Advertisement
Guest User

Untitled

a guest
Apr 10th, 2019
314
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 42.04 KB | None | 0 0
  1. 10-04-2019 14:10:41 Application version 1.5.9 started
  2. 10-04-2019 09:13:52 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.5.9 работает на samsung SM-A720F (universal7880), Android 7.0 (NRD90M) API 24, ABI arm64-v8a, (samsung/a7y17ltexx/a7y17lte:7.0/NRD90M/A720FXXU2BQI6:user/release-keys)
  3. 10-04-2019 09:13:52 null WARN: <-- HTTP FAILED: java.net.UnknownHostException: Unable to resolve host "justapi.info": No address associated with hostname
  4. 10-04-2019 09:22:13 Obtaining IP address
  5. 10-04-2019 09:22:13 Background loading servers
  6. 10-04-2019 09:22:14 Obtaining location
  7. 10-04-2019 09:22:14 Current IP received : 213.87.129.93;213.87.129.93
  8. 10-04-2019 09:22:15 Servers list received
  9. 10-04-2019 09:22:15 Location received
  10. 10-04-2019 09:22:15 Создание конфигурации…
  11. 10-04-2019 09:22:15 started Socket Thread
  12. 10-04-2019 09:22:15 Статус сети: CONNECTED to WIFI "iPhone Мишаня"
  13. 10-04-2019 09:22:15 Current Parameter Settings:
  14. 10-04-2019 09:22:15 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  15. 10-04-2019 09:22:15 mode = 0
  16. 10-04-2019 09:22:15 show_ciphers = DISABLED
  17. 10-04-2019 09:22:15 show_digests = DISABLED
  18. 10-04-2019 09:22:15 show_engines = DISABLED
  19. 10-04-2019 09:22:15 genkey = DISABLED
  20. 10-04-2019 09:22:15 key_pass_file = '[UNDEF]'
  21. 10-04-2019 09:22:15 show_tls_ciphers = DISABLED
  22. 10-04-2019 09:22:15 connect_retry_max = 5
  23. 10-04-2019 09:22:15 Connection profiles [0]:
  24. 10-04-2019 09:22:15 proto = tcp-client
  25. 10-04-2019 09:22:15 local = '[UNDEF]'
  26. 10-04-2019 09:22:15 local_port = '[UNDEF]'
  27. 10-04-2019 09:22:15 remote = '188.64.171.248'
  28. 10-04-2019 09:22:15 remote_port = '443'
  29. 10-04-2019 09:22:15 remote_float = DISABLED
  30. 10-04-2019 09:22:15 bind_defined = DISABLED
  31. 10-04-2019 09:22:15 bind_local = DISABLED
  32. 10-04-2019 09:22:15 bind_ipv6_only = DISABLED
  33. 10-04-2019 09:22:15 NOTE: --mute triggered...
  34. 10-04-2019 09:22:15 164 variation(s) on previous 20 message(s) suppressed by --mute
  35. 10-04-2019 09:22:15 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  36. 10-04-2019 09:22:15 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  37. 10-04-2019 09:22:15 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  38. 10-04-2019 09:22:15 MANAGEMENT: CMD 'hold release'
  39. 10-04-2019 09:22:15 MANAGEMENT: CMD 'bytecount 2'
  40. 10-04-2019 09:22:15 MANAGEMENT: CMD 'state on'
  41. 10-04-2019 09:22:15 MANAGEMENT: CMD 'proxy NONE'
  42. 10-04-2019 09:22:16 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  43. 10-04-2019 09:22:16 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  44. 10-04-2019 09:22:17 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  45. 10-04-2019 09:22:17 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  46. 10-04-2019 09:22:17 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  47. 10-04-2019 09:22:17 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  48. 10-04-2019 09:22:17 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  49. 10-04-2019 09:22:17 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  50. 10-04-2019 09:22:17 MANAGEMENT: >STATE:1554877336,TCP_CONNECT,,,,,,
  51. 10-04-2019 09:22:17 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  52. 10-04-2019 09:22:18 TCP connection established with [AF_INET]188.64.171.248:443
  53. 10-04-2019 09:22:18 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  54. 10-04-2019 09:22:18 TCP_CLIENT link local: (not bound)
  55. 10-04-2019 09:22:18 TCP_CLIENT link remote: [AF_INET]188.64.171.248:443
  56. 10-04-2019 09:22:18 MANAGEMENT: >STATE:1554877338,WAIT,,,,,,
  57. 10-04-2019 09:22:18 Scrambler: disabled by config
  58. 10-04-2019 09:22:18 MANAGEMENT: >STATE:1554877338,AUTH,,,,,,
  59. 10-04-2019 09:22:18 TLS: Initial packet from [AF_INET]188.64.171.248:443, sid=99f2c38e 3dc13f5e
  60. 10-04-2019 09:22:19 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  61. 10-04-2019 09:22:19 VERIFY OK: nsCertType=SERVER
  62. 10-04-2019 09:22:19 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  63. 10-04-2019 09:22:19 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  64. 10-04-2019 09:22:19 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  65. 10-04-2019 09:22:19 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  66. 10-04-2019 09:22:19 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  67. 10-04-2019 09:22:19 [server] Peer Connection Initiated with [AF_INET]188.64.171.248:443
  68. 10-04-2019 09:22:20 MANAGEMENT: >STATE:1554877340,GET_CONFIG,,,,,,
  69. 10-04-2019 09:22:20 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  70. 10-04-2019 09:22:20 PUSH: Received control message: 'PUSH_REPLY,route 10.114.208.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.114.208.42 10.114.208.41,peer-id 0,cipher AES-256-GCM'
  71. 10-04-2019 09:22:20 OPTIONS IMPORT: timers and/or timeouts modified
  72. 10-04-2019 09:22:20 OPTIONS IMPORT: --ifconfig/up options modified
  73. 10-04-2019 09:22:20 OPTIONS IMPORT: route options modified
  74. 10-04-2019 09:22:20 OPTIONS IMPORT: peer-id set
  75. 10-04-2019 09:22:20 OPTIONS IMPORT: adjusting link_mtu to 1626
  76. 10-04-2019 09:22:20 OPTIONS IMPORT: data channel crypto options modified
  77. 10-04-2019 09:22:20 Data Channel: using negotiated cipher 'AES-256-GCM'
  78. 10-04-2019 09:22:20 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
  79. 10-04-2019 09:22:20 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  80. 10-04-2019 09:22:20 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  81. 10-04-2019 09:22:20 GDG: SIOCGIFHWADDR(lo) failed
  82. 10-04-2019 09:22:20 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  83. 10-04-2019 09:22:20 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  84. 10-04-2019 09:22:20 MANAGEMENT: >STATE:1554877340,ASSIGN_IP,,10.114.208.42,,,,
  85. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  86. 10-04-2019 09:22:20 MANAGEMENT: >STATE:1554877340,ADD_ROUTES,,,,,,
  87. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  88. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  89. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  90. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  91. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  92. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  93. 10-04-2019 09:22:20 Открытие TUN-интерфейса:
  94. 10-04-2019 09:22:20 Адрес IPv4: 10.114.208.42/30 IPv6: null MTU: 1500
  95. 10-04-2019 09:22:20 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
  96. 10-04-2019 09:22:20 Маршруты: 0.0.0.0/0, 10.114.208.0/20, 10.114.208.40/30
  97. 10-04-2019 09:22:20 Исключенные маршруты: 172.20.10.2/28
  98. 10-04-2019 09:22:20 Подключенные маршруты сервиса VPN: 0.0.0.0/1, 128.0.0.0/3, 160.0.0.0/5, 168.0.0.0/6, 172.0.0.0/12, 172.16.0.0/14, 172.20.0.0/21, 172.20.8.0/23, 172.20.10.16/28, 172.20.10.32/27, 172.20.10.64/26, 172.20.10.128/25, 172.20.11.0/24, 172.20.12.0/22, 172.20.16.0/20, 172.20.32.0/19, 172.20.64.0/18, 172.20.128.0/17, 172.21.0.0/16, 172.22.0.0/15, 172.24.0.0/13, 172.32.0.0/11, 172.64.0.0/10, 172.128.0.0/9, 173.0.0.0/8, 174.0.0.0/7, 176.0.0.0/4, 192.0.0.0/2
  99. 10-04-2019 09:22:20 Запрещенные VPN приложения:
  100. 10-04-2019 09:22:20 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  101. 10-04-2019 09:22:20 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  102. 10-04-2019 09:22:20 Initialization Sequence Completed
  103. 10-04-2019 09:22:20 MANAGEMENT: >STATE:1554877340,CONNECTED,SUCCESS,10.114.208.42,188.64.171.248,443,172.20.10.2,43546
  104. 10-04-2019 09:22:23 Obtaining IP address
  105. 10-04-2019 09:22:23 Obtaining IP address
  106. 10-04-2019 09:22:23 Internal authentication error
  107. 10-04-2019 09:22:24 Obtaining location
  108. 10-04-2019 09:22:24 Current IP received : 188.64.171.181;188.64.171.181
  109. 10-04-2019 09:22:24 Location received
  110. 10-04-2019 09:22:24 Current location : Russian Federation
  111. 10-04-2019 09:22:34 Internal authentication error
  112. 10-04-2019 09:22:47 Internal authentication error
  113. 10-04-2019 09:23:02 Internal authentication is successful
  114. 10-04-2019 09:36:00 Background loading servers
  115. 10-04-2019 09:36:03 Servers list received
  116. 10-04-2019 09:49:00 Background loading servers
  117. 10-04-2019 09:49:02 Servers list received
  118. 10-04-2019 09:55:30 Background loading servers
  119. 10-04-2019 09:55:33 Servers list received
  120. 10-04-2019 09:57:21 read TCP_CLIENT []: Software caused connection abort (code=103)
  121. 10-04-2019 09:57:21 Connection reset, restarting [0]
  122. 10-04-2019 09:57:21 TCP/UDP: Closing socket
  123. 10-04-2019 09:57:21 SIGUSR1[soft,connection-reset] received, process restarting
  124. 10-04-2019 09:57:21 MANAGEMENT: >STATE:1554879441,RECONNECTING,connection-reset,,,,,
  125. 10-04-2019 09:57:21 MANAGEMENT: CMD 'hold release'
  126. 10-04-2019 09:57:21 MANAGEMENT: CMD 'bytecount 2'
  127. 10-04-2019 09:57:21 MANAGEMENT: CMD 'state on'
  128. 10-04-2019 09:57:21 MANAGEMENT: CMD 'proxy NONE'
  129. 10-04-2019 09:57:21 Статус сети: not prepareSuccess
  130. 10-04-2019 09:57:22 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  131. 10-04-2019 09:57:22 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  132. 10-04-2019 09:57:22 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  133. 10-04-2019 09:57:22 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
  134. 10-04-2019 09:57:22 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
  135. 10-04-2019 09:57:22 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  136. 10-04-2019 09:57:22 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  137. 10-04-2019 09:57:22 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  138. 10-04-2019 09:57:22 MANAGEMENT: >STATE:1554879442,TCP_CONNECT,,,,,,
  139. 10-04-2019 09:57:22 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  140. 10-04-2019 09:57:22 TCP: connect to [AF_INET]188.64.171.248:443 failed: Network is unreachable
  141. 10-04-2019 09:57:22 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  142. 10-04-2019 09:57:22 MANAGEMENT: >STATE:1554879442,RECONNECTING,init_instance,,,,,
  143. 10-04-2019 09:57:26 MANAGEMENT: CMD 'hold release'
  144. 10-04-2019 09:57:26 MANAGEMENT: CMD 'proxy NONE'
  145. 10-04-2019 09:57:26 MANAGEMENT: CMD 'bytecount 2'
  146. 10-04-2019 09:57:26 MANAGEMENT: CMD 'state on'
  147. 10-04-2019 09:57:26 Статус сети: CONNECTED to WIFI "Telemir_118"
  148. 10-04-2019 09:57:27 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  149. 10-04-2019 09:57:27 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  150. 10-04-2019 09:57:27 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  151. 10-04-2019 09:57:27 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
  152. 10-04-2019 09:57:27 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
  153. 10-04-2019 09:57:27 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  154. 10-04-2019 09:57:27 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  155. 10-04-2019 09:57:27 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  156. 10-04-2019 09:57:27 MANAGEMENT: >STATE:1554879447,TCP_CONNECT,,,,,,
  157. 10-04-2019 09:57:27 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  158. 10-04-2019 09:57:28 TCP connection established with [AF_INET]188.64.171.248:443
  159. 10-04-2019 09:57:28 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  160. 10-04-2019 09:57:28 TCP_CLIENT link local: (not bound)
  161. 10-04-2019 09:57:28 TCP_CLIENT link remote: [AF_INET]188.64.171.248:443
  162. 10-04-2019 09:57:28 MANAGEMENT: >STATE:1554879448,WAIT,,,,,,
  163. 10-04-2019 09:57:28 Scrambler: disabled by config
  164. 10-04-2019 09:57:28 MANAGEMENT: >STATE:1554879448,AUTH,,,,,,
  165. 10-04-2019 09:57:28 TLS: Initial packet from [AF_INET]188.64.171.248:443, sid=ce28a6af 3628b79a
  166. 10-04-2019 09:57:28 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  167. 10-04-2019 09:57:28 VERIFY OK: nsCertType=SERVER
  168. 10-04-2019 09:57:28 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  169. 10-04-2019 09:57:29 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1551', remote='link-mtu 1543'
  170. 10-04-2019 09:57:29 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-GCM', remote='cipher BF-CBC'
  171. 10-04-2019 09:57:29 WARNING: 'auth' is used inconsistently, local='auth [null-digest]', remote='auth SHA1'
  172. 10-04-2019 09:57:29 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  173. 10-04-2019 09:57:29 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  174. 10-04-2019 09:57:29 [server] Peer Connection Initiated with [AF_INET]188.64.171.248:443
  175. 10-04-2019 09:57:30 MANAGEMENT: >STATE:1554879450,GET_CONFIG,,,,,,
  176. 10-04-2019 09:57:30 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  177. 10-04-2019 09:57:30 PUSH: Received control message: 'PUSH_REPLY,route 10.114.208.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.114.208.42 10.114.208.41,peer-id 0,cipher AES-256-GCM'
  178. 10-04-2019 09:57:30 OPTIONS IMPORT: timers and/or timeouts modified
  179. 10-04-2019 09:57:30 OPTIONS IMPORT: --ifconfig/up options modified
  180. 10-04-2019 09:57:30 OPTIONS IMPORT: route options modified
  181. 10-04-2019 09:57:30 OPTIONS IMPORT: peer-id set
  182. 10-04-2019 09:57:30 OPTIONS IMPORT: adjusting link_mtu to 1626
  183. 10-04-2019 09:57:30 OPTIONS IMPORT: data channel crypto options modified
  184. 10-04-2019 09:57:30 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
  185. 10-04-2019 09:57:30 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  186. 10-04-2019 09:57:30 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  187. 10-04-2019 09:57:30 GDG: SIOCGIFHWADDR(lo) failed
  188. 10-04-2019 09:57:30 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  189. 10-04-2019 09:57:30 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  190. 10-04-2019 09:57:30 MANAGEMENT: >STATE:1554879450,ASSIGN_IP,,10.114.208.42,,,,
  191. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  192. 10-04-2019 09:57:30 Открытие TUN-интерфейса:
  193. 10-04-2019 09:57:30 MANAGEMENT: >STATE:1554879450,ADD_ROUTES,,,,,,
  194. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  195. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  196. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  197. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  198. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  199. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  200. 10-04-2019 09:57:30 Игнорируется мультиадресный маршрут: 224.0.0.0/3
  201. 10-04-2019 09:57:30 Адрес IPv4: 10.114.208.42/30 IPv6: null MTU: 1500
  202. 10-04-2019 09:57:30 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
  203. 10-04-2019 09:57:30 Маршруты: 0.0.0.0/0, 10.114.208.0/20, 10.114.208.40/30
  204. 10-04-2019 09:57:30 Исключенные маршруты: 192.168.0.100/24
  205. 10-04-2019 09:57:30 Подключенные маршруты сервиса VPN: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
  206. 10-04-2019 09:57:30 Запрещенные VPN приложения:
  207. 10-04-2019 09:57:30 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  208. 10-04-2019 09:57:30 Initialization Sequence Completed
  209. 10-04-2019 09:57:30 MANAGEMENT: >STATE:1554879450,CONNECTED,SUCCESS,10.114.208.42,188.64.171.248,443,192.168.0.100,42224
  210. 10-04-2019 10:10:00 read TCP_CLIENT []: Software caused connection abort (code=103)
  211. 10-04-2019 10:10:00 Connection reset, restarting [0]
  212. 10-04-2019 10:10:00 TCP/UDP: Closing socket
  213. 10-04-2019 10:10:00 SIGUSR1[soft,connection-reset] received, process restarting
  214. 10-04-2019 10:10:00 MANAGEMENT: >STATE:1554880200,RECONNECTING,connection-reset,,,,,
  215. 10-04-2019 10:10:00 MANAGEMENT: CMD 'hold release'
  216. 10-04-2019 10:10:00 MANAGEMENT: CMD 'bytecount 2'
  217. 10-04-2019 10:10:00 MANAGEMENT: CMD 'state on'
  218. 10-04-2019 10:10:00 MANAGEMENT: CMD 'proxy NONE'
  219. 10-04-2019 10:10:00 Статус сети: not prepareSuccess
  220. 10-04-2019 10:10:01 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  221. 10-04-2019 10:10:01 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  222. 10-04-2019 10:10:01 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  223. 10-04-2019 10:10:01 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
  224. 10-04-2019 10:10:01 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
  225. 10-04-2019 10:10:01 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  226. 10-04-2019 10:10:01 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  227. 10-04-2019 10:10:01 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  228. 10-04-2019 10:10:01 MANAGEMENT: >STATE:1554880201,TCP_CONNECT,,,,,,
  229. 10-04-2019 10:10:01 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  230. 10-04-2019 10:10:01 TCP: connect to [AF_INET]188.64.171.248:443 failed: Network is unreachable
  231. 10-04-2019 10:10:01 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  232. 10-04-2019 10:10:01 MANAGEMENT: >STATE:1554880201,RECONNECTING,init_instance,,,,,
  233. 10-04-2019 10:12:28 MANAGEMENT: CMD 'signal SIGINT'
  234. 10-04-2019 10:12:28 Closing TUN/TAP interface
  235. 10-04-2019 10:12:28 SIGINT[hard,init_instance] received, process exiting
  236. 10-04-2019 10:12:28 MANAGEMENT: >STATE:1554880348,EXITING,init_instance,,,,,
  237. 10-04-2019 11:01:02 Background loading servers
  238. 10-04-2019 11:01:03 Создание конфигурации…
  239. 10-04-2019 11:01:03 started Socket Thread
  240. 10-04-2019 11:01:03 Статус сети: CONNECTED to WIFI "Telemir_118"
  241. 10-04-2019 11:01:03 Current Parameter Settings:
  242. 10-04-2019 11:01:03 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  243. 10-04-2019 11:01:03 mode = 0
  244. 10-04-2019 11:01:03 show_ciphers = DISABLED
  245. 10-04-2019 11:01:03 show_digests = DISABLED
  246. 10-04-2019 11:01:03 show_engines = DISABLED
  247. 10-04-2019 11:01:03 genkey = DISABLED
  248. 10-04-2019 11:01:03 key_pass_file = '[UNDEF]'
  249. 10-04-2019 11:01:03 show_tls_ciphers = DISABLED
  250. 10-04-2019 11:01:03 connect_retry_max = 5
  251. 10-04-2019 11:01:03 Connection profiles [0]:
  252. 10-04-2019 11:01:03 proto = tcp-client
  253. 10-04-2019 11:01:03 local = '[UNDEF]'
  254. 10-04-2019 11:01:03 local_port = '[UNDEF]'
  255. 10-04-2019 11:01:03 remote = '188.64.171.248'
  256. 10-04-2019 11:01:03 remote_port = '443'
  257. 10-04-2019 11:01:03 remote_float = DISABLED
  258. 10-04-2019 11:01:03 bind_defined = DISABLED
  259. 10-04-2019 11:01:03 bind_local = DISABLED
  260. 10-04-2019 11:01:03 bind_ipv6_only = DISABLED
  261. 10-04-2019 11:01:03 NOTE: --mute triggered...
  262. 10-04-2019 11:01:03 164 variation(s) on previous 20 message(s) suppressed by --mute
  263. 10-04-2019 11:01:03 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  264. 10-04-2019 11:01:03 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  265. 10-04-2019 11:01:03 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  266. 10-04-2019 11:01:03 MANAGEMENT: CMD 'hold release'
  267. 10-04-2019 11:01:03 MANAGEMENT: CMD 'bytecount 2'
  268. 10-04-2019 11:01:03 MANAGEMENT: CMD 'state on'
  269. 10-04-2019 11:01:03 MANAGEMENT: CMD 'proxy NONE'
  270. 10-04-2019 11:01:04 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  271. 10-04-2019 11:01:04 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  272. 10-04-2019 11:01:04 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  273. 10-04-2019 11:01:04 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  274. 10-04-2019 11:01:04 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  275. 10-04-2019 11:01:04 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  276. 10-04-2019 11:01:04 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  277. 10-04-2019 11:01:04 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  278. 10-04-2019 11:01:04 MANAGEMENT: >STATE:1554883264,TCP_CONNECT,,,,,,
  279. 10-04-2019 11:01:04 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  280. 10-04-2019 11:01:05 Servers list received
  281. 10-04-2019 11:01:05 TCP connection established with [AF_INET]188.64.171.248:443
  282. 10-04-2019 11:01:05 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  283. 10-04-2019 11:01:05 TCP_CLIENT link local: (not bound)
  284. 10-04-2019 11:01:05 TCP_CLIENT link remote: [AF_INET]188.64.171.248:443
  285. 10-04-2019 11:01:05 MANAGEMENT: >STATE:1554883265,WAIT,,,,,,
  286. 10-04-2019 11:01:05 Scrambler: disabled by config
  287. 10-04-2019 11:01:05 MANAGEMENT: >STATE:1554883265,AUTH,,,,,,
  288. 10-04-2019 11:01:05 TLS: Initial packet from [AF_INET]188.64.171.248:443, sid=d8e327fe 3b9a4a5e
  289. 10-04-2019 11:01:05 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  290. 10-04-2019 11:01:05 VERIFY OK: nsCertType=SERVER
  291. 10-04-2019 11:01:05 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  292. 10-04-2019 11:01:06 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  293. 10-04-2019 11:01:06 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  294. 10-04-2019 11:01:06 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  295. 10-04-2019 11:01:06 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  296. 10-04-2019 11:01:06 [server] Peer Connection Initiated with [AF_INET]188.64.171.248:443
  297. 10-04-2019 11:01:07 MANAGEMENT: >STATE:1554883267,GET_CONFIG,,,,,,
  298. 10-04-2019 11:01:07 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  299. 10-04-2019 11:01:07 PUSH: Received control message: 'PUSH_REPLY,route 10.114.208.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.114.208.42 10.114.208.41,peer-id 0,cipher AES-256-GCM'
  300. 10-04-2019 11:01:07 OPTIONS IMPORT: timers and/or timeouts modified
  301. 10-04-2019 11:01:07 OPTIONS IMPORT: --ifconfig/up options modified
  302. 10-04-2019 11:01:07 OPTIONS IMPORT: route options modified
  303. 10-04-2019 11:01:07 OPTIONS IMPORT: peer-id set
  304. 10-04-2019 11:01:07 OPTIONS IMPORT: adjusting link_mtu to 1626
  305. 10-04-2019 11:01:07 OPTIONS IMPORT: data channel crypto options modified
  306. 10-04-2019 11:01:07 Data Channel: using negotiated cipher 'AES-256-GCM'
  307. 10-04-2019 11:01:07 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
  308. 10-04-2019 11:01:07 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  309. 10-04-2019 11:01:07 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  310. 10-04-2019 11:01:07 GDG: SIOCGIFHWADDR(lo) failed
  311. 10-04-2019 11:01:07 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  312. 10-04-2019 11:01:07 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  313. 10-04-2019 11:01:07 MANAGEMENT: >STATE:1554883267,ASSIGN_IP,,10.114.208.42,,,,
  314. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  315. 10-04-2019 11:01:07 MANAGEMENT: >STATE:1554883267,ADD_ROUTES,,,,,,
  316. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  317. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  318. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  319. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  320. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  321. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  322. 10-04-2019 11:01:07 Открытие TUN-интерфейса:
  323. 10-04-2019 11:01:07 Игнорируется мультиадресный маршрут: 224.0.0.0/3
  324. 10-04-2019 11:01:07 Адрес IPv4: 10.114.208.42/30 IPv6: null MTU: 1500
  325. 10-04-2019 11:01:07 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
  326. 10-04-2019 11:01:07 Маршруты: 0.0.0.0/0, 10.114.208.0/20, 10.114.208.40/30
  327. 10-04-2019 11:01:07 Исключенные маршруты: 192.168.0.100/24
  328. 10-04-2019 11:01:07 Подключенные маршруты сервиса VPN: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
  329. 10-04-2019 11:01:07 Запрещенные VPN приложения:
  330. 10-04-2019 11:01:07 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  331. 10-04-2019 11:01:07 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  332. 10-04-2019 11:01:07 Initialization Sequence Completed
  333. 10-04-2019 11:01:07 MANAGEMENT: >STATE:1554883267,CONNECTED,SUCCESS,10.114.208.42,188.64.171.248,443,192.168.0.100,42254
  334. 10-04-2019 11:01:09 Internal authentication error
  335. 10-04-2019 11:01:09 Obtaining IP address
  336. 10-04-2019 11:01:09 Obtaining IP address
  337. 10-04-2019 11:01:10 Obtaining location
  338. 10-04-2019 11:01:10 Current IP received : 188.64.171.181;188.64.171.181
  339. 10-04-2019 11:01:10 Location received
  340. 10-04-2019 11:01:11 Current location : Russian Federation
  341. 10-04-2019 11:01:20 Internal authentication error
  342. 10-04-2019 11:01:31 Internal authentication error
  343. 10-04-2019 11:01:41 Internal authentication error
  344. 10-04-2019 11:01:52 Internal authentication error
  345. 10-04-2019 11:02:03 Internal authentication is successful
  346. 10-04-2019 11:26:06 Background loading servers
  347. 10-04-2019 11:26:08 Servers list received
  348. 10-04-2019 11:29:46 read TCP_CLIENT []: Software caused connection abort (code=103)
  349. 10-04-2019 11:29:46 Connection reset, restarting [0]
  350. 10-04-2019 11:29:46 TCP/UDP: Closing socket
  351. 10-04-2019 11:29:46 SIGUSR1[soft,connection-reset] received, process restarting
  352. 10-04-2019 11:29:46 MANAGEMENT: >STATE:1554884986,RECONNECTING,connection-reset,,,,,
  353. 10-04-2019 11:29:46 MANAGEMENT: CMD 'hold release'
  354. 10-04-2019 11:29:46 MANAGEMENT: CMD 'bytecount 2'
  355. 10-04-2019 11:29:46 MANAGEMENT: CMD 'state on'
  356. 10-04-2019 11:29:46 MANAGEMENT: CMD 'proxy NONE'
  357. 10-04-2019 11:29:46 Статус сети: not prepareSuccess
  358. 10-04-2019 11:29:47 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  359. 10-04-2019 11:29:47 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  360. 10-04-2019 11:29:47 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  361. 10-04-2019 11:29:47 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-client'
  362. 10-04-2019 11:29:47 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1551,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-GCM,auth [null-digest],keysize 256,key-method 2,tls-server'
  363. 10-04-2019 11:29:47 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  364. 10-04-2019 11:29:47 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  365. 10-04-2019 11:29:47 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  366. 10-04-2019 11:29:47 MANAGEMENT: >STATE:1554884987,TCP_CONNECT,,,,,,
  367. 10-04-2019 11:29:47 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  368. 10-04-2019 11:29:47 TCP: connect to [AF_INET]188.64.171.248:443 failed: Network is unreachable
  369. 10-04-2019 11:29:47 SIGUSR1[connection failed(soft),init_instance] received, process restarting
  370. 10-04-2019 11:29:47 MANAGEMENT: >STATE:1554884987,RECONNECTING,init_instance,,,,,
  371. 10-04-2019 11:31:01 MANAGEMENT: CMD 'signal SIGINT'
  372. 10-04-2019 11:31:01 Closing TUN/TAP interface
  373. 10-04-2019 11:31:01 SIGINT[hard,init_instance] received, process exiting
  374. 10-04-2019 11:31:01 MANAGEMENT: >STATE:1554885061,EXITING,init_instance,,,,,
  375. 10-04-2019 12:02:25 Background loading servers
  376. 10-04-2019 12:02:26 Servers list received
  377. 10-04-2019 12:02:26 Создание конфигурации…
  378. 10-04-2019 12:02:26 started Socket Thread
  379. 10-04-2019 12:02:27 Статус сети: CONNECTED to WIFI "Telemir_118"
  380. 10-04-2019 12:02:27 Current Parameter Settings:
  381. 10-04-2019 12:02:27 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
  382. 10-04-2019 12:02:27 mode = 0
  383. 10-04-2019 12:02:27 show_ciphers = DISABLED
  384. 10-04-2019 12:02:27 show_digests = DISABLED
  385. 10-04-2019 12:02:27 show_engines = DISABLED
  386. 10-04-2019 12:02:27 genkey = DISABLED
  387. 10-04-2019 12:02:27 key_pass_file = '[UNDEF]'
  388. 10-04-2019 12:02:27 show_tls_ciphers = DISABLED
  389. 10-04-2019 12:02:27 connect_retry_max = 5
  390. 10-04-2019 12:02:27 Connection profiles [0]:
  391. 10-04-2019 12:02:27 proto = tcp-client
  392. 10-04-2019 12:02:27 local = '[UNDEF]'
  393. 10-04-2019 12:02:27 local_port = '[UNDEF]'
  394. 10-04-2019 12:02:27 remote = '188.64.171.248'
  395. 10-04-2019 12:02:27 remote_port = '443'
  396. 10-04-2019 12:02:27 remote_float = DISABLED
  397. 10-04-2019 12:02:27 bind_defined = DISABLED
  398. 10-04-2019 12:02:27 bind_local = DISABLED
  399. 10-04-2019 12:02:27 bind_ipv6_only = DISABLED
  400. 10-04-2019 12:02:27 NOTE: --mute triggered...
  401. 10-04-2019 12:02:27 164 variation(s) on previous 20 message(s) suppressed by --mute
  402. 10-04-2019 12:02:27 OpenVPN 2.5-icsopenvpn [git:54ad578] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Mar 11 2019
  403. 10-04-2019 12:02:27 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
  404. 10-04-2019 12:02:27 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
  405. 10-04-2019 12:02:27 MANAGEMENT: CMD 'hold release'
  406. 10-04-2019 12:02:27 MANAGEMENT: CMD 'bytecount 2'
  407. 10-04-2019 12:02:27 MANAGEMENT: CMD 'state on'
  408. 10-04-2019 12:02:27 MANAGEMENT: CMD 'proxy NONE'
  409. 10-04-2019 12:02:28 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
  410. 10-04-2019 12:02:28 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
  411. 10-04-2019 12:02:28 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
  412. 10-04-2019 12:02:28 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
  413. 10-04-2019 12:02:28 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
  414. 10-04-2019 12:02:28 TCP/UDP: Preserving recently used remote address: [AF_INET]188.64.171.248:443
  415. 10-04-2019 12:02:28 Socket Buffers: R=[1048576->524288] S=[1048576->524288]
  416. 10-04-2019 12:02:28 Attempting to establish TCP connection with [AF_INET]188.64.171.248:443 [nonblock]
  417. 10-04-2019 12:02:28 MANAGEMENT: >STATE:1554886948,TCP_CONNECT,,,,,,
  418. 10-04-2019 12:02:28 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  419. 10-04-2019 12:02:29 TCP connection established with [AF_INET]188.64.171.248:443
  420. 10-04-2019 12:02:29 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
  421. 10-04-2019 12:02:29 TCP_CLIENT link local: (not bound)
  422. 10-04-2019 12:02:29 TCP_CLIENT link remote: [AF_INET]188.64.171.248:443
  423. 10-04-2019 12:02:29 MANAGEMENT: >STATE:1554886949,WAIT,,,,,,
  424. 10-04-2019 12:02:29 Scrambler: disabled by config
  425. 10-04-2019 12:02:29 MANAGEMENT: >STATE:1554886949,AUTH,,,,,,
  426. 10-04-2019 12:02:29 TLS: Initial packet from [AF_INET]188.64.171.248:443, sid=91e6ab31 388dea07
  427. 10-04-2019 12:02:29 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  428. 10-04-2019 12:02:29 VERIFY OK: nsCertType=SERVER
  429. 10-04-2019 12:02:29 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  430. 10-04-2019 12:02:29 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  431. 10-04-2019 12:02:29 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  432. 10-04-2019 12:02:29 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  433. 10-04-2019 12:02:29 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  434. 10-04-2019 12:02:29 [server] Peer Connection Initiated with [AF_INET]188.64.171.248:443
  435. 10-04-2019 12:02:30 MANAGEMENT: >STATE:1554886950,GET_CONFIG,,,,,,
  436. 10-04-2019 12:02:30 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
  437. 10-04-2019 12:02:30 PUSH: Received control message: 'PUSH_REPLY,route 10.114.208.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.114.208.42 10.114.208.41,peer-id 0,cipher AES-256-GCM'
  438. 10-04-2019 12:02:30 OPTIONS IMPORT: timers and/or timeouts modified
  439. 10-04-2019 12:02:30 OPTIONS IMPORT: --ifconfig/up options modified
  440. 10-04-2019 12:02:30 OPTIONS IMPORT: route options modified
  441. 10-04-2019 12:02:30 OPTIONS IMPORT: peer-id set
  442. 10-04-2019 12:02:30 OPTIONS IMPORT: adjusting link_mtu to 1626
  443. 10-04-2019 12:02:30 OPTIONS IMPORT: data channel crypto options modified
  444. 10-04-2019 12:02:30 Data Channel: using negotiated cipher 'AES-256-GCM'
  445. 10-04-2019 12:02:30 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
  446. 10-04-2019 12:02:30 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  447. 10-04-2019 12:02:30 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  448. 10-04-2019 12:02:30 GDG: SIOCGIFHWADDR(lo) failed
  449. 10-04-2019 12:02:30 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
  450. 10-04-2019 12:02:30 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
  451. 10-04-2019 12:02:30 MANAGEMENT: >STATE:1554886950,ASSIGN_IP,,10.114.208.42,,,,
  452. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
  453. 10-04-2019 12:02:30 MANAGEMENT: >STATE:1554886950,ADD_ROUTES,,,,,,
  454. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  455. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'ROUTE' ok'
  456. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  457. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
  458. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
  459. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
  460. 10-04-2019 12:02:30 Открытие TUN-интерфейса:
  461. 10-04-2019 12:02:30 Игнорируется мультиадресный маршрут: 224.0.0.0/3
  462. 10-04-2019 12:02:30 Адрес IPv4: 10.114.208.42/30 IPv6: null MTU: 1500
  463. 10-04-2019 12:02:30 DNS-сервер: 8.8.8.8, 8.8.4.4, Домен: com.fourksoft.openvpn
  464. 10-04-2019 12:02:30 Маршруты: 0.0.0.0/0, 10.114.208.0/20, 10.114.208.40/30
  465. 10-04-2019 12:02:30 Исключенные маршруты: 192.168.0.100/24
  466. 10-04-2019 12:02:30 Подключенные маршруты сервиса VPN: 0.0.0.0/1, 128.0.0.0/2, 192.0.0.0/9, 192.128.0.0/11, 192.160.0.0/13, 192.168.1.0/24, 192.168.2.0/23, 192.168.4.0/22, 192.168.8.0/21, 192.168.16.0/20, 192.168.32.0/19, 192.168.64.0/18, 192.168.128.0/17, 192.169.0.0/16, 192.170.0.0/15, 192.172.0.0/14, 192.176.0.0/12, 192.192.0.0/10, 193.0.0.0/8, 194.0.0.0/7, 196.0.0.0/6, 200.0.0.0/5, 208.0.0.0/4, 224.0.0.0/3
  467. 10-04-2019 12:02:30 Запрещенные VPN приложения:
  468. 10-04-2019 12:02:30 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
  469. 10-04-2019 12:02:30 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
  470. 10-04-2019 12:02:30 Initialization Sequence Completed
  471. 10-04-2019 12:02:30 MANAGEMENT: >STATE:1554886950,CONNECTED,SUCCESS,10.114.208.42,188.64.171.248,443,192.168.0.100,42441
  472. 10-04-2019 12:02:32 Internal authentication error
  473. 10-04-2019 12:02:32 Obtaining IP address
  474. 10-04-2019 12:02:32 Obtaining IP address
  475. 10-04-2019 12:02:33 Obtaining location
  476. 10-04-2019 12:02:33 Current IP received : 188.64.171.181;188.64.171.181
  477. 10-04-2019 12:02:33 Location received
  478. 10-04-2019 12:02:33 Current location : Russian Federation
  479. 10-04-2019 12:02:43 Internal authentication error
  480. 10-04-2019 12:02:54 Internal authentication error
  481. 10-04-2019 12:03:04 Internal authentication is successful
  482. 10-04-2019 12:10:18 Obtaining IP address
  483. 10-04-2019 12:10:18 Obtaining IP address
  484. 10-04-2019 12:10:19 Obtaining location
  485. 10-04-2019 12:10:19 Current IP received : 188.64.171.181;188.64.171.181
  486. 10-04-2019 12:10:19 Location received
  487. 10-04-2019 12:10:19 Current location : Russian Federation
  488. 10-04-2019 13:02:29 TLS: soft reset sec=3600/3600 bytes=3584500/-1 pkts=7856/0
  489. 10-04-2019 13:02:29 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  490. 10-04-2019 13:02:29 VERIFY OK: nsCertType=SERVER
  491. 10-04-2019 13:02:29 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  492. 10-04-2019 13:02:29 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  493. 10-04-2019 13:02:29 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  494. 10-04-2019 13:02:29 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  495. 10-04-2019 13:02:29 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  496. 10-04-2019 13:02:29 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  497. 10-04-2019 13:02:29 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  498. 10-04-2019 13:20:26 Background loading servers
  499. 10-04-2019 13:20:28 Servers list received
  500. 10-04-2019 13:55:48 Obtaining IP address
  501. 10-04-2019 13:55:48 Obtaining IP address
  502. 10-04-2019 13:55:49 Obtaining location
  503. 10-04-2019 13:55:49 Current IP received : 188.64.171.181;188.64.171.181
  504. 10-04-2019 13:55:50 Location received
  505. 10-04-2019 13:55:50 Current location : Russian Federation
  506. 10-04-2019 14:00:36 Obtaining IP address
  507. 10-04-2019 14:00:36 Obtaining IP address
  508. 10-04-2019 14:00:37 Obtaining location
  509. 10-04-2019 14:00:37 Current IP received : 188.64.171.181;188.64.171.181
  510. 10-04-2019 14:00:38 Location received
  511. 10-04-2019 14:00:38 Current location : Russian Federation
  512. 10-04-2019 14:01:24 Obtaining IP address
  513. 10-04-2019 14:01:24 Obtaining IP address
  514. 10-04-2019 14:01:25 Obtaining location
  515. 10-04-2019 14:01:25 Current IP received : 188.64.171.181;188.64.171.181
  516. 10-04-2019 14:01:26 Location received
  517. 10-04-2019 14:01:26 Current location : Russian Federation
  518. 10-04-2019 14:02:29 TLS: soft reset sec=3600/3600 bytes=1003019/-1 pkts=3728/0
  519. 10-04-2019 14:02:29 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
  520. 10-04-2019 14:02:29 VERIFY OK: nsCertType=SERVER
  521. 10-04-2019 14:02:29 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
  522. 10-04-2019 14:02:29 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
  523. 10-04-2019 14:02:29 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
  524. 10-04-2019 14:02:29 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
  525. 10-04-2019 14:02:29 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  526. 10-04-2019 14:02:29 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
  527. 10-04-2019 14:02:29 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
  528. 10-04-2019 14:04:44 Obtaining IP address
  529. 10-04-2019 14:04:44 Obtaining IP address
  530. 10-04-2019 14:04:45 Obtaining location
  531. 10-04-2019 14:04:45 Current IP received : 188.64.171.181;188.64.171.181
  532. 10-04-2019 14:04:45 Location received
  533. 10-04-2019 14:04:45 Current location : Russian Federation
  534. 10-04-2019 14:04:53 Obtaining IP address
  535. 10-04-2019 14:04:54 Obtaining location
  536. 10-04-2019 14:04:54 Current IP received : 188.64.171.181;188.64.171.181
  537. 10-04-2019 14:04:54 Location received
  538. 10-04-2019 14:04:55 Current location : Russian Federation
  539. 10-04-2019 14:05:24 Obtaining IP address
  540. 10-04-2019 14:05:25 Obtaining location
  541. 10-04-2019 14:05:25 Current IP received : 188.64.171.181;188.64.171.181
  542. 10-04-2019 14:05:26 Location received
  543. 10-04-2019 14:05:26 Current location : Russian Federation
  544. 10-04-2019 14:05:49 Obtaining IP address
  545. 10-04-2019 14:05:49 Obtaining IP address
  546. 10-04-2019 14:05:49 Obtaining IP address
  547. 10-04-2019 14:05:49 Obtaining IP address
  548. 10-04-2019 14:05:49 Obtaining location
  549. 10-04-2019 14:05:49 Current IP received : 188.64.171.181;188.64.171.181
  550. 10-04-2019 14:05:50 Location received
  551. 10-04-2019 14:05:50 Current location : Russian Federation
  552. 10-04-2019 14:05:50 Obtaining location
  553. 10-04-2019 14:05:50 Current IP received : 188.64.171.181;188.64.171.181
  554. 10-04-2019 14:05:51 Location received
  555. 10-04-2019 14:05:51 Current location : Russian Federation
  556. 10-04-2019 14:07:39 Obtaining IP address
  557. 10-04-2019 14:07:39 Obtaining IP address
  558. 10-04-2019 14:07:40 Obtaining location
  559. 10-04-2019 14:07:40 Current IP received : 188.64.171.181;188.64.171.181
  560. 10-04-2019 14:07:40 Location received
  561. 10-04-2019 14:07:40 Current location : Russian Federation
  562. 10-04-2019 14:08:21 Obtaining IP address
  563. 10-04-2019 14:08:21 Obtaining IP address
  564. 10-04-2019 14:08:22 Obtaining location
  565. 10-04-2019 14:08:22 Current IP received : 188.64.171.181;188.64.171.181
  566. 10-04-2019 14:08:23 Location received
  567. 10-04-2019 14:08:23 Current location : Russian Federation
  568. 10-04-2019 14:10:37 Obtaining IP address
  569. 10-04-2019 14:10:37 Obtaining IP address
  570. 10-04-2019 14:10:38 Obtaining location
  571. 10-04-2019 14:10:38 Current IP received : 188.64.171.181;188.64.171.181
  572. 10-04-2019 14:10:38 Location received
  573. 10-04-2019 14:10:38 Current location : Russian Federation
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement