1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42
|
Sat Dec 26 22:08:30 2020 OpenVPN 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 25 2019
Sat Dec 26 22:08:30 2020 Windows version 6.2 (Windows 8 or greater) 64bit
Sat Dec 26 22:08:30 2020 library versions: OpenSSL 1.1.0j 20 Nov 2018, LZO 2.10
Enter Management Password:
Sat Dec 26 22:08:30 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340
Sat Dec 26 22:08:30 2020 Need hold release from management interface, waiting...
Sat Dec 26 22:08:30 2020 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340
Sat Dec 26 22:08:30 2020 MANAGEMENT: CMD 'state on'
Sat Dec 26 22:08:30 2020 MANAGEMENT: CMD 'log all on'
Sat Dec 26 22:08:30 2020 MANAGEMENT: CMD 'echo all on'
Sat Dec 26 22:08:30 2020 MANAGEMENT: CMD 'bytecount 5'
Sat Dec 26 22:08:30 2020 MANAGEMENT: CMD 'hold off'
Sat Dec 26 22:08:30 2020 MANAGEMENT: CMD 'hold release'
Sat Dec 26 22:08:34 2020 MANAGEMENT: CMD 'username "Auth" "vpnbook"'
Sat Dec 26 22:08:34 2020 MANAGEMENT: CMD 'password [...]'
Sat Dec 26 22:08:34 2020 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Sat Dec 26 22:08:34 2020 NOTE: --fast-io is disabled since we are running on Windows
Sat Dec 26 22:08:34 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]37.187.158.97:80
Sat Dec 26 22:08:34 2020 Socket Buffers: R=[65536->65536] S=[65536->65536]
Sat Dec 26 22:08:34 2020 Attempting to establish TCP connection with [AF_INET]37.187.158.97:80 [nonblock]
Sat Dec 26 22:08:34 2020 MANAGEMENT: >STATE:1609016914,TCP_CONNECT,,,,,,
Sat Dec 26 22:08:35 2020 TCP connection established with [AF_INET]37.187.158.97:80
Sat Dec 26 22:08:35 2020 TCP_CLIENT link local: (not bound)
Sat Dec 26 22:08:35 2020 TCP_CLIENT link remote: [AF_INET]37.187.158.97:80
Sat Dec 26 22:08:35 2020 MANAGEMENT: >STATE:1609016915,WAIT,,,,,,
Sat Dec 26 22:08:36 2020 MANAGEMENT: >STATE:1609016916,AUTH,,,,,,
Sat Dec 26 22:08:36 2020 TLS: Initial packet from [AF_INET]37.187.158.97:80, sid=93350394 bc25eaa7
Sat Dec 26 22:08:36 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Dec 26 22:08:36 2020 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Sat Dec 26 22:08:36 2020 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Sat Dec 26 22:08:38 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Sat Dec 26 22:08:38 2020 [vpnbook.com] Peer Connection Initiated with [AF_INET]37.187.158.97:80
Sat Dec 26 22:08:39 2020 MANAGEMENT: >STATE:1609016919,GET_CONFIG,,,,,,
Sat Dec 26 22:08:39 2020 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Sat Dec 26 22:08:39 2020 AUTH: Received control message: AUTH_FAILED
Sat Dec 26 22:08:39 2020 SIGUSR1[soft,auth-failure] received, process restarting
Sat Dec 26 22:08:39 2020 MANAGEMENT: >STATE:1609016919,RECONNECTING,auth-failure,,,,,
Sat Dec 26 22:08:39 2020 Restart pause, 5 second(s)
Sat Dec 26 22:08:47 2020 MANAGEMENT: Client disconnected
Sat Dec 26 22:08:47 2020 ERROR: could not read Auth username/password/ok/string from management interface
Sat Dec 26 22:08:47 2020 Exiting due to fatal error |
Partager