2018-04-24 23:57:09 VERIFY KU OK
- 2018-04-24 23:57:09 Validating certificate extended key usage
- 2018-04-24 23:57:09 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2018-04-24 23:57:09 VERIFY EKU OK
- 2018-04-24 23:57:09 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hatysa, emailAddress=info@airvpn.org
- 2018-04-24 23:57:10 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2018-04-24 23:57:10 [Hatysa] Peer Connection Initiated with [AF_INET]62.102.148.144:443
- 2018-04-24 23:57:11 MANAGEMENT: >STATE:1524607031,GET_CONFIG,,,,,,
- 2018-04-24 23:57:11 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:11 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:57:11 SENT CONTROL [Hatysa]: 'PUSH_REQUEST' (status=1)
- 2018-04-24 23:57:11 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.5.6.56,,,,
- 2018-04-24 23:57:11 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.5.6.56,,,,
- 2018-04-24 23:57:11 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.6.56 255.255.0.0,peer-id 0,cipher AES-256-GCM'
- 2018-04-24 23:57:11 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-04-24 23:57:11 OPTIONS IMPORT: compression parms modified
- 2018-04-24 23:57:11 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-04-24 23:57:11 OPTIONS IMPORT: route options modified
- 2018-04-24 23:57:11 OPTIONS IMPORT: route-related options modified
- 2018-04-24 23:57:11 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-04-24 23:57:11 OPTIONS IMPORT: peer-id set
- 2018-04-24 23:57:11 OPTIONS IMPORT: adjusting link_mtu to 1627
- 2018-04-24 23:57:11 OPTIONS IMPORT: data channel crypto options modified
- 2018-04-24 23:57:11 Data Channel: using negotiated cipher 'AES-256-GCM'
- 2018-04-24 23:57:11 Data Channel MTU parms [ L:1555 D:1450 EF:55 EB:406 ET:0 EL:3 ]
- 2018-04-24 23:57:11 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-24 23:57:11 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-24 23:57:11 GDG: SIOCGIFHWADDR(lo) failed
- 2018-04-24 23:57:11 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 2018-04-24 23:57:11 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-04-24 23:57:11 MANAGEMENT: >STATE:1524607031,ASSIGN_IP,,10.5.6.56,,,,
- 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2018-04-24 23:57:11 Opening tun interface:
- 2018-04-24 23:57:11 Ignoring multicast route: 224.0.0.0/3
- 2018-04-24 23:57:11 Local IPv4: 10.5.6.56/16 IPv6: null MTU: 1500
- 2018-04-24 23:57:11 DNS Server: 10.5.0.1, Domain: null
- 2018-04-24 23:57:11 Routes: 0.0.0.0/0, 10.5.0.0/16
- 2018-04-24 23:57:11 Routes excluded: 192.168.0.5/24
- 2018-04-24 23:57:11 VpnService routes installed: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
- 2018-04-24 23:57:11 Disallowed VPN apps:
- 2018-04-24 23:57:11 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2018-04-24 23:57:11 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
- 2018-04-24 23:57:11 Initialization Sequence Completed
- 2018-04-24 23:57:11 MANAGEMENT: >STATE:1524607031,CONNECTED,SUCCESS,10.5.6.56,62.102.148.144,443,192.168.0.5,44872
- 2018-04-24 23:57:11 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.5.6.56,62.102.148.144,443,192.168.0.5,44872
- 2018-04-24 23:57:11 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.5.6.56,62.102.148.144,443,192.168.0.5,44872
- 2018-04-24 23:58:07 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:58:07 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:59:04 [server] Inactivity timeout (--ping-restart), restarting
- 2018-04-24 23:59:04 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-24 23:59:04 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-24 23:59:04 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-24 23:59:04 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-24 23:59:04 TCP/UDP: Closing socket
- 2018-04-24 23:59:04 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-04-24 23:59:04 MANAGEMENT: >STATE:1524607144,RECONNECTING,ping-restart,,,,,
- 2018-04-24 23:59:04 Waiting 2s seconds between connection attempt
- 2018-04-24 23:59:06 MANAGEMENT: CMD 'hold release'
- 2018-04-24 23:59:06 MANAGEMENT: CMD 'bytecount 2'
- 2018-04-24 23:59:06 MANAGEMENT: CMD 'proxy NONE'
- 2018-04-24 23:59:06 MANAGEMENT: CMD 'state on'
- 2018-04-24 23:59:07 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-24 23:59:07 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-24 23:59:07 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2018-04-24 23:59:07 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 2018-04-24 23:59:07 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
- 2018-04-24 23:59:07 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
- 2018-04-24 23:59:07 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:59:07 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-24 23:59:07 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
- 2018-04-24 23:59:07 Socket Buffers: R=[229376->524288] S=[229376->524288]
- 2018-04-24 23:59:07 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-24 23:59:07 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:59:07 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:59:07 UDP link local: (not bound)
- 2018-04-24 23:59:07 UDP link remote: [AF_INET]62.102.148.147:443
- 2018-04-24 23:59:07 MANAGEMENT: >STATE:1524607147,WAIT,,,,,,
- 2018-04-24 23:59:07 MANAGEMENT: >STATE:1524607147,AUTH,,,,,,
- 2018-04-24 23:59:07 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=dde8ba94 18c3b804
- 2018-04-24 23:59:07 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- 2018-04-24 23:59:07 VERIFY KU OK
- 2018-04-24 23:59:07 Validating certificate extended key usage
- 2018-04-24 23:59:07 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2018-04-24 23:59:07 VERIFY EKU OK
- 2018-04-24 23:59:07 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- 2018-04-24 23:59:07 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
- 2018-04-24 23:59:07 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
- 2018-04-24 23:59:07 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
- 2018-04-24 23:59:07 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2018-04-24 23:59:07 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
- 2018-04-24 23:59:08 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:59:08 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:59:08 MANAGEMENT: >STATE:1524607148,GET_CONFIG,,,,,,
- 2018-04-24 23:59:08 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2018-04-24 23:59:08 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 3,cipher AES-256-GCM'
- 2018-04-24 23:59:08 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-24 23:59:08 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-24 23:59:08 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-04-24 23:59:08 OPTIONS IMPORT: compression parms modified
- 2018-04-24 23:59:08 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-04-24 23:59:08 OPTIONS IMPORT: route options modified
- 2018-04-24 23:59:08 OPTIONS IMPORT: route-related options modified
- 2018-04-24 23:59:08 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-04-24 23:59:08 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:59:08 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-24 23:59:08 OPTIONS IMPORT: peer-id set
- 2018-04-24 23:59:08 OPTIONS IMPORT: adjusting link_mtu to 1625
- 2018-04-24 23:59:08 OPTIONS IMPORT: data channel crypto options modified
- 2018-04-24 23:59:08 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- 2018-04-24 23:59:08 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-24 23:59:08 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-24 23:59:08 GDG: SIOCGIFHWADDR(lo) failed
- 2018-04-24 23:59:08 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 2018-04-24 23:59:08 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-04-24 23:59:08 MANAGEMENT: >STATE:1524607148,ASSIGN_IP,,10.4.14.106,,,,
- 2018-04-24 23:59:08 Opening tun interface:
- 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2018-04-24 23:59:08 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
- 2018-04-24 23:59:08 DNS Server: 10.4.0.1, Domain: null
- 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-24 23:59:08 Routes: 0.0.0.0/0, 10.4.0.0/16
- 2018-04-24 23:59:08 Routes excluded:
- 2018-04-24 23:59:08 VpnService routes installed: 0.0.0.0/0
- 2018-04-24 23:59:08 Disallowed VPN apps:
- 2018-04-24 23:59:08 MANAGEMENT: >STATE:1524607148,ADD_ROUTES,,,,,,
- 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2018-04-24 23:59:08 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2018-04-24 23:59:09 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2018-04-24 23:59:09 Initialization Sequence Completed
- 2018-04-24 23:59:09 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-24 23:59:09 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-24 23:59:09 MANAGEMENT: >STATE:1524607149,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-24 23:59:09 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-24 23:59:10 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:00:14 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:00:14 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:00:51 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
- 2018-04-25 00:00:55 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
- 2018-04-25 00:01:03 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
- 2018-04-25 00:01:08 [server] Inactivity timeout (--ping-restart), restarting
- 2018-04-25 00:01:08 TCP/UDP: Closing socket
- 2018-04-25 00:01:08 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-04-25 00:01:08 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-25 00:01:08 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-25 00:01:08 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-25 00:01:08 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-25 00:01:08 Waiting 2s seconds between connection attempt
- 2018-04-25 00:01:08 MANAGEMENT: >STATE:1524607268,RECONNECTING,ping-restart,,,,,
- 2018-04-25 00:01:10 MANAGEMENT: CMD 'hold release'
- 2018-04-25 00:01:10 MANAGEMENT: CMD 'proxy NONE'
- 2018-04-25 00:01:10 MANAGEMENT: CMD 'bytecount 2'
- 2018-04-25 00:01:10 MANAGEMENT: CMD 'state on'
- 2018-04-25 00:01:11 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-25 00:01:11 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-25 00:01:11 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2018-04-25 00:01:11 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 2018-04-25 00:01:11 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
- 2018-04-25 00:01:11 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
- 2018-04-25 00:01:11 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
- 2018-04-25 00:01:11 Socket Buffers: R=[229376->524288] S=[229376->524288]
- 2018-04-25 00:01:11 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-25 00:01:11 UDP link local: (not bound)
- 2018-04-25 00:01:11 UDP link remote: [AF_INET]62.102.148.147:443
- 2018-04-25 00:01:11 MANAGEMENT: >STATE:1524607271,WAIT,,,,,,
- 2018-04-25 00:01:11 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-25 00:01:11 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-25 00:01:11 MANAGEMENT: >STATE:1524607271,AUTH,,,,,,
- 2018-04-25 00:01:11 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=79b71bb6 6d310f2e
- 2018-04-25 00:01:11 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:01:11 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:01:11 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- 2018-04-25 00:01:11 VERIFY KU OK
- 2018-04-25 00:01:11 Validating certificate extended key usage
- 2018-04-25 00:01:11 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2018-04-25 00:01:11 VERIFY EKU OK
- 2018-04-25 00:01:11 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- 2018-04-25 00:01:12 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
- 2018-04-25 00:01:12 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
- 2018-04-25 00:01:12 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
- 2018-04-25 00:01:12 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2018-04-25 00:01:12 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
- 2018-04-25 00:01:13 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:01:14 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:01:13 MANAGEMENT: >STATE:1524607273,GET_CONFIG,,,,,,
- 2018-04-25 00:01:14 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2018-04-25 00:01:14 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 46,cipher AES-256-GCM'
- 2018-04-25 00:01:14 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-25 00:01:14 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-25 00:01:14 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-04-25 00:01:14 OPTIONS IMPORT: compression parms modified
- 2018-04-25 00:01:14 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-04-25 00:01:14 OPTIONS IMPORT: route options modified
- 2018-04-25 00:01:14 OPTIONS IMPORT: route-related options modified
- 2018-04-25 00:01:14 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-04-25 00:01:14 OPTIONS IMPORT: peer-id set
- 2018-04-25 00:01:14 OPTIONS IMPORT: adjusting link_mtu to 1625
- 2018-04-25 00:01:14 OPTIONS IMPORT: data channel crypto options modified
- 2018-04-25 00:01:14 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- 2018-04-25 00:01:14 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:01:14 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:01:14 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-25 00:01:14 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-25 00:01:14 GDG: SIOCGIFHWADDR(lo) failed
- 2018-04-25 00:01:14 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 2018-04-25 00:01:14 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-04-25 00:01:14 MANAGEMENT: >STATE:1524607273,ASSIGN_IP,,10.4.14.106,,,,
- 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-25 00:01:14 MANAGEMENT: >STATE:1524607274,ADD_ROUTES,,,,,,
- 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2018-04-25 00:01:14 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'
- 2018-04-25 00:01:14 Initialization Sequence Completed
- 2018-04-25 00:01:14 MANAGEMENT: >STATE:1524607274,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:01:14 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:01:15 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:03:13 [server] Inactivity timeout (--ping-restart), restarting
- 2018-04-25 00:03:13 TCP/UDP: Closing socket
- 2018-04-25 00:03:13 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-04-25 00:03:13 MANAGEMENT: >STATE:1524607393,RECONNECTING,ping-restart,,,,,
- 2018-04-25 00:03:13 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-25 00:03:13 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-25 00:03:13 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-25 00:03:13 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-25 00:03:13 Waiting 2s seconds between connection attempt
- 2018-04-25 00:03:15 MANAGEMENT: CMD 'hold release'
- 2018-04-25 00:03:15 MANAGEMENT: CMD 'proxy NONE'
- 2018-04-25 00:03:15 MANAGEMENT: CMD 'bytecount 2'
- 2018-04-25 00:03:15 MANAGEMENT: CMD 'state on'
- 2018-04-25 00:03:16 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-25 00:03:16 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-25 00:03:16 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2018-04-25 00:03:16 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 2018-04-25 00:03:16 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
- 2018-04-25 00:03:16 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
- 2018-04-25 00:03:16 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
- 2018-04-25 00:03:16 Socket Buffers: R=[229376->524288] S=[229376->524288]
- 2018-04-25 00:03:16 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-25 00:03:16 UDP link local: (not bound)
- 2018-04-25 00:03:16 UDP link remote: [AF_INET]62.102.148.147:443
- 2018-04-25 00:03:16 MANAGEMENT: >STATE:1524607396,WAIT,,,,,,
- 2018-04-25 00:03:16 MANAGEMENT: >STATE:1524607396,AUTH,,,,,,
- 2018-04-25 00:03:16 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=19a0d371 ccf25948
- 2018-04-25 00:03:16 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-25 00:03:16 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-25 00:03:16 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:03:16 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:03:16 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- 2018-04-25 00:03:16 VERIFY KU OK
- 2018-04-25 00:03:16 Validating certificate extended key usage
- 2018-04-25 00:03:16 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2018-04-25 00:03:16 VERIFY EKU OK
- 2018-04-25 00:03:16 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- 2018-04-25 00:03:16 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
- 2018-04-25 00:03:16 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
- 2018-04-25 00:03:16 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
- 2018-04-25 00:03:16 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2018-04-25 00:03:16 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
- 2018-04-25 00:03:17 MANAGEMENT: >STATE:1524607397,GET_CONFIG,,,,,,
- 2018-04-25 00:03:17 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2018-04-25 00:03:17 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:03:17 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:03:19 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 15,cipher AES-256-GCM'
- 2018-04-25 00:03:19 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-04-25 00:03:19 OPTIONS IMPORT: compression parms modified
- 2018-04-25 00:03:19 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-04-25 00:03:19 OPTIONS IMPORT: route options modified
- 2018-04-25 00:03:19 OPTIONS IMPORT: route-related options modified
- 2018-04-25 00:03:19 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-04-25 00:03:19 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-25 00:03:19 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-25 00:03:19 OPTIONS IMPORT: peer-id set
- 2018-04-25 00:03:19 OPTIONS IMPORT: adjusting link_mtu to 1625
- 2018-04-25 00:03:19 OPTIONS IMPORT: data channel crypto options modified
- 2018-04-25 00:03:19 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- 2018-04-25 00:03:19 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-25 00:03:19 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-25 00:03:19 GDG: SIOCGIFHWADDR(lo) failed
- 2018-04-25 00:03:19 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 2018-04-25 00:03:19 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-04-25 00:03:19 MANAGEMENT: >STATE:1524607399,ASSIGN_IP,,10.4.14.106,,,,
- 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-25 00:03:19 MANAGEMENT: >STATE:1524607399,ADD_ROUTES,,,,,,
- 2018-04-25 00:03:19 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:03:19 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2018-04-25 00:03:19 Opening tun interface:
- 2018-04-25 00:03:19 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
- 2018-04-25 00:03:19 DNS Server: 10.4.0.1, 10.4.0.1, Domain: null
- 2018-04-25 00:03:19 Routes: 0.0.0.0/0, 10.4.0.0/16
- 2018-04-25 00:03:19 Routes excluded:
- 2018-04-25 00:03:19 VpnService routes installed: 0.0.0.0/0
- 2018-04-25 00:03:19 Disallowed VPN apps:
- 2018-04-25 00:03:19 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2018-04-25 00:03:19 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:03:19 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:03:19 Initialization Sequence Completed
- 2018-04-25 00:03:19 MANAGEMENT: >STATE:1524607399,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:03:19 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:03:20 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:04:21 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:04:21 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:05:16 TLS Error: Unroutable control packet received from [AF_INET]62.102.148.147:443 (si=3 op=P_CONTROL_V1)
- 2018-04-25 00:05:19 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-25 00:05:19 New OpenVPN Status (RECONNECTING->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ping-restart,,,,,
- 2018-04-25 00:05:19 [server] Inactivity timeout (--ping-restart), restarting
- 2018-04-25 00:05:19 TCP/UDP: Closing socket
- 2018-04-25 00:05:19 SIGUSR1[soft,ping-restart] received, process restarting
- 2018-04-25 00:05:19 MANAGEMENT: >STATE:1524607519,RECONNECTING,ping-restart,,,,,
- 2018-04-25 00:05:19 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-25 00:05:19 New OpenVPN Status (CONNECTRETRY->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): 2
- 2018-04-25 00:05:19 Waiting 2s seconds between connection attempt
- 2018-04-25 00:05:21 MANAGEMENT: CMD 'hold release'
- 2018-04-25 00:05:21 MANAGEMENT: CMD 'bytecount 2'
- 2018-04-25 00:05:21 MANAGEMENT: CMD 'proxy NONE'
- 2018-04-25 00:05:21 MANAGEMENT: CMD 'state on'
- 2018-04-25 00:05:22 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-25 00:05:22 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
- 2018-04-25 00:05:22 Control Channel MTU parms [ L:1622 D:1184 EF:66 EB:0 ET:0 EL:3 ]
- 2018-04-25 00:05:22 Data Channel MTU parms [ L:1622 D:1450 EF:122 EB:406 ET:0 EL:3 ]
- 2018-04-25 00:05:22 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-client'
- 2018-04-25 00:05:22 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1550,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-GCM,auth [null-digest],keysize 256,tls-auth,key-method 2,tls-server'
- 2018-04-25 00:05:22 TCP/UDP: Preserving recently used remote address: [AF_INET]62.102.148.147:443
- 2018-04-25 00:05:22 Socket Buffers: R=[229376->524288] S=[229376->524288]
- 2018-04-25 00:05:22 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
- 2018-04-25 00:05:22 UDP link local: (not bound)
- 2018-04-25 00:05:22 UDP link remote: [AF_INET]62.102.148.147:443
- 2018-04-25 00:05:22 MANAGEMENT: >STATE:1524607522,WAIT,,,,,,
- 2018-04-25 00:05:22 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-25 00:05:22 New OpenVPN Status (WAIT->LEVEL_CONNECTING_NO_SERVER_REPLY_YET): ,,,,,
- 2018-04-25 00:05:22 MANAGEMENT: >STATE:1524607522,AUTH,,,,,,
- 2018-04-25 00:05:22 TLS: Initial packet from [AF_INET]62.102.148.147:443, sid=7db2b4aa 7d87ebce
- 2018-04-25 00:05:22 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:05:22 New OpenVPN Status (AUTH->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:05:22 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
- 2018-04-25 00:05:22 VERIFY KU OK
- 2018-04-25 00:05:22 Validating certificate extended key usage
- 2018-04-25 00:05:22 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
- 2018-04-25 00:05:22 VERIFY EKU OK
- 2018-04-25 00:05:22 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
- 2018-04-25 00:05:22 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1550', remote='link-mtu 1558'
- 2018-04-25 00:05:22 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher AES-256-CBC'
- 2018-04-25 00:05:22 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
- 2018-04-25 00:05:22 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
- 2018-04-25 00:05:22 [server] Peer Connection Initiated with [AF_INET]62.102.148.147:443
- 2018-04-25 00:05:23 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:05:23 New OpenVPN Status (GET_CONFIG->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:05:23 MANAGEMENT: >STATE:1524607523,GET_CONFIG,,,,,,
- 2018-04-25 00:05:23 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
- 2018-04-25 00:05:26 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.14.106 255.255.0.0,peer-id 18,cipher AES-256-GCM'
- 2018-04-25 00:05:26 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-25 00:05:26 New OpenVPN Status (ASSIGN_IP->LEVEL_CONNECTING_SERVER_REPLIED): ,10.4.14.106,,,,
- 2018-04-25 00:05:26 OPTIONS IMPORT: timers and/or timeouts modified
- 2018-04-25 00:05:26 OPTIONS IMPORT: compression parms modified
- 2018-04-25 00:05:26 OPTIONS IMPORT: --ifconfig/up options modified
- 2018-04-25 00:05:26 OPTIONS IMPORT: route options modified
- 2018-04-25 00:05:26 OPTIONS IMPORT: route-related options modified
- 2018-04-25 00:05:26 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
- 2018-04-25 00:05:26 OPTIONS IMPORT: peer-id set
- 2018-04-25 00:05:26 OPTIONS IMPORT: adjusting link_mtu to 1625
- 2018-04-25 00:05:26 OPTIONS IMPORT: data channel crypto options modified
- 2018-04-25 00:05:26 Data Channel MTU parms [ L:1553 D:1450 EF:53 EB:406 ET:0 EL:3 ]
- 2018-04-25 00:05:26 Data Channel Encrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-25 00:05:26 Data Channel Decrypt: Cipher 'AES-256-GCM' initialized with 256 bit key
- 2018-04-25 00:05:26 GDG: SIOCGIFHWADDR(lo) failed
- 2018-04-25 00:05:26 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
- 2018-04-25 00:05:26 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:05:26 New OpenVPN Status (ADD_ROUTES->LEVEL_CONNECTING_SERVER_REPLIED): ,,,,,
- 2018-04-25 00:05:26 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
- 2018-04-25 00:05:26 MANAGEMENT: >STATE:1524607526,ASSIGN_IP,,10.4.14.106,,,,
- 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
- 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-25 00:05:26 MANAGEMENT: >STATE:1524607526,ADD_ROUTES,,,,,,
- 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'ROUTE' ok'
- 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
- 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
- 2018-04-25 00:05:26 Opening tun interface:
- 2018-04-25 00:05:26 Local IPv4: 10.4.14.106/16 IPv6: null MTU: 1500
- 2018-04-25 00:05:26 DNS Server: 10.4.0.1, Domain: null
- 2018-04-25 00:05:26 Routes: 0.0.0.0/0, 10.4.0.0/16
- 2018-04-25 00:05:26 Routes excluded:
- 2018-04-25 00:05:26 VpnService routes installed: 0.0.0.0/0
- 2018-04-25 00:05:26 Disallowed VPN apps:
- 2018-04-25 00:05:26 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
- 2018-04-25 00:05:26 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:05:26 New OpenVPN Status (CONNECTED->LEVEL_CONNECTED): SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:05:26 Initialization Sequence Completed
- 2018-04-25 00:05:26 MANAGEMENT: >STATE:1524607526,CONNECTED,SUCCESS,10.4.14.106,62.102.148.147,443,,
- 2018-04-25 00:05:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:05:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:06:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
- 2018-04-25 00:06:27 Debug state info: CONNECTED to WIFI "Anonymous_5GHz", pause: userPause, shouldbeconnected: true, network: SHOULDBECONNECTED
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement