Advertisement
Guest User

Untitled

a guest
Feb 27th, 2018
421
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 30.37 KB | None | 0 0
  1. 27-02-2018 12:44:15 Application version 1.2.5 started
  2. 27-02-2018 12:08:01 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.2.5 работает на Xiaomi MI MAX 2 (msm8953), Android 7.1.1 (NMF26F) API 25, ABI arm64-v8a, (Xiaomi/oxygen/oxygen:7.1.1/NMF26F/V9.2.1.0.NDDMIEK:user/release-keys)
  3. 27-02-2018 12:08:01 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
  4. 27-02-2018 12:08:01 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
  5. 27-02-2018 12:08:01 spawning 16 worker threads
  6. 27-02-2018 12:08:01 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
  7. 27-02-2018 12:08:01 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  8. 27-02-2018 12:08:01 algorithm 'curve25519' not recognized
  9. 27-02-2018 12:08:01 algorithm 'curve25519' not recognized
  10. 27-02-2018 12:08:01 algorithm 'curve25519' not recognized
  11. 27-02-2018 12:08:01 initiating IKE_SA android[1] to 91.105.236.205
  12. 27-02-2018 12:08:01 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  13. 27-02-2018 12:08:01 sending packet: from 192.168.1.35[42095] to 91.105.236.205[500] (746 bytes)
  14. 27-02-2018 12:08:01 received packet: from 91.105.236.205[500] to 192.168.1.35[42095] (38 bytes)
  15. 27-02-2018 12:08:01 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  16. 27-02-2018 12:08:01 peer didn't accept DH group ECP_256, it requested MODP_2048
  17. 27-02-2018 12:08:01 initiating IKE_SA android[1] to 91.105.236.205
  18. 27-02-2018 12:08:01 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  19. 27-02-2018 12:08:01 sending packet: from 192.168.1.35[42095] to 91.105.236.205[500] (938 bytes)
  20. 27-02-2018 12:08:01 received packet: from 91.105.236.205[500] to 192.168.1.35[42095] (481 bytes)
  21. 27-02-2018 12:08:01 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  22. 27-02-2018 12:08:01 local host is behind NAT, sending keep alives
  23. 27-02-2018 12:08:01 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  24. 27-02-2018 12:08:01 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  25. 27-02-2018 12:08:01 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  26. 27-02-2018 12:08:01 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
  27. 27-02-2018 12:08:01 establishing CHILD_SA android
  28. 27-02-2018 12:08:01 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
  29. 27-02-2018 12:08:01 splitting IKE message with length of 2224 bytes into 2 fragments
  30. 27-02-2018 12:08:01 generating IKE_AUTH request 1 [ EF(1/2) ]
  31. 27-02-2018 12:08:01 generating IKE_AUTH request 1 [ EF(2/2) ]
  32. 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (1368 bytes)
  33. 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (921 bytes)
  34. 27-02-2018 12:08:01 received packet: from 91.105.236.205[4500] to 192.168.1.35[44612] (1248 bytes)
  35. 27-02-2018 12:08:01 parsed IKE_AUTH response 1 [ EF(1/2) ]
  36. 27-02-2018 12:08:01 received fragment #1 of 2, waiting for complete IKE message
  37. 27-02-2018 12:08:01 received packet: from 91.105.236.205[4500] to 192.168.1.35[44612] (548 bytes)
  38. 27-02-2018 12:08:01 parsed IKE_AUTH response 1 [ EF(2/2) ]
  39. 27-02-2018 12:08:01 received fragment #2 of 2, reassembling fragmented IKE message
  40. 27-02-2018 12:08:01 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
  41. 27-02-2018 12:08:01 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
  42. 27-02-2018 12:08:01 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
  43. 27-02-2018 12:08:01 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  44. 27-02-2018 12:08:01 reached self-signed root ca with a path length of 0
  45. 27-02-2018 12:08:01 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
  46. 27-02-2018 12:08:01 IKE_SA android[1] established between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
  47. 27-02-2018 12:08:01 scheduling rekeying in 36000s
  48. 27-02-2018 12:08:01 maximum IKE_SA lifetime 36600s
  49. 27-02-2018 12:08:01 installing DNS server 8.8.8.8
  50. 27-02-2018 12:08:01 installing DNS server 8.8.4.4
  51. 27-02-2018 12:08:01 installing DNS server 8.8.8.8
  52. 27-02-2018 12:08:01 installing DNS server 8.8.4.4
  53. 27-02-2018 12:08:01 installing new virtual IP 10.126.0.4
  54. 27-02-2018 12:08:01 CHILD_SA android{1} established with SPIs dc240343_i c9cb99eb_o and TS 10.126.0.4/32 === 0.0.0.0/0
  55. 27-02-2018 12:08:01 setting up TUN device for CHILD_SA android{1}
  56. 27-02-2018 12:08:01 successfully created TUN device
  57. 27-02-2018 12:08:01 received packet: from 91.105.236.205[4500] to 192.168.1.35[44612] (57 bytes)
  58. 27-02-2018 12:08:01 parsed INFORMATIONAL request 0 [ ]
  59. 27-02-2018 12:08:01 generating INFORMATIONAL response 0 [ ]
  60. 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (57 bytes)
  61. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  62. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  63. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  64. 27-02-2018 12:08:01 old path is not available anymore, try to find another
  65. 27-02-2018 12:08:01 looking for a route to 91.105.236.205 ...
  66. 27-02-2018 12:08:01 no route found to reach 91.105.236.205, MOBIKE update deferred
  67. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  68. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  69. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  70. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  71. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  72. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  73. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  74. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  75. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  76. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  77. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  78. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  79. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  80. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  81. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  82. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  83. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  84. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  85. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  86. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  87. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  88. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  89. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  90. 27-02-2018 12:08:01 deleting IKE_SA android[1] between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
  91. 27-02-2018 12:08:01 sending DELETE for IKE_SA android[1]
  92. 27-02-2018 12:08:01 generating INFORMATIONAL request 2 [ D ]
  93. 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (65 bytes)
  94. 27-02-2018 12:08:01 error writing to socket: Network is unreachable
  95. 27-02-2018 12:08:27 Ожидание работы сети
  96. 27-02-2018 12:08:29 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
  97. 27-02-2018 12:08:29 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
  98. 27-02-2018 12:08:29 spawning 16 worker threads
  99. 27-02-2018 12:08:29 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
  100. 27-02-2018 12:08:29 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  101. 27-02-2018 12:08:29 algorithm 'curve25519' not recognized
  102. 27-02-2018 12:08:29 algorithm 'curve25519' not recognized
  103. 27-02-2018 12:08:29 algorithm 'curve25519' not recognized
  104. 27-02-2018 12:08:29 initiating IKE_SA android[1] to 91.105.236.205
  105. 27-02-2018 12:08:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  106. 27-02-2018 12:08:29 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (746 bytes)
  107. 27-02-2018 12:08:29 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (38 bytes)
  108. 27-02-2018 12:08:29 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  109. 27-02-2018 12:08:29 peer didn't accept DH group ECP_256, it requested MODP_2048
  110. 27-02-2018 12:08:29 initiating IKE_SA android[1] to 91.105.236.205
  111. 27-02-2018 12:08:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  112. 27-02-2018 12:08:29 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (938 bytes)
  113. 27-02-2018 12:08:30 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (481 bytes)
  114. 27-02-2018 12:08:30 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  115. 27-02-2018 12:08:30 local host is behind NAT, sending keep alives
  116. 27-02-2018 12:08:30 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  117. 27-02-2018 12:08:30 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  118. 27-02-2018 12:08:30 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  119. 27-02-2018 12:08:30 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
  120. 27-02-2018 12:08:30 establishing CHILD_SA android
  121. 27-02-2018 12:08:30 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
  122. 27-02-2018 12:08:30 splitting IKE message with length of 2224 bytes into 2 fragments
  123. 27-02-2018 12:08:30 generating IKE_AUTH request 1 [ EF(1/2) ]
  124. 27-02-2018 12:08:30 generating IKE_AUTH request 1 [ EF(2/2) ]
  125. 27-02-2018 12:08:30 sending packet: from 192.168.1.35[47608] to 91.105.236.205[4500] (1368 bytes)
  126. 27-02-2018 12:08:30 sending packet: from 192.168.1.35[47608] to 91.105.236.205[4500] (921 bytes)
  127. 27-02-2018 12:08:30 received packet: from 91.105.236.205[4500] to 192.168.1.35[47608] (1248 bytes)
  128. 27-02-2018 12:08:30 parsed IKE_AUTH response 1 [ EF(1/2) ]
  129. 27-02-2018 12:08:30 received fragment #1 of 2, waiting for complete IKE message
  130. 27-02-2018 12:08:30 received packet: from 91.105.236.205[4500] to 192.168.1.35[47608] (548 bytes)
  131. 27-02-2018 12:08:30 parsed IKE_AUTH response 1 [ EF(2/2) ]
  132. 27-02-2018 12:08:30 received fragment #2 of 2, reassembling fragmented IKE message
  133. 27-02-2018 12:08:30 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
  134. 27-02-2018 12:08:30 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
  135. 27-02-2018 12:08:30 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
  136. 27-02-2018 12:08:30 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  137. 27-02-2018 12:08:30 reached self-signed root ca with a path length of 0
  138. 27-02-2018 12:08:30 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
  139. 27-02-2018 12:08:30 IKE_SA android[1] established between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
  140. 27-02-2018 12:08:30 scheduling rekeying in 35498s
  141. 27-02-2018 12:08:30 maximum IKE_SA lifetime 36098s
  142. 27-02-2018 12:08:30 installing DNS server 8.8.8.8
  143. 27-02-2018 12:08:30 installing DNS server 8.8.4.4
  144. 27-02-2018 12:08:30 installing DNS server 8.8.8.8
  145. 27-02-2018 12:08:30 installing DNS server 8.8.4.4
  146. 27-02-2018 12:08:30 installing new virtual IP 10.126.0.4
  147. 27-02-2018 12:08:30 CHILD_SA android{1} established with SPIs a09353e7_i c0d1a410_o and TS 10.126.0.4/32 === 0.0.0.0/0
  148. 27-02-2018 12:08:30 setting up TUN device for CHILD_SA android{1}
  149. 27-02-2018 12:08:30 successfully created TUN device
  150. 27-02-2018 12:08:30 deleting IKE_SA android[1] between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
  151. 27-02-2018 12:08:30 sending DELETE for IKE_SA android[1]
  152. 27-02-2018 12:08:30 generating INFORMATIONAL request 2 [ D ]
  153. 27-02-2018 12:08:30 sending packet: from 192.168.1.35[47608] to 91.105.236.205[4500] (65 bytes)
  154. 27-02-2018 12:08:31 Current IP received : 46.173.5.175;46.173.5.175
  155. 27-02-2018 12:08:31 Obtaining location
  156. 27-02-2018 12:08:31 Location received
  157. 27-02-2018 12:08:32 Current IP received : 46.173.5.175;46.173.5.175
  158. 27-02-2018 12:08:32 Obtaining location
  159. 27-02-2018 12:08:32 Location received
  160. 27-02-2018 12:08:32 Current location : Russian Federation
  161. 27-02-2018 12:08:32 Current IP received : 46.173.5.175;46.173.5.175
  162. 27-02-2018 12:08:32 Obtaining location
  163. 27-02-2018 12:08:33 Location received
  164. 27-02-2018 12:08:33 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
  165. 27-02-2018 12:08:33 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
  166. 27-02-2018 12:08:33 spawning 16 worker threads
  167. 27-02-2018 12:08:33 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
  168. 27-02-2018 12:08:33 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  169. 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
  170. 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
  171. 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
  172. 27-02-2018 12:08:33 initiating IKE_SA android[1] to 91.105.236.205
  173. 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  174. 27-02-2018 12:08:33 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (746 bytes)
  175. 27-02-2018 12:08:33 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (38 bytes)
  176. 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  177. 27-02-2018 12:08:33 peer didn't accept DH group ECP_256, it requested MODP_2048
  178. 27-02-2018 12:08:33 initiating IKE_SA android[1] to 91.105.236.205
  179. 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  180. 27-02-2018 12:08:33 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (938 bytes)
  181. 27-02-2018 12:08:33 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (481 bytes)
  182. 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  183. 27-02-2018 12:08:33 local host is behind NAT, sending keep alives
  184. 27-02-2018 12:08:33 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  185. 27-02-2018 12:08:33 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  186. 27-02-2018 12:08:33 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  187. 27-02-2018 12:08:33 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
  188. 27-02-2018 12:08:33 establishing CHILD_SA android
  189. 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
  190. 27-02-2018 12:08:33 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
  191. 27-02-2018 12:08:33 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
  192. 27-02-2018 12:08:33 spawning 16 worker threads
  193. 27-02-2018 12:08:33 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
  194. 27-02-2018 12:08:33 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
  195. 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
  196. 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
  197. 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
  198. 27-02-2018 12:08:33 initiating IKE_SA android[2] to 188.64.170.189
  199. 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  200. 27-02-2018 12:08:33 sending packet: from 192.168.1.35[56875] to 188.64.170.189[500] (746 bytes)
  201. 27-02-2018 12:08:33 received packet: from 188.64.170.189[500] to 192.168.1.35[56875] (38 bytes)
  202. 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
  203. 27-02-2018 12:08:33 peer didn't accept DH group ECP_256, it requested MODP_2048
  204. 27-02-2018 12:08:33 initiating IKE_SA android[2] to 188.64.170.189
  205. 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
  206. 27-02-2018 12:08:33 sending packet: from 192.168.1.35[56875] to 188.64.170.189[500] (938 bytes)
  207. 27-02-2018 12:08:33 received packet: from 188.64.170.189[500] to 192.168.1.35[56875] (481 bytes)
  208. 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
  209. 27-02-2018 12:08:33 local host is behind NAT, sending keep alives
  210. 27-02-2018 12:08:33 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  211. 27-02-2018 12:08:33 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  212. 27-02-2018 12:08:33 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
  213. 27-02-2018 12:08:33 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
  214. 27-02-2018 12:08:33 establishing CHILD_SA android
  215. 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
  216. 27-02-2018 12:08:33 splitting IKE message with length of 2224 bytes into 2 fragments
  217. 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ EF(1/2) ]
  218. 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ EF(2/2) ]
  219. 27-02-2018 12:08:33 sending packet: from 192.168.1.35[59971] to 188.64.170.189[4500] (1368 bytes)
  220. 27-02-2018 12:08:33 sending packet: from 192.168.1.35[59971] to 188.64.170.189[4500] (921 bytes)
  221. 27-02-2018 12:08:34 received packet: from 188.64.170.189[4500] to 192.168.1.35[59971] (1248 bytes)
  222. 27-02-2018 12:08:34 parsed IKE_AUTH response 1 [ EF(1/2) ]
  223. 27-02-2018 12:08:34 received fragment #1 of 2, waiting for complete IKE message
  224. 27-02-2018 12:08:34 received packet: from 188.64.170.189[4500] to 192.168.1.35[59971] (548 bytes)
  225. 27-02-2018 12:08:34 parsed IKE_AUTH response 1 [ EF(2/2) ]
  226. 27-02-2018 12:08:34 received fragment #2 of 2, reassembling fragmented IKE message
  227. 27-02-2018 12:08:34 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
  228. 27-02-2018 12:08:34 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.na
  229. 27-02-2018 12:08:34 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
  230. 27-02-2018 12:08:34 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
  231. 27-02-2018 12:08:34 reached self-signed root ca with a path length of 0
  232. 27-02-2018 12:08:34 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
  233. 27-02-2018 12:08:34 IKE_SA android[2] established between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...188.64.170.189[server]
  234. 27-02-2018 12:08:34 scheduling rekeying in 35580s
  235. 27-02-2018 12:08:34 maximum IKE_SA lifetime 36180s
  236. 27-02-2018 12:08:34 installing DNS server 8.8.8.8
  237. 27-02-2018 12:08:34 installing DNS server 8.8.4.4
  238. 27-02-2018 12:08:34 installing DNS server 8.8.8.8
  239. 27-02-2018 12:08:34 installing DNS server 8.8.4.4
  240. 27-02-2018 12:08:34 installing new virtual IP 10.123.16.182
  241. 27-02-2018 12:08:34 CHILD_SA android{2} established with SPIs a6c1af63_i cab113a2_o and TS 10.123.16.182/32 === 0.0.0.0/0
  242. 27-02-2018 12:08:34 setting up TUN device for CHILD_SA android{2}
  243. 27-02-2018 12:08:34 successfully created TUN device
  244. 27-02-2018 12:08:36 Current IP received : 188.64.170.76;188.64.170.76
  245. 27-02-2018 12:08:36 Obtaining location
  246. 27-02-2018 12:08:36 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  247. 27-02-2018 12:08:36 Obtaining location
  248. 27-02-2018 12:08:36 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  249. 27-02-2018 12:08:36 Obtaining location
  250. 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  251. 27-02-2018 12:08:37 Obtaining location
  252. 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  253. 27-02-2018 12:08:37 Obtaining location
  254. 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  255. 27-02-2018 12:08:37 Obtaining location
  256. 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  257. 27-02-2018 12:11:36 Internal authentication is successful
  258. 27-02-2018 12:11:38 Current IP received : 188.64.170.76;188.64.170.76
  259. 27-02-2018 12:11:38 Obtaining location
  260. 27-02-2018 12:11:38 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  261. 27-02-2018 12:11:38 Obtaining location
  262. 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  263. 27-02-2018 12:11:39 Obtaining location
  264. 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  265. 27-02-2018 12:11:39 Obtaining location
  266. 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  267. 27-02-2018 12:11:39 Obtaining location
  268. 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  269. 27-02-2018 12:11:39 Obtaining location
  270. 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  271. 27-02-2018 12:11:45 Current IP received : 188.64.170.76;188.64.170.76
  272. 27-02-2018 12:11:45 Obtaining location
  273. 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  274. 27-02-2018 12:11:46 Obtaining location
  275. 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  276. 27-02-2018 12:11:46 Obtaining location
  277. 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  278. 27-02-2018 12:11:46 Obtaining location
  279. 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  280. 27-02-2018 12:11:46 Obtaining location
  281. 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  282. 27-02-2018 12:11:46 Obtaining location
  283. 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  284. 27-02-2018 12:11:53 Current IP received : 188.64.170.76;188.64.170.76
  285. 27-02-2018 12:11:53 Obtaining location
  286. 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  287. 27-02-2018 12:11:53 Obtaining location
  288. 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  289. 27-02-2018 12:11:53 Obtaining location
  290. 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  291. 27-02-2018 12:11:53 Obtaining location
  292. 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  293. 27-02-2018 12:11:53 Obtaining location
  294. 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  295. 27-02-2018 12:11:53 Obtaining location
  296. 27-02-2018 12:11:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  297. 27-02-2018 12:12:42 Current IP received : 188.64.170.76;188.64.170.76
  298. 27-02-2018 12:12:42 Obtaining location
  299. 27-02-2018 12:12:42 Current IP received : 188.64.170.76;188.64.170.76
  300. 27-02-2018 12:12:42 Obtaining location
  301. 27-02-2018 12:12:42 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  302. 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  303. 27-02-2018 12:12:43 Obtaining location
  304. 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  305. 27-02-2018 12:12:43 Obtaining location
  306. 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  307. 27-02-2018 12:12:43 Obtaining location
  308. 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  309. 27-02-2018 12:12:43 Obtaining location
  310. 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  311. 27-02-2018 12:12:43 Obtaining location
  312. 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  313. 27-02-2018 12:20:48 Current IP received : 188.64.170.76;188.64.170.76
  314. 27-02-2018 12:20:48 Obtaining location
  315. 27-02-2018 12:20:48 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  316. 27-02-2018 12:20:48 Obtaining location
  317. 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  318. 27-02-2018 12:20:49 Obtaining location
  319. 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  320. 27-02-2018 12:20:49 Obtaining location
  321. 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  322. 27-02-2018 12:20:49 Obtaining location
  323. 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  324. 27-02-2018 12:20:49 Obtaining location
  325. 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  326. 27-02-2018 12:20:53 Current IP received : 188.64.170.76;188.64.170.76
  327. 27-02-2018 12:20:53 Obtaining location
  328. 27-02-2018 12:20:53 Current IP received : 188.64.170.76;188.64.170.76
  329. 27-02-2018 12:20:53 Obtaining location
  330. 27-02-2018 12:20:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  331. 27-02-2018 12:20:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  332. 27-02-2018 12:20:53 Obtaining location
  333. 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  334. 27-02-2018 12:20:54 Obtaining location
  335. 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  336. 27-02-2018 12:20:54 Obtaining location
  337. 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  338. 27-02-2018 12:20:54 Obtaining location
  339. 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  340. 27-02-2018 12:20:54 Obtaining location
  341. 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  342. 27-02-2018 12:44:12 Current IP received : 188.64.170.76;188.64.170.76
  343. 27-02-2018 12:44:12 Obtaining location
  344. 27-02-2018 12:44:12 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  345. 27-02-2018 12:44:12 Obtaining location
  346. 27-02-2018 12:44:12 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  347. 27-02-2018 12:44:12 Obtaining location
  348. 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  349. 27-02-2018 12:44:13 Obtaining location
  350. 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  351. 27-02-2018 12:44:13 Obtaining location
  352. 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
  353. 27-02-2018 12:44:13 Obtaining location
  354. 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement