Jump to content
Not connected, Your IP: 3.236.51.151
Sign in to follow this  
ghostp

random disconnections over SSL

Recommended Posts

Hello,

 

since a few days I get weird disconnections when I'm going via a SSL Tunnel.

 

Why's that and am I compromised after this disconnection?

 

Thanks in advance for your help!

 

 

I 2016.01.24 18:26:52 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.01.24 18:26:52 - Reading options from C:\Users\xxxx\AppData\Local\AirVPN\AirVPN.xml
. 2016.01.24 18:26:52 - Data Path: C:\Users\xxxx\AppData\Local\AirVPN
. 2016.01.24 18:26:52 - App Path: C:\Program Files\AirVPN
. 2016.01.24 18:26:52 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.01.24 18:26:52 - Command line arguments (1): path="home"
. 2016.01.24 18:26:52 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.01.24 18:26:52 - Updating systems & servers data ...
I 2016.01.24 18:26:53 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.01.24 18:26:53 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.01.24 18:26:53 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.01.24 18:26:53 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.01.24 18:26:53 - Ready
. 2016.01.24 18:26:53 - Systems & servers data update completed
I 2016.01.24 18:27:02 - Checking login ...
! 2016.01.24 18:27:02 - Logged in.
I 2016.01.24 18:27:05 - Session starting.
I 2016.01.24 18:27:05 - IPv6 disabled.
I 2016.01.24 18:27:05 - Checking authorization ...
! 2016.01.24 18:27:06 - Connecting to Alcyone (Netherlands, Alblasserdam)
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Reading configuration from file C:\Users\ghost\AppData\Local\AirVPN\8568e89d3fa4716c29f3f34fe81aa9760538b25bde372f7d325f43989e0023d3.tmp.ssl
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[ui]: Initializing service [openvpn]
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Configuration successful
. 2016.01.24 18:27:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.24 18:27:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.24 18:27:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.24 18:27:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49578
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: Failover strategy: round-robin
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: s_connect: connecting 213.152.161.118:443
. 2016.01.24 18:27:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 18:27:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 18:27:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.24 18:27:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:14257 [nonblock]
. 2016.01.24 18:27:06 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:14257
. 2016.01.24 18:27:06 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.24 18:27:06 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:14257
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: s_connect: connected 213.152.161.118:443
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: Service [openvpn] connected remote server from 192.168.178.38:49579
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: SNI: sending servername: 213.152.161.118
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: CERT: Locally installed certificate matched
. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.01.24 18:27:07 - SSL > 2016.01.24 18:27:07 LOG6[0]: SSL connected: new session negotiated
. 2016.01.24 18:27:07 - SSL > 2016.01.24 18:27:07 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.01.24 18:27:07 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:14257, sid=061ed504 076718a3
. 2016.01.24 18:27:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.24 18:27:07 - OpenVPN > Validating certificate key usage
. 2016.01.24 18:27:07 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.24 18:27:07 - OpenVPN > VERIFY KU OK
. 2016.01.24 18:27:07 - OpenVPN > Validating certificate extended key usage
. 2016.01.24 18:27:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.24 18:27:07 - OpenVPN > VERIFY EKU OK
. 2016.01.24 18:27:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.24 18:27:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.24 18:27:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 18:27:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.24 18:27:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 18:27:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.24 18:27:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:14257
. 2016.01.24 18:27:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.24 18:27:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.172 255.255.0.0'
. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.24 18:27:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.24 18:27:10 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.24 18:27:10 - OpenVPN > TAP-WIN32 device [LAN-Verbindung] opened: \\.\Global\{9177F3DF-D2F7-432D-90C0-9E13F6A18897}.tap
. 2016.01.24 18:27:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.24 18:27:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.172/255.255.0.0 [sUCCEEDED]
. 2016.01.24 18:27:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.172/255.255.0.0 on interface {9177F3DF-D2F7-432D-90C0-9E13F6A18897} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.24 18:27:10 - OpenVPN > Successful ARP Flush on interface [10] {9177F3DF-D2F7-432D-90C0-9E13F6A18897}
. 2016.01.24 18:27:15 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.178.1
. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 2
. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.118 MASK 255.255.255.255 192.168.178.1
. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.24 18:27:15 - Starting Management Interface
. 2016.01.24 18:27:15 - OpenVPN > Initialization Sequence Completed
I 2016.01.24 18:27:15 - DNS of a network adapter forced (Qualcomm Atheros AR946x Wireless Network Adapter)
I 2016.01.24 18:27:15 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.24 18:27:15 - Flushing DNS
I 2016.01.24 18:27:15 - Checking route
I 2016.01.24 18:27:15 - Checking DNS
! 2016.01.24 18:27:16 - Connected.
. 2016.01.24 18:27:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.01.24 18:27:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.01.24 18:57:02 - Updating systems & servers data ...
. 2016.01.24 18:57:03 - Systems & servers data update completed
. 2016.01.24 19:27:08 - OpenVPN > TLS: soft reset sec=0 bytes=8542125572/0 pkts=10283502/0
. 2016.01.24 19:27:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.24 19:27:08 - OpenVPN > Validating certificate key usage
. 2016.01.24 19:27:08 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.24 19:27:08 - OpenVPN > VERIFY KU OK
. 2016.01.24 19:27:08 - OpenVPN > Validating certificate extended key usage
. 2016.01.24 19:27:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.24 19:27:08 - OpenVPN > VERIFY EKU OK
. 2016.01.24 19:27:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.24 19:27:10 - Updating systems & servers data ...
. 2016.01.24 19:27:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.24 19:27:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 19:27:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.24 19:27:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 19:27:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.24 19:27:11 - Systems & servers data update completed
. 2016.01.24 19:57:18 - Updating systems & servers data ...
. 2016.01.24 19:57:19 - Systems & servers data update completed
I 2016.01.24 20:27:08 - Renewing TLS key
. 2016.01.24 20:27:08 - OpenVPN > TLS: tls_process: killed expiring key
. 2016.01.24 20:27:10 - OpenVPN > TLS: soft reset sec=0 bytes=14910385123/0 pkts=16773488/0
. 2016.01.24 20:27:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.24 20:27:11 - OpenVPN > Validating certificate key usage
. 2016.01.24 20:27:11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.24 20:27:11 - OpenVPN > VERIFY KU OK
. 2016.01.24 20:27:11 - OpenVPN > Validating certificate extended key usage
. 2016.01.24 20:27:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.24 20:27:11 - OpenVPN > VERIFY EKU OK
. 2016.01.24 20:27:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.24 20:27:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.24 20:27:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 20:27:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.24 20:27:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.24 20:27:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.24 20:27:24 - Updating systems & servers data ...
. 2016.01.24 20:27:26 - Systems & servers data update completed
. 2016.01.24 20:46:04 - SSL > 2016.01.24 20:46:04 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.01.24 20:46:04 - OpenVPN > Connection reset, restarting [-1]
. 2016.01.24 20:46:04 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
! 2016.01.24 20:46:04 - Disconnecting
. 2016.01.24 20:46:04 - OpenVPN > Restart pause, 5 second(s)
. 2016.01.24 20:46:04 - SSL > 2016.01.24 20:46:04 LOG5[0]: Connection reset: 1440511055 byte(s) sent to SSL, 25386076627 byte(s) sent to socket
. 2016.01.24 20:46:04 - Management - Send 'signal SIGTERM'
. 2016.01.24 20:46:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.24 20:46:04 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.01.24 20:46:04 - OpenVPN > Assertion failed at misc.c:779
. 2016.01.24 20:46:04 - OpenVPN > Exiting due to fatal error
. 2016.01.24 20:46:04 - Connection terminated.
I 2016.01.24 20:46:05 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR946x Wireless Network Adapter)
I 2016.01.24 20:46:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)

 

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...