Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- 27-02-2018 12:44:15 Application version 1.2.5 started
- 27-02-2018 12:08:01 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.2.5 работает на Xiaomi MI MAX 2 (msm8953), Android 7.1.1 (NMF26F) API 25, ABI arm64-v8a, (Xiaomi/oxygen/oxygen:7.1.1/NMF26F/V9.2.1.0.NDDMIEK:user/release-keys)
- 27-02-2018 12:08:01 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
- 27-02-2018 12:08:01 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
- 27-02-2018 12:08:01 spawning 16 worker threads
- 27-02-2018 12:08:01 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
- 27-02-2018 12:08:01 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
- 27-02-2018 12:08:01 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:01 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:01 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:01 initiating IKE_SA android[1] to 91.105.236.205
- 27-02-2018 12:08:01 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:01 sending packet: from 192.168.1.35[42095] to 91.105.236.205[500] (746 bytes)
- 27-02-2018 12:08:01 received packet: from 91.105.236.205[500] to 192.168.1.35[42095] (38 bytes)
- 27-02-2018 12:08:01 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
- 27-02-2018 12:08:01 peer didn't accept DH group ECP_256, it requested MODP_2048
- 27-02-2018 12:08:01 initiating IKE_SA android[1] to 91.105.236.205
- 27-02-2018 12:08:01 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:01 sending packet: from 192.168.1.35[42095] to 91.105.236.205[500] (938 bytes)
- 27-02-2018 12:08:01 received packet: from 91.105.236.205[500] to 192.168.1.35[42095] (481 bytes)
- 27-02-2018 12:08:01 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
- 27-02-2018 12:08:01 local host is behind NAT, sending keep alives
- 27-02-2018 12:08:01 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:01 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:01 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:01 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
- 27-02-2018 12:08:01 establishing CHILD_SA android
- 27-02-2018 12:08:01 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
- 27-02-2018 12:08:01 splitting IKE message with length of 2224 bytes into 2 fragments
- 27-02-2018 12:08:01 generating IKE_AUTH request 1 [ EF(1/2) ]
- 27-02-2018 12:08:01 generating IKE_AUTH request 1 [ EF(2/2) ]
- 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (1368 bytes)
- 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (921 bytes)
- 27-02-2018 12:08:01 received packet: from 91.105.236.205[4500] to 192.168.1.35[44612] (1248 bytes)
- 27-02-2018 12:08:01 parsed IKE_AUTH response 1 [ EF(1/2) ]
- 27-02-2018 12:08:01 received fragment #1 of 2, waiting for complete IKE message
- 27-02-2018 12:08:01 received packet: from 91.105.236.205[4500] to 192.168.1.35[44612] (548 bytes)
- 27-02-2018 12:08:01 parsed IKE_AUTH response 1 [ EF(2/2) ]
- 27-02-2018 12:08:01 received fragment #2 of 2, reassembling fragmented IKE message
- 27-02-2018 12:08:01 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
- 27-02-2018 12:08:01 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
- 27-02-2018 12:08:01 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
- 27-02-2018 12:08:01 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:01 reached self-signed root ca with a path length of 0
- 27-02-2018 12:08:01 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:01 IKE_SA android[1] established between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
- 27-02-2018 12:08:01 scheduling rekeying in 36000s
- 27-02-2018 12:08:01 maximum IKE_SA lifetime 36600s
- 27-02-2018 12:08:01 installing DNS server 8.8.8.8
- 27-02-2018 12:08:01 installing DNS server 8.8.4.4
- 27-02-2018 12:08:01 installing DNS server 8.8.8.8
- 27-02-2018 12:08:01 installing DNS server 8.8.4.4
- 27-02-2018 12:08:01 installing new virtual IP 10.126.0.4
- 27-02-2018 12:08:01 CHILD_SA android{1} established with SPIs dc240343_i c9cb99eb_o and TS 10.126.0.4/32 === 0.0.0.0/0
- 27-02-2018 12:08:01 setting up TUN device for CHILD_SA android{1}
- 27-02-2018 12:08:01 successfully created TUN device
- 27-02-2018 12:08:01 received packet: from 91.105.236.205[4500] to 192.168.1.35[44612] (57 bytes)
- 27-02-2018 12:08:01 parsed INFORMATIONAL request 0 [ ]
- 27-02-2018 12:08:01 generating INFORMATIONAL response 0 [ ]
- 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (57 bytes)
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 old path is not available anymore, try to find another
- 27-02-2018 12:08:01 looking for a route to 91.105.236.205 ...
- 27-02-2018 12:08:01 no route found to reach 91.105.236.205, MOBIKE update deferred
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:01 deleting IKE_SA android[1] between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
- 27-02-2018 12:08:01 sending DELETE for IKE_SA android[1]
- 27-02-2018 12:08:01 generating INFORMATIONAL request 2 [ D ]
- 27-02-2018 12:08:01 sending packet: from 192.168.1.35[44612] to 91.105.236.205[4500] (65 bytes)
- 27-02-2018 12:08:01 error writing to socket: Network is unreachable
- 27-02-2018 12:08:27 Ожидание работы сети
- 27-02-2018 12:08:29 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
- 27-02-2018 12:08:29 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
- 27-02-2018 12:08:29 spawning 16 worker threads
- 27-02-2018 12:08:29 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
- 27-02-2018 12:08:29 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
- 27-02-2018 12:08:29 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:29 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:29 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:29 initiating IKE_SA android[1] to 91.105.236.205
- 27-02-2018 12:08:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:29 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (746 bytes)
- 27-02-2018 12:08:29 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (38 bytes)
- 27-02-2018 12:08:29 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
- 27-02-2018 12:08:29 peer didn't accept DH group ECP_256, it requested MODP_2048
- 27-02-2018 12:08:29 initiating IKE_SA android[1] to 91.105.236.205
- 27-02-2018 12:08:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:29 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (938 bytes)
- 27-02-2018 12:08:30 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (481 bytes)
- 27-02-2018 12:08:30 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
- 27-02-2018 12:08:30 local host is behind NAT, sending keep alives
- 27-02-2018 12:08:30 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:30 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:30 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:30 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
- 27-02-2018 12:08:30 establishing CHILD_SA android
- 27-02-2018 12:08:30 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
- 27-02-2018 12:08:30 splitting IKE message with length of 2224 bytes into 2 fragments
- 27-02-2018 12:08:30 generating IKE_AUTH request 1 [ EF(1/2) ]
- 27-02-2018 12:08:30 generating IKE_AUTH request 1 [ EF(2/2) ]
- 27-02-2018 12:08:30 sending packet: from 192.168.1.35[47608] to 91.105.236.205[4500] (1368 bytes)
- 27-02-2018 12:08:30 sending packet: from 192.168.1.35[47608] to 91.105.236.205[4500] (921 bytes)
- 27-02-2018 12:08:30 received packet: from 91.105.236.205[4500] to 192.168.1.35[47608] (1248 bytes)
- 27-02-2018 12:08:30 parsed IKE_AUTH response 1 [ EF(1/2) ]
- 27-02-2018 12:08:30 received fragment #1 of 2, waiting for complete IKE message
- 27-02-2018 12:08:30 received packet: from 91.105.236.205[4500] to 192.168.1.35[47608] (548 bytes)
- 27-02-2018 12:08:30 parsed IKE_AUTH response 1 [ EF(2/2) ]
- 27-02-2018 12:08:30 received fragment #2 of 2, reassembling fragmented IKE message
- 27-02-2018 12:08:30 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
- 27-02-2018 12:08:30 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
- 27-02-2018 12:08:30 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
- 27-02-2018 12:08:30 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:30 reached self-signed root ca with a path length of 0
- 27-02-2018 12:08:30 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:30 IKE_SA android[1] established between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
- 27-02-2018 12:08:30 scheduling rekeying in 35498s
- 27-02-2018 12:08:30 maximum IKE_SA lifetime 36098s
- 27-02-2018 12:08:30 installing DNS server 8.8.8.8
- 27-02-2018 12:08:30 installing DNS server 8.8.4.4
- 27-02-2018 12:08:30 installing DNS server 8.8.8.8
- 27-02-2018 12:08:30 installing DNS server 8.8.4.4
- 27-02-2018 12:08:30 installing new virtual IP 10.126.0.4
- 27-02-2018 12:08:30 CHILD_SA android{1} established with SPIs a09353e7_i c0d1a410_o and TS 10.126.0.4/32 === 0.0.0.0/0
- 27-02-2018 12:08:30 setting up TUN device for CHILD_SA android{1}
- 27-02-2018 12:08:30 successfully created TUN device
- 27-02-2018 12:08:30 deleting IKE_SA android[1] between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...91.105.236.205[server]
- 27-02-2018 12:08:30 sending DELETE for IKE_SA android[1]
- 27-02-2018 12:08:30 generating INFORMATIONAL request 2 [ D ]
- 27-02-2018 12:08:30 sending packet: from 192.168.1.35[47608] to 91.105.236.205[4500] (65 bytes)
- 27-02-2018 12:08:31 Current IP received : 46.173.5.175;46.173.5.175
- 27-02-2018 12:08:31 Obtaining location
- 27-02-2018 12:08:31 Location received
- 27-02-2018 12:08:32 Current IP received : 46.173.5.175;46.173.5.175
- 27-02-2018 12:08:32 Obtaining location
- 27-02-2018 12:08:32 Location received
- 27-02-2018 12:08:32 Current location : Russian Federation
- 27-02-2018 12:08:32 Current IP received : 46.173.5.175;46.173.5.175
- 27-02-2018 12:08:32 Obtaining location
- 27-02-2018 12:08:33 Location received
- 27-02-2018 12:08:33 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
- 27-02-2018 12:08:33 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
- 27-02-2018 12:08:33 spawning 16 worker threads
- 27-02-2018 12:08:33 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
- 27-02-2018 12:08:33 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
- 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:33 initiating IKE_SA android[1] to 91.105.236.205
- 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:33 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (746 bytes)
- 27-02-2018 12:08:33 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (38 bytes)
- 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
- 27-02-2018 12:08:33 peer didn't accept DH group ECP_256, it requested MODP_2048
- 27-02-2018 12:08:33 initiating IKE_SA android[1] to 91.105.236.205
- 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:33 sending packet: from 192.168.1.35[43197] to 91.105.236.205[500] (938 bytes)
- 27-02-2018 12:08:33 received packet: from 91.105.236.205[500] to 192.168.1.35[43197] (481 bytes)
- 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
- 27-02-2018 12:08:33 local host is behind NAT, sending keep alives
- 27-02-2018 12:08:33 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:33 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:33 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:33 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
- 27-02-2018 12:08:33 establishing CHILD_SA android
- 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
- 27-02-2018 12:08:33 Starting IKE charon daemon (strongSwan @PACKAGE_VERSION@, Linux 3.18.31-perf-g9ed5ca3, aarch64)
- 27-02-2018 12:08:33 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls
- 27-02-2018 12:08:33 spawning 16 worker threads
- 27-02-2018 12:08:33 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' and private key
- 27-02-2018 12:08:33 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
- 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:33 algorithm 'curve25519' not recognized
- 27-02-2018 12:08:33 initiating IKE_SA android[2] to 188.64.170.189
- 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:33 sending packet: from 192.168.1.35[56875] to 188.64.170.189[500] (746 bytes)
- 27-02-2018 12:08:33 received packet: from 188.64.170.189[500] to 192.168.1.35[56875] (38 bytes)
- 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
- 27-02-2018 12:08:33 peer didn't accept DH group ECP_256, it requested MODP_2048
- 27-02-2018 12:08:33 initiating IKE_SA android[2] to 188.64.170.189
- 27-02-2018 12:08:33 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
- 27-02-2018 12:08:33 sending packet: from 192.168.1.35[56875] to 188.64.170.189[500] (938 bytes)
- 27-02-2018 12:08:33 received packet: from 188.64.170.189[500] to 192.168.1.35[56875] (481 bytes)
- 27-02-2018 12:08:33 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
- 27-02-2018 12:08:33 local host is behind NAT, sending keep alives
- 27-02-2018 12:08:33 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:33 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:33 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:33 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name"
- 27-02-2018 12:08:33 establishing CHILD_SA android
- 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) ]
- 27-02-2018 12:08:33 splitting IKE message with length of 2224 bytes into 2 fragments
- 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ EF(1/2) ]
- 27-02-2018 12:08:33 generating IKE_AUTH request 1 [ EF(2/2) ]
- 27-02-2018 12:08:33 sending packet: from 192.168.1.35[59971] to 188.64.170.189[4500] (1368 bytes)
- 27-02-2018 12:08:33 sending packet: from 192.168.1.35[59971] to 188.64.170.189[4500] (921 bytes)
- 27-02-2018 12:08:34 received packet: from 188.64.170.189[4500] to 192.168.1.35[59971] (1248 bytes)
- 27-02-2018 12:08:34 parsed IKE_AUTH response 1 [ EF(1/2) ]
- 27-02-2018 12:08:34 received fragment #1 of 2, waiting for complete IKE message
- 27-02-2018 12:08:34 received packet: from 188.64.170.189[4500] to 192.168.1.35[59971] (548 bytes)
- 27-02-2018 12:08:34 parsed IKE_AUTH response 1 [ EF(2/2) ]
- 27-02-2018 12:08:34 received fragment #2 of 2, reassembling fragmented IKE message
- 27-02-2018 12:08:34 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
- 27-02-2018 12:08:34 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.na
- 27-02-2018 12:08:34 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
- 27-02-2018 12:08:34 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
- 27-02-2018 12:08:34 reached self-signed root ca with a path length of 0
- 27-02-2018 12:08:34 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
- 27-02-2018 12:08:34 IKE_SA android[2] established between 192.168.1.35[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_833192804455757, E=feedback@hidemy.name]...188.64.170.189[server]
- 27-02-2018 12:08:34 scheduling rekeying in 35580s
- 27-02-2018 12:08:34 maximum IKE_SA lifetime 36180s
- 27-02-2018 12:08:34 installing DNS server 8.8.8.8
- 27-02-2018 12:08:34 installing DNS server 8.8.4.4
- 27-02-2018 12:08:34 installing DNS server 8.8.8.8
- 27-02-2018 12:08:34 installing DNS server 8.8.4.4
- 27-02-2018 12:08:34 installing new virtual IP 10.123.16.182
- 27-02-2018 12:08:34 CHILD_SA android{2} established with SPIs a6c1af63_i cab113a2_o and TS 10.123.16.182/32 === 0.0.0.0/0
- 27-02-2018 12:08:34 setting up TUN device for CHILD_SA android{2}
- 27-02-2018 12:08:34 successfully created TUN device
- 27-02-2018 12:08:36 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:08:36 Obtaining location
- 27-02-2018 12:08:36 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:08:36 Obtaining location
- 27-02-2018 12:08:36 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:08:36 Obtaining location
- 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:08:37 Obtaining location
- 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:08:37 Obtaining location
- 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:08:37 Obtaining location
- 27-02-2018 12:08:37 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:36 Internal authentication is successful
- 27-02-2018 12:11:38 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:11:38 Obtaining location
- 27-02-2018 12:11:38 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:38 Obtaining location
- 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:39 Obtaining location
- 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:39 Obtaining location
- 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:39 Obtaining location
- 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:39 Obtaining location
- 27-02-2018 12:11:39 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:45 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:11:45 Obtaining location
- 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:46 Obtaining location
- 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:46 Obtaining location
- 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:46 Obtaining location
- 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:46 Obtaining location
- 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:46 Obtaining location
- 27-02-2018 12:11:46 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:53 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:11:53 Obtaining location
- 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:53 Obtaining location
- 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:53 Obtaining location
- 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:53 Obtaining location
- 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:53 Obtaining location
- 27-02-2018 12:11:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:11:53 Obtaining location
- 27-02-2018 12:11:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:42 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:12:42 Obtaining location
- 27-02-2018 12:12:42 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:12:42 Obtaining location
- 27-02-2018 12:12:42 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:43 Obtaining location
- 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:43 Obtaining location
- 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:43 Obtaining location
- 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:43 Obtaining location
- 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:12:43 Obtaining location
- 27-02-2018 12:12:43 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:48 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:20:48 Obtaining location
- 27-02-2018 12:20:48 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:48 Obtaining location
- 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:49 Obtaining location
- 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:49 Obtaining location
- 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:49 Obtaining location
- 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:49 Obtaining location
- 27-02-2018 12:20:49 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:53 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:20:53 Obtaining location
- 27-02-2018 12:20:53 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:20:53 Obtaining location
- 27-02-2018 12:20:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:53 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:53 Obtaining location
- 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:54 Obtaining location
- 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:54 Obtaining location
- 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:54 Obtaining location
- 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:20:54 Obtaining location
- 27-02-2018 12:20:54 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:44:12 Current IP received : 188.64.170.76;188.64.170.76
- 27-02-2018 12:44:12 Obtaining location
- 27-02-2018 12:44:12 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:44:12 Obtaining location
- 27-02-2018 12:44:12 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:44:12 Obtaining location
- 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:44:13 Obtaining location
- 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:44:13 Obtaining location
- 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
- 27-02-2018 12:44:13 Obtaining location
- 27-02-2018 12:44:13 Obtaining location error : java.net.ProtocolException: Expected ':status' header not present
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement