Jump to content
Not connected, Your IP: 3.149.233.72
Sign in to follow this  
soundtribe

Open vpn android code 101 with udp. Tcp doesn't worm

Recommended Posts

2016-01-09 17:35:39 official build 0.6.46 running on motorola XT1049 (MSM8960), Android 4.4.4 (KXA21.12-L2.7.2) API 19, ABI armeabi-v7a, (motorola/ghost_repw/ghost:4.4.4/KXA21.12-L2.7.2/12:user/release-keys)

2016-01-09 17:35:39 Building configuration…

2016-01-09 17:35:41 started Socket Thread

2016-01-09 17:35:41 P:Initializing Google Breakpad!

2016-01-09 17:35:41 Current Parameter Settings:

2016-01-09 17:35:41 config = '/data/data/de.blinkt.openvpn/cache/android.conf'

2016-01-09 17:35:41 mode = 0

2016-01-09 17:35:41 show_ciphers = DISABLED

2016-01-09 17:35:41 show_digests = DISABLED

2016-01-09 17:35:41 show_engines = DISABLED

2016-01-09 17:35:41 genkey = DISABLED

2016-01-09 17:35:41 key_pass_file = '[uNDEF]'

2016-01-09 17:35:41 show_tls_ciphers = DISABLED

2016-01-09 17:35:41 connect_retry_max = 5

2016-01-09 17:35:41 Connection profiles [0]:

2016-01-09 17:35:41 proto = udp

2016-01-09 17:35:41 local = '[uNDEF]'

2016-01-09 17:35:41 local_port = '1194'

2016-01-09 17:35:41 remote = 'america.vpn.airdns.org'

2016-01-09 17:35:41 remote_port = '443'

2016-01-09 17:35:41 remote_float = DISABLED

2016-01-09 17:35:41 bind_defined = DISABLED

2016-01-09 17:35:41 bind_local = ENABLED

2016-01-09 17:35:41 bind_ipv6_only = DISABLED

2016-01-09 17:35:41 connect_retry_seconds = 5

2016-01-09 17:35:41 connect_timeout = 120

2016-01-09 17:35:41 socks_proxy_server = '[uNDEF]'

2016-01-09 17:35:41 socks_proxy_port = '[uNDEF]'

2016-01-09 17:35:41 socks_proxy_retry = DISABLED

2016-01-09 17:35:41 tun_mtu = 1500

2016-01-09 17:35:41 tun_mtu_defined = ENABLED

2016-01-09 17:35:41 link_mtu = 1500

2016-01-09 17:35:41 link_mtu_defined = DISABLED

2016-01-09 17:35:41 tun_mtu_extra = 0

2016-01-09 17:35:41 tun_mtu_extra_defined = DISABLED

2016-01-09 17:35:41 mtu_discover_type = -1

2016-01-09 17:35:41 fragment = 0

2016-01-09 17:35:41 mssfix = 1450

2016-01-09 17:35:41 explicit_exit_notification = 5

2016-01-09 17:35:41 Connection profiles END

2016-01-09 17:35:41 remote_random = DISABLED

2016-01-09 17:35:41 ipchange = '[uNDEF]'

2016-01-09 17:35:41 dev = 'tun'

2016-01-09 17:35:41 dev_type = '[uNDEF]'

2016-01-09 17:35:41 dev_node = '[uNDEF]'

2016-01-09 17:35:41 lladdr = '[uNDEF]'

2016-01-09 17:35:41 topology = 1

2016-01-09 17:35:41 tun_ipv6 = DISABLED

2016-01-09 17:35:41 ifconfig_local = '[uNDEF]'

2016-01-09 17:35:41 ifconfig_remote_netmask = '[uNDEF]'

2016-01-09 17:35:41 ifconfig_noexec = DISABLED

2016-01-09 17:35:41 ifconfig_nowarn = ENABLED

2016-01-09 17:35:41 ifconfig_ipv6_local = '[uNDEF]'

2016-01-09 17:35:41 ifconfig_ipv6_netbits = 0

2016-01-09 17:35:41 ifconfig_ipv6_remote = '[uNDEF]'

2016-01-09 17:35:41 shaper = 0

2016-01-09 17:35:41 mtu_test = 0

2016-01-09 17:35:41 mlock = DISABLED

2016-01-09 17:35:41 keepalive_ping = 0

2016-01-09 17:35:41 keepalive_timeout = 0

2016-01-09 17:35:41 inactivity_timeout = 0

2016-01-09 17:35:41 ping_send_timeout = 0

2016-01-09 17:35:41 ping_rec_timeout = 0

2016-01-09 17:35:41 ping_rec_timeout_action = 0

2016-01-09 17:35:41 ping_timer_remote = DISABLED

2016-01-09 17:35:41 remap_sigusr1 = 0

2016-01-09 17:35:41 persist_tun = ENABLED

2016-01-09 17:35:41 persist_local_ip = DISABLED

2016-01-09 17:35:41 persist_remote_ip = DISABLED

2016-01-09 17:35:41 persist_key = DISABLED

2016-01-09 17:35:41 passtos = DISABLED

2016-01-09 17:35:41 resolve_retry_seconds = 1000000000

2016-01-09 17:35:41 resolve_in_advance = ENABLED

2016-01-09 17:35:41 username = '[uNDEF]'

2016-01-09 17:35:41 groupname = '[uNDEF]'

2016-01-09 17:35:41 chroot_dir = '[uNDEF]'

2016-01-09 17:35:41 cd_dir = '[uNDEF]'

2016-01-09 17:35:41 writepid = '[uNDEF]'

2016-01-09 17:35:41 up_script = '[uNDEF]'

2016-01-09 17:35:41 down_script = '[uNDEF]'

2016-01-09 17:35:41 down_pre = DISABLED

2016-01-09 17:35:41 up_restart = DISABLED

2016-01-09 17:35:41 up_delay = DISABLED

2016-01-09 17:35:41 daemon = DISABLED

2016-01-09 17:35:41 inetd = 0

2016-01-09 17:35:41 log = DISABLED

2016-01-09 17:35:41 suppress_timestamps = DISABLED

2016-01-09 17:35:41 machine_readable_output = ENABLED

2016-01-09 17:35:41 nice = 0

2016-01-09 17:35:41 verbosity = 4

2016-01-09 17:35:41 mute = 0

2016-01-09 17:35:41 gremlin = 0

2016-01-09 17:35:41 status_file = '[uNDEF]'

2016-01-09 17:35:41 status_file_version = 1

2016-01-09 17:35:41 status_file_update_freq = 60

2016-01-09 17:35:41 occ = ENABLED

2016-01-09 17:35:41 rcvbuf = 0

2016-01-09 17:35:41 sndbuf = 0

2016-01-09 17:35:41 sockflags = 0

2016-01-09 17:35:41 fast_io = DISABLED

2016-01-09 17:35:41 comp.alg = 2

2016-01-09 17:35:41 comp.flags = 1

2016-01-09 17:35:41 route_script = '[uNDEF]'

2016-01-09 17:35:41 route_default_gateway = '[uNDEF]'

2016-01-09 17:35:41 route_default_metric = 0

2016-01-09 17:35:41 route_noexec = DISABLED

2016-01-09 17:35:41 route_delay = 0

2016-01-09 17:35:41 route_delay_window = 30

2016-01-09 17:35:41 route_delay_defined = DISABLED

2016-01-09 17:35:41 route_nopull = DISABLED

2016-01-09 17:35:41 route_gateway_via_dhcp = DISABLED

2016-01-09 17:35:41 allow_pull_fqdn = DISABLED

2016-01-09 17:35:41 route 0.0.0.0/0.0.0.0/vpn_gateway/nil

2016-01-09 17:35:41 management_addr = '/data/data/de.blinkt.openvpn/cache/mgmtsocket'

2016-01-09 17:35:41 management_port = 'unix'

2016-01-09 17:35:41 management_user_pass = '[uNDEF]'

2016-01-09 17:35:41 management_log_history_cache = 250

2016-01-09 17:35:41 management_echo_buffer_size = 100

2016-01-09 17:35:41 management_write_peer_info_file = '[uNDEF]'

2016-01-09 17:35:41 management_client_user = '[uNDEF]'

2016-01-09 17:35:41 management_client_group = '[uNDEF]'

2016-01-09 17:35:41 management_flags = 294

2016-01-09 17:35:41 shared_secret_file = '[uNDEF]'

2016-01-09 17:35:41 key_direction = 2

2016-01-09 17:35:41 ciphername_defined = ENABLED

2016-01-09 17:35:41 ciphername = 'AES-256-CBC'

2016-01-09 17:35:41 authname_defined = ENABLED

2016-01-09 17:35:41 authname = 'SHA1'

2016-01-09 17:35:41 prng_hash = 'SHA1'

2016-01-09 17:35:41 prng_nonce_secret_len = 16

2016-01-09 17:35:41 keysize = 0

2016-01-09 17:35:41 engine = DISABLED

2016-01-09 17:35:41 replay = ENABLED

2016-01-09 17:35:41 mute_replay_warnings = DISABLED

2016-01-09 17:35:41 replay_window = 64

2016-01-09 17:35:41 replay_time = 15

2016-01-09 17:35:41 packet_id_file = '[uNDEF]'

2016-01-09 17:35:41 use_iv = ENABLED

2016-01-09 17:35:41 test_crypto = DISABLED

2016-01-09 17:35:41 tls_server = DISABLED

2016-01-09 17:35:41 tls_client = ENABLED

2016-01-09 17:35:41 key_method = 2

2016-01-09 17:35:41 ca_file = '[[iNLINE]]'

2016-01-09 17:35:41 ca_path = '[uNDEF]'

2016-01-09 17:35:41 dh_file = '[uNDEF]'

2016-01-09 17:35:41 cert_file = '[[iNLINE]]'

2016-01-09 17:35:41 extra_certs_file = '[uNDEF]'

2016-01-09 17:35:41 priv_key_file = '[[iNLINE]]'

2016-01-09 17:35:41 pkcs12_file = '[uNDEF]'

2016-01-09 17:35:41 cipher_list = '[uNDEF]'

2016-01-09 17:35:41 tls_verify = '[uNDEF]'

2016-01-09 17:35:41 tls_export_cert = '[uNDEF]'

2016-01-09 17:35:41 verify_x509_type = 0

2016-01-09 17:35:41 verify_x509_name = '[uNDEF]'

2016-01-09 17:35:41 crl_file = '[uNDEF]'

2016-01-09 17:35:41 ns_cert_type = 0

2016-01-09 17:35:41 remote_cert_ku = 160

2016-01-09 17:35:41 remote_cert_ku = 136

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_ku = 0

2016-01-09 17:35:41 remote_cert_eku = 'TLS Web Server Authentication'

2016-01-09 17:35:41 ssl_flags = 0

2016-01-09 17:35:41 tls_timeout = 2

2016-01-09 17:35:41 renegotiate_bytes = 0

2016-01-09 17:35:41 renegotiate_packets = 0

2016-01-09 17:35:41 renegotiate_seconds = 3600

2016-01-09 17:35:41 handshake_window = 60

2016-01-09 17:35:41 transition_window = 3600

2016-01-09 17:35:41 single_session = DISABLED

2016-01-09 17:35:41 push_peer_info = DISABLED

2016-01-09 17:35:41 tls_exit = DISABLED

2016-01-09 17:35:41 tls_auth_file = '[[iNLINE]]'

2016-01-09 17:35:41 client = ENABLED

2016-01-09 17:35:41 pull = ENABLED

2016-01-09 17:35:41 auth_user_pass_file = '[uNDEF]'

2016-01-09 17:35:41 OpenVPN 2.4-icsopenvpn [git:icsopenvpn_645-e6b5e62e37c02d5b] android-14-armeabi-v7a [sSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH] [iPv6] built on Dec 8 2015

2016-01-09 17:35:41 library versions: OpenSSL 1.0.2e 3 Dec 2015, LZO 2.09

2016-01-09 17:35:41 MANAGEMENT: Connected to management server at /data/data/de.blinkt.openvpn/cache/mgmtsocket

2016-01-09 17:35:41 MANAGEMENT: CMD 'hold release'

2016-01-09 17:35:41 Control Channel Authentication: tls-auth using INLINE static key file

2016-01-09 17:35:41 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:35:41 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:35:41 LZO compression initializing

2016-01-09 17:35:41 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-01-09 17:35:41 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-01-09 17:35:41 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-01-09 17:35:41 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-01-09 17:35:41 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443

2016-01-09 17:35:41 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-01-09 17:35:41 MANAGEMENT: CMD 'bytecount 2'

2016-01-09 17:35:41 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-01-09 17:35:41 UDP link local (bound): [AF_INET][undef]:1194

2016-01-09 17:35:41 UDP link remote: [AF_INET]184.75.214.162:443

2016-01-09 17:35:41 MANAGEMENT: CMD 'state on'

2016-01-09 17:35:41 Network Status: CONNECTED LTE to mobile n.b7.ispsn

2016-01-09 17:35:41 MANAGEMENT: >STATE:1452378941,AUTH,,,,,,

2016-01-09 17:35:42 TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=383076ab 7714b19f

2016-01-09 17:35:42 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-01-09 17:35:42 Validating certificate key usage

2016-01-09 17:35:42 ++ Certificate has key usage 00a0, expects 00a0

2016-01-09 17:35:42 VERIFY KU OK

2016-01-09 17:35:42 Validating certificate extended key usage

2016-01-09 17:35:42 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-01-09 17:35:42 VERIFY EKU OK

2016-01-09 17:35:42 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-01-09 17:35:43 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:35:43 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:35:43 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:35:43 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:35:43 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-01-09 17:35:43 [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443

2016-01-09 17:35:44 MANAGEMENT: >STATE:1452378944,GET_CONFIG,,,,,,

2016-01-09 17:35:45 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-01-09 17:35:45 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.41.77 255.255.0.0'

2016-01-09 17:35:45 OPTIONS IMPORT: timers and/or timeouts modified

2016-01-09 17:35:45 OPTIONS IMPORT: compression parms modified

2016-01-09 17:35:45 OPTIONS IMPORT: --ifconfig/up options modified

2016-01-09 17:35:45 OPTIONS IMPORT: route options modified

2016-01-09 17:35:45 OPTIONS IMPORT: route-related options modified

2016-01-09 17:35:45 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-01-09 17:35:45 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-01-09 17:35:45 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-01-09 17:35:45 MANAGEMENT: >STATE:1452378944,ASSIGN_IP,,10.4.41.77,,,,

2016-01-09 17:35:45 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-01-09 17:35:45 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:35:45 MANAGEMENT: >STATE:1452378945,ADD_ROUTES,,,,,,

2016-01-09 17:35:45 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:35:45 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-01-09 17:35:45 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2016-01-09 17:35:45 Opening tun interface:

2016-01-09 17:35:45 Local IPv4: 10.4.41.77/16 IPv6: null MTU: 1500

2016-01-09 17:35:45 DNS Server: 10.4.0.1, Domain: null

2016-01-09 17:35:45 Routes: 0.0.0.0/0

2016-01-09 17:35:45 Routes excluded:

2016-01-09 17:35:45 VpnService routes installed: 0.0.0.0/0

2016-01-09 17:35:45 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2016-01-09 17:35:45 Initialization Sequence Completed

2016-01-09 17:35:45 MANAGEMENT: >STATE:1452378945,CONNECTED,SUCCESS,10.4.41.77,184.75.214.162,443,,

2016-01-09 17:36:31 PID_ERR replay-window backtrack occurred [1] [sSL-0] [0_1111111111111111111111111111111111111111111111111111111>EEEEEE] 0:66 0:65 t=1452378991[0] r=[-1,64,15,1,1] sl=[62,64,64,272]

2016-01-09 17:36:31 PID_ERR replay-window backtrack occurred [2] [sSL-0] [00_0001111111111111111111111111111111111111111111111111111111>EE] 0:70 0:68 t=1452378991[0] r=[-1,64,15,2,1] sl=[58,64,64,272]

2016-01-09 17:36:47 PID_ERR replay-window backtrack occurred [3] [sSL-0] [000_000000000000000000011111111111111111223579>>>>>>>>>>>>>>>>>>] 0:213 0:210 t=1452379007[0] r=[-2,64,15,3,1] sl=[43,64,64,272]

2016-01-09 17:36:49 write UDP []: Network is unreachable (code=101)

2016-01-09 17:36:49 write UDP []: Network is unreachable (code=101)

2016-01-09 17:37:49 [server] Inactivity timeout (--ping-restart), restarting

2016-01-09 17:37:49 TCP/UDP: Closing socket

2016-01-09 17:37:49 SIGUSR1[soft,ping-restart] received, process restarting

2016-01-09 17:37:49 MANAGEMENT: >STATE:1452379069,RECONNECTING,ping-restart,,,,,

2016-01-09 17:37:49 MANAGEMENT: CMD 'hold release'

2016-01-09 17:37:49 Control Channel Authentication: tls-auth using INLINE static key file

2016-01-09 17:37:49 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:37:49 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:37:49 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-01-09 17:37:49 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-01-09 17:37:49 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-01-09 17:37:49 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-01-09 17:37:49 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443

2016-01-09 17:37:49 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-01-09 17:37:49 MANAGEMENT: CMD 'bytecount 2'

2016-01-09 17:37:49 MANAGEMENT: CMD 'state on'

2016-01-09 17:37:49 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-01-09 17:37:49 UDP link local (bound): [AF_INET][undef]:1194

2016-01-09 17:37:49 UDP link remote: [AF_INET]184.75.214.162:443

2016-01-09 17:37:49 MANAGEMENT: >STATE:1452379069,WAIT,,,,,,

2016-01-09 17:37:49 MANAGEMENT: >STATE:1452379069,AUTH,,,,,,

2016-01-09 17:37:49 TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=e06e5779 783fb6c8

2016-01-09 17:37:50 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-01-09 17:37:50 Validating certificate key usage

2016-01-09 17:37:50 ++ Certificate has key usage 00a0, expects 00a0

2016-01-09 17:37:50 VERIFY KU OK

2016-01-09 17:37:50 Validating certificate extended key usage

2016-01-09 17:37:50 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-01-09 17:37:50 VERIFY EKU OK

2016-01-09 17:37:50 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-01-09 17:37:51 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:37:51 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:37:51 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:37:51 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:37:51 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-01-09 17:37:51 [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443

2016-01-09 17:37:52 MANAGEMENT: >STATE:1452379072,GET_CONFIG,,,,,,

2016-01-09 17:37:52 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-01-09 17:37:53 PID_ERR replay-window backtrack occurred [5] [sSL-0] [0_____0000011111111] 0:19 0:14 t=1452379073[0] r=[-1,64,15,5,1] sl=[45,19,64,272]

2016-01-09 17:37:54 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.41.77 255.255.0.0'

2016-01-09 17:37:54 OPTIONS IMPORT: timers and/or timeouts modified

2016-01-09 17:37:54 OPTIONS IMPORT: compression parms modified

2016-01-09 17:37:54 OPTIONS IMPORT: --ifconfig/up options modified

2016-01-09 17:37:54 OPTIONS IMPORT: route options modified

2016-01-09 17:37:54 OPTIONS IMPORT: route-related options modified

2016-01-09 17:37:54 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-01-09 17:37:54 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-01-09 17:37:54 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-01-09 17:37:54 MANAGEMENT: >STATE:1452379074,ASSIGN_IP,,10.4.41.77,,,,

2016-01-09 17:37:54 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-01-09 17:37:54 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:37:54 MANAGEMENT: >STATE:1452379074,ADD_ROUTES,,,,,,

2016-01-09 17:37:54 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:37:54 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-01-09 17:37:54 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' NOACTION'

2016-01-09 17:37:54 Initialization Sequence Completed

2016-01-09 17:37:54 MANAGEMENT: >STATE:1452379074,CONNECTED,SUCCESS,10.4.41.77,184.75.214.162,443,,

2016-01-09 17:57:16 write UDP []: Network is unreachable (code=101)

2016-01-09 17:57:16 write UDP []: Network is unreachable (code=101)

2016-01-09 17:57:16 write UDP []: Network is unreachable (code=101)

2016-01-09 17:57:16 write UDP []: Network is unreachable (code=101)

2016-01-09 17:57:17 write UDP []: Network is unreachable (code=101)

2016-01-09 17:58:16 [server] Inactivity timeout (--ping-restart), restarting

2016-01-09 17:58:16 TCP/UDP: Closing socket

2016-01-09 17:58:16 SIGUSR1[soft,ping-restart] received, process restarting

2016-01-09 17:58:16 MANAGEMENT: >STATE:1452380296,RECONNECTING,ping-restart,,,,,

2016-01-09 17:58:16 MANAGEMENT: CMD 'hold release'

2016-01-09 17:58:16 Control Channel Authentication: tls-auth using INLINE static key file

2016-01-09 17:58:16 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:58:16 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:58:16 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-01-09 17:58:16 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-01-09 17:58:16 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-01-09 17:58:16 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-01-09 17:58:16 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443

2016-01-09 17:58:16 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-01-09 17:58:16 MANAGEMENT: CMD 'bytecount 2'

2016-01-09 17:58:16 MANAGEMENT: CMD 'state on'

2016-01-09 17:58:16 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-01-09 17:58:16 UDP link local (bound): [AF_INET][undef]:1194

2016-01-09 17:58:16 UDP link remote: [AF_INET]184.75.214.162:443

2016-01-09 17:58:16 MANAGEMENT: >STATE:1452380296,WAIT,,,,,,

2016-01-09 17:58:16 MANAGEMENT: >STATE:1452380296,AUTH,,,,,,

2016-01-09 17:58:16 TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=7c993636 4e42f6a6

2016-01-09 17:58:17 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-01-09 17:58:17 Validating certificate key usage

2016-01-09 17:58:17 ++ Certificate has key usage 00a0, expects 00a0

2016-01-09 17:58:17 VERIFY KU OK

2016-01-09 17:58:17 Validating certificate extended key usage

2016-01-09 17:58:17 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-01-09 17:58:17 VERIFY EKU OK

2016-01-09 17:58:17 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-01-09 17:58:18 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:58:18 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:58:18 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:58:18 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:58:18 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-01-09 17:58:18 [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443

2016-01-09 17:58:20 MANAGEMENT: >STATE:1452380300,GET_CONFIG,,,,,,

2016-01-09 17:58:20 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-01-09 17:58:20 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.41.77 255.255.0.0'

2016-01-09 17:58:20 OPTIONS IMPORT: timers and/or timeouts modified

2016-01-09 17:58:20 OPTIONS IMPORT: compression parms modified

2016-01-09 17:58:20 OPTIONS IMPORT: --ifconfig/up options modified

2016-01-09 17:58:20 OPTIONS IMPORT: route options modified

2016-01-09 17:58:20 OPTIONS IMPORT: route-related options modified

2016-01-09 17:58:20 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-01-09 17:58:20 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-01-09 17:58:20 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-01-09 17:58:20 MANAGEMENT: >STATE:1452380300,ASSIGN_IP,,10.4.41.77,,,,

2016-01-09 17:58:20 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-01-09 17:58:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:58:20 MANAGEMENT: >STATE:1452380300,ADD_ROUTES,,,,,,

2016-01-09 17:58:20 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:58:20 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-01-09 17:58:20 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2016-01-09 17:58:20 Opening tun interface:

2016-01-09 17:58:20 Local IPv4: 10.4.41.77/16 IPv6: null MTU: 1500

2016-01-09 17:58:20 DNS Server: 10.4.0.1, 10.4.0.1, Domain: null

2016-01-09 17:58:20 Routes: 0.0.0.0/0

2016-01-09 17:58:20 Routes excluded:

2016-01-09 17:58:20 VpnService routes installed: 0.0.0.0/0

2016-01-09 17:58:20 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2016-01-09 17:58:21 Initialization Sequence Completed

2016-01-09 17:58:21 MANAGEMENT: >STATE:1452380301,CONNECTED,SUCCESS,10.4.41.77,184.75.214.162,443,,

2016-01-09 17:58:39 write UDP []: Network is unreachable (code=101)

2016-01-09 17:59:39 [server] Inactivity timeout (--ping-restart), restarting

2016-01-09 17:59:39 TCP/UDP: Closing socket

2016-01-09 17:59:39 SIGUSR1[soft,ping-restart] received, process restarting

2016-01-09 17:59:39 MANAGEMENT: >STATE:1452380379,RECONNECTING,ping-restart,,,,,

2016-01-09 17:59:39 MANAGEMENT: CMD 'hold release'

2016-01-09 17:59:39 Control Channel Authentication: tls-auth using INLINE static key file

2016-01-09 17:59:39 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:59:39 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:59:39 Control Channel MTU parms [ L:1558 D:1184 EF:66 EB:0 ET:0 EL:3 ]

2016-01-09 17:59:39 Data Channel MTU parms [ L:1558 D:1450 EF:58 EB:395 ET:0 EL:3 ]

2016-01-09 17:59:39 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client'

2016-01-09 17:59:39 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 0,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-server'

2016-01-09 17:59:39 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443

2016-01-09 17:59:39 Socket Buffers: R=[163840->163840] S=[163840->163840]

2016-01-09 17:59:39 MANAGEMENT: CMD 'bytecount 2'

2016-01-09 17:59:39 MANAGEMENT: CMD 'state on'

2016-01-09 17:59:39 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'

2016-01-09 17:59:39 UDP link local (bound): [AF_INET][undef]:1194

2016-01-09 17:59:39 UDP link remote: [AF_INET]184.75.214.162:443

2016-01-09 17:59:39 MANAGEMENT: >STATE:1452380379,WAIT,,,,,,

2016-01-09 17:59:39 MANAGEMENT: >STATE:1452380379,AUTH,,,,,,

2016-01-09 17:59:39 TLS: Initial packet from [AF_INET]184.75.214.162:443, sid=ca4e19c6 918fd98e

2016-01-09 17:59:40 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

2016-01-09 17:59:40 Validating certificate key usage

2016-01-09 17:59:40 ++ Certificate has key usage 00a0, expects 00a0

2016-01-09 17:59:40 VERIFY KU OK

2016-01-09 17:59:40 Validating certificate extended key usage

2016-01-09 17:59:40 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

2016-01-09 17:59:40 VERIFY EKU OK

2016-01-09 17:59:40 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

2016-01-09 17:59:41 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:59:41 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:59:41 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

2016-01-09 17:59:41 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

2016-01-09 17:59:41 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA

2016-01-09 17:59:41 [server] Peer Connection Initiated with [AF_INET]184.75.214.162:443

2016-01-09 17:59:42 MANAGEMENT: >STATE:1452380382,GET_CONFIG,,,,,,

2016-01-09 17:59:42 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

2016-01-09 17:59:42 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.41.77 255.255.0.0'

2016-01-09 17:59:42 OPTIONS IMPORT: timers and/or timeouts modified

2016-01-09 17:59:42 OPTIONS IMPORT: compression parms modified

2016-01-09 17:59:42 OPTIONS IMPORT: --ifconfig/up options modified

2016-01-09 17:59:42 OPTIONS IMPORT: route options modified

2016-01-09 17:59:42 OPTIONS IMPORT: route-related options modified

2016-01-09 17:59:42 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

2016-01-09 17:59:42 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo HWADDR=00:00:00:00:00:00

2016-01-09 17:59:42 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

2016-01-09 17:59:42 MANAGEMENT: >STATE:1452380382,ASSIGN_IP,,10.4.41.77,,,,

2016-01-09 17:59:42 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'

2016-01-09 17:59:42 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:59:42 MANAGEMENT: >STATE:1452380382,ADD_ROUTES,,,,,,

2016-01-09 17:59:42 MANAGEMENT: CMD 'needok 'ROUTE' ok'

2016-01-09 17:59:42 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'

2016-01-09 17:59:42 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'

2016-01-09 17:59:42 Opening tun interface:

2016-01-09 17:59:42 Local IPv4: 10.4.41.77/16 IPv6: null MTU: 1500

2016-01-09 17:59:42 DNS Server: 10.4.0.1, Domain: null

2016-01-09 17:59:42 Routes: 0.0.0.0/0

2016-01-09 17:59:42 Routes excluded:

2016-01-09 17:59:42 VpnService routes installed: 0.0.0.0/0

2016-01-09 17:59:42 MANAGEMENT: CMD 'needok 'OPENTUN' ok'

2016-01-09 17:59:42 Initialization Sequence Completed

2016-01-09 17:59:42 MANAGEMENT: >STATE:1452380382,CONNECTED,SUCCESS,10.4.41.77,184.75.214.162,443,,

2016-01-09 17:59:52 PID_ERR replay-window backtrack occurred [5] [sSL-0] [0_____0000002222222222333333333445555555666666666666667777777777] 0:99 0:94 t=1452380392[0] r=[0,64,15,5,1] sl=[29,64,64,272]

2016-01-09 17:59:54 write UDP []: Network is unreachable (code=101)

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...