-
-
Save Demon-tk/8bf9dcf1770d7c75c8fc21c555101d91 to your computer and use it in GitHub Desktop.
guillaumedsde/alpine-qbittorrent-openvpn log file
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Tue Jan 5 00:54:15 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:54:15 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 00:54:15 2021 UDP link local: (not bound) | |
Tue Jan 5 00:54:15 2021 UDP link remote: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:54:15 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:54:17 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:54:21 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:54:29 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:54:45 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:55:15 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 00:55:15 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 00:55:15 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 00:55:15 2021 Restart pause, 5 second(s) | |
Tue Jan 5 00:55:20 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:55:20 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 00:55:20 2021 UDP link local: (not bound) | |
Tue Jan 5 00:55:20 2021 UDP link remote: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:55:20 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:55:22 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:55:26 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:55:34 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:55:50 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:56:20 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 00:56:20 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 00:56:20 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 00:56:20 2021 Restart pause, 5 second(s) | |
Tue Jan 5 00:56:25 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:56:25 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 00:56:25 2021 UDP link local: (not bound) | |
Tue Jan 5 00:56:25 2021 UDP link remote: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:56:25 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:56:27 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:56:31 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:56:39 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:56:55 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:57:25 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 00:57:25 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 00:57:25 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 00:57:25 2021 Restart pause, 5 second(s) | |
Tue Jan 5 00:57:30 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:57:30 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 00:57:30 2021 UDP link local: (not bound) | |
Tue Jan 5 00:57:30 2021 UDP link remote: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:57:30 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:57:32 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:57:36 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:57:44 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:58:00 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:58:30 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 00:58:30 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 00:58:30 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 00:58:30 2021 Restart pause, 5 second(s) | |
Tue Jan 5 00:58:35 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:58:35 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 00:58:35 2021 UDP link local: (not bound) | |
Tue Jan 5 00:58:35 2021 UDP link remote: [AF_INET]184.75.214.162:443 | |
Tue Jan 5 00:58:35 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:58:37 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:58:41 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:58:49 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:59:05 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:59:35 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 00:59:35 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 00:59:35 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 00:59:35 2021 Restart pause, 10 second(s) | |
Tue Jan 5 00:59:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443 | |
Tue Jan 5 00:59:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 00:59:47 2021 UDP link local: (not bound) | |
Tue Jan 5 00:59:47 2021 UDP link remote: [AF_INET]162.219.176.2:443 | |
Tue Jan 5 00:59:47 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:59:49 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 00:59:53 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:00:02 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:00:18 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:00:47 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 01:00:47 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 01:00:47 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 01:00:47 2021 Restart pause, 20 second(s) | |
Tue Jan 5 01:01:07 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443 | |
Tue Jan 5 01:01:07 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:01:07 2021 UDP link local: (not bound) | |
Tue Jan 5 01:01:07 2021 UDP link remote: [AF_INET]162.219.176.2:443 | |
Tue Jan 5 01:01:07 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:01:09 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:01:13 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:01:21 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:01:37 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:02:07 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 01:02:07 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 01:02:07 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 01:02:07 2021 Restart pause, 40 second(s) | |
Tue Jan 5 01:02:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443 | |
Tue Jan 5 01:02:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:02:47 2021 UDP link local: (not bound) | |
Tue Jan 5 01:02:47 2021 UDP link remote: [AF_INET]162.219.176.2:443 | |
Tue Jan 5 01:02:47 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:02:50 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:02:54 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:03:03 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:03:19 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:03:47 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 01:03:47 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 01:03:47 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 01:03:47 2021 Restart pause, 80 second(s) | |
Tue Jan 5 01:05:08 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:05:08 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:05:08 2021 UDP link local: (not bound) | |
Tue Jan 5 01:05:08 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:05:08 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:05:10 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:05:14 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:05:22 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:05:39 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:06:08 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 01:06:08 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 01:06:08 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 01:06:08 2021 Restart pause, 160 second(s) | |
Tue Jan 5 01:08:49 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:08:49 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:08:49 2021 UDP link local: (not bound) | |
Tue Jan 5 01:08:49 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:08:49 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:08:51 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:08:56 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:09:04 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:09:20 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:09:36 2021 event_wait : Interrupted system call (code=4) | |
Tue Jan 5 01:09:36 2021 SIGTERM received, sending exit notification to peer | |
Catching signal: SIGTERM | |
Exiting cleanly | |
[cont-finish.d] executing container finish scripts... | |
[cont-finish.d] done. | |
[s6-finish] waiting for services. | |
The Web UI administrator username is: admin | |
The Web UI administrator password is still the default one: adminadmin | |
This is a security risk, please consider changing your password from program preferences. | |
s6-svwait: fatal: supervisor died | |
[s6-finish] sending all processes the TERM signal. | |
Tue Jan 5 01:09:37 2021 event_wait : Interrupted system call (code=4) | |
Tue Jan 5 01:09:37 2021 Ignoring SIGHUP received during exit notification | |
Tue Jan 5 01:09:37 2021 event_wait : Interrupted system call (code=4) | |
Tue Jan 5 01:09:37 2021 SIGTERM[hard,] received, process exiting | |
[s6-finish] sending all processes the KILL signal and exiting. | |
[s6-init] making user provided files available at /var/run/s6/etc...exited 0. | |
[s6-init] ensuring user provided files have correct perms...exited 0. | |
[fix-attrs.d] applying ownership & permissions fixes... | |
[fix-attrs.d] done. | |
[cont-init.d] executing container initialization scripts... | |
[cont-init.d] 01-setup-permissions: executing... | |
[cont-init.d] 01-setup-permissions: exited 0. | |
[cont-init.d] 02-setup-openvpn: executing... | |
Tue Jan 5 01:09:43 2021 TUN/TAP device tun0 opened | |
Tue Jan 5 01:09:43 2021 Persist state set to: ON | |
OpenVPN provider not set. Using configuration at /config/openvpn/config.ovpn | |
[cont-init.d] 02-setup-openvpn: exited 0. | |
[cont-init.d] 03-setup-iptables: executing... | |
[cont-init.d] 03-setup-iptables: exited 0. | |
[cont-init.d] done. | |
[services.d] starting services | |
[services.d] done. | |
Tue Jan 5 01:09:44 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:44 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:44 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:44 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:44 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:44 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:44 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:44 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:44 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=cfc813b3 eeccf4c3 | |
Tue Jan 5 01:09:44 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:44 2021 VERIFY KU OK | |
Tue Jan 5 01:09:44 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:44 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:44 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:44 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:44 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:44 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:45 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:45 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM' | |
Tue Jan 5 01:09:45 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:45 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:45 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:45 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:45 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:45 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:45 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:45 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:45 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:45 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:45 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:45 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:45 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:45 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:45 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:45 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:45 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:45 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:45 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:45 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:45 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:45 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:45 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:45 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=146b0ee3 2be676a1 | |
Tue Jan 5 01:09:45 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:45 2021 VERIFY KU OK | |
Tue Jan 5 01:09:45 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:45 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:45 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:45 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:45 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:45 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:46 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:46 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM' | |
Tue Jan 5 01:09:46 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:46 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:46 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:46 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:46 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:46 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:46 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:46 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:46 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:46 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:46 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:46 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:47 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:47 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:47 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:47 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:47 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:47 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:47 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:47 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:47 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:47 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=2606377c 8a5a2b01 | |
Tue Jan 5 01:09:47 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:47 2021 VERIFY KU OK | |
Tue Jan 5 01:09:47 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:47 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:47 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:47 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:47 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:47 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:48 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:48 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM' | |
Tue Jan 5 01:09:48 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:48 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:48 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:48 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:48 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:48 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:48 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:48 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:48 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:48 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:48 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:48 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:48 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:48 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:48 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:48 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:48 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:48 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:48 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:48 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:48 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:48 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:48 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:48 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=ba9f8ca9 454dc3dd | |
Tue Jan 5 01:09:48 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:48 2021 VERIFY KU OK | |
Tue Jan 5 01:09:48 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:48 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:48 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:48 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:48 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:48 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:49 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:49 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM' | |
Tue Jan 5 01:09:49 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:49 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:49 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:49 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:49 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:49 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:49 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:49 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:49 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:49 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:49 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:49 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:49 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:49 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:49 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:50 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:50 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:50 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:50 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:50 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:50 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:50 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:50 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:50 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=eb3561ea 4f660cb8 | |
Tue Jan 5 01:09:50 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:50 2021 VERIFY KU OK | |
Tue Jan 5 01:09:50 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:50 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:50 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:50 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:50 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:50 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:51 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:51 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 8,cipher AES-256-GCM' | |
Tue Jan 5 01:09:51 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:51 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:51 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:51 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:51 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:51 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:51 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:51 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:51 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:51 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:51 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:51 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:51 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:51 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:51 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:51 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:51 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:51 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:51 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:51 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:51 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:51 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:51 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:51 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=3a8c253e 7c750985 | |
Tue Jan 5 01:09:51 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:51 2021 VERIFY KU OK | |
Tue Jan 5 01:09:51 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:51 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:51 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:51 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:51 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:51 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:52 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:52 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM' | |
Tue Jan 5 01:09:52 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:52 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:52 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:52 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:52 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:52 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:52 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:52 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:52 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:52 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:52 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:52 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:52 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:52 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:52 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:52 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:52 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:52 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:52 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:52 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:52 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:52 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:52 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:53 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=69245bba 48231555 | |
Tue Jan 5 01:09:53 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:53 2021 VERIFY KU OK | |
Tue Jan 5 01:09:53 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:53 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:53 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:53 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:53 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:53 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:54 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:54 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 8,cipher AES-256-GCM' | |
Tue Jan 5 01:09:54 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:54 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:54 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:54 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:54 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:54 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:54 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:54 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:54 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:54 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:54 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:54 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:54 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:54 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:54 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:54 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:54 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:54 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:54 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:54 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:54 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:54 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:54 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:54 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=213d03ef 3ae198d7 | |
Tue Jan 5 01:09:54 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:54 2021 VERIFY KU OK | |
Tue Jan 5 01:09:54 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:54 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:54 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:54 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:54 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:54 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:55 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:55 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM' | |
Tue Jan 5 01:09:55 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:55 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:55 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:55 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:55 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:55 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:55 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:55 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:55 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:55 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:55 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:55 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:55 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:55 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:55 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:56 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:56 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:56 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:56 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:56 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:56 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:56 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:56 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:56 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=9febc4ab 067d4a25 | |
Tue Jan 5 01:09:56 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:56 2021 VERIFY KU OK | |
Tue Jan 5 01:09:56 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:56 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:56 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:56 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:56 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:56 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:57 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:09:59 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 8,cipher AES-256-GCM' | |
Tue Jan 5 01:09:59 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:09:59 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:09:59 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:09:59 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:59 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:09:59 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:09:59 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:09:59 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:09:59 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:09:59 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:09:59 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:09:59 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:09:59 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:09:59 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:09:59 2021 Exiting due to fatal error | |
Tue Jan 5 01:09:59 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:09:59 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:09:59 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:59 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:09:59 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:59 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:09:59 2021 UDP link local: (not bound) | |
Tue Jan 5 01:09:59 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:09:59 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=0ae15882 1cf78916 | |
Tue Jan 5 01:09:59 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:59 2021 VERIFY KU OK | |
Tue Jan 5 01:09:59 2021 Validating certificate extended key usage | |
Tue Jan 5 01:09:59 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:09:59 2021 VERIFY EKU OK | |
Tue Jan 5 01:09:59 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:09:59 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:09:59 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:01 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:10:01 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM' | |
Tue Jan 5 01:10:01 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:10:01 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:10:01 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:10:01 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:01 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:01 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:10:01 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:10:01 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:10:01 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:10:01 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:10:01 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:10:01 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:10:01 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:10:01 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:10:01 2021 Exiting due to fatal error | |
Tue Jan 5 01:10:01 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:10:01 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:10:01 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:01 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:01 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:01 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:10:01 2021 UDP link local: (not bound) | |
Tue Jan 5 01:10:01 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:01 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=906f0de1 072effe5 | |
Tue Jan 5 01:10:01 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:10:01 2021 VERIFY KU OK | |
Tue Jan 5 01:10:01 2021 Validating certificate extended key usage | |
Tue Jan 5 01:10:01 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:10:01 2021 VERIFY EKU OK | |
Tue Jan 5 01:10:01 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:10:01 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:10:01 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:02 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:10:02 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM' | |
Tue Jan 5 01:10:02 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:10:02 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:10:02 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:10:02 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:02 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:02 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:10:02 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:10:02 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:10:02 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:10:02 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:10:02 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:10:02 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:10:02 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:10:02 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:10:02 2021 Exiting due to fatal error | |
Tue Jan 5 01:10:02 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:10:02 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:10:02 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:02 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:02 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:02 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:10:02 2021 UDP link local: (not bound) | |
Tue Jan 5 01:10:02 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:02 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=136f2399 1e7528f8 | |
Tue Jan 5 01:10:02 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:10:02 2021 VERIFY KU OK | |
Tue Jan 5 01:10:02 2021 Validating certificate extended key usage | |
Tue Jan 5 01:10:02 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:10:02 2021 VERIFY EKU OK | |
Tue Jan 5 01:10:02 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:10:02 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:10:02 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:04 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:10:04 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM' | |
Tue Jan 5 01:10:04 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:10:04 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:10:04 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:10:04 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:04 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:04 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:10:04 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:10:04 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:10:04 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:10:04 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:10:04 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:10:04 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:10:04 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:10:04 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:10:04 2021 Exiting due to fatal error | |
Tue Jan 5 01:10:04 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:10:04 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:10:04 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:04 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:04 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:04 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:10:04 2021 UDP link local: (not bound) | |
Tue Jan 5 01:10:04 2021 UDP link remote: [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:04 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=66d143be 1c1ba242 | |
Tue Jan 5 01:10:04 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org | |
Tue Jan 5 01:10:04 2021 VERIFY KU OK | |
Tue Jan 5 01:10:04 2021 Validating certificate extended key usage | |
Tue Jan 5 01:10:04 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication | |
Tue Jan 5 01:10:04 2021 VERIFY EKU OK | |
Tue Jan 5 01:10:04 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org | |
Tue Jan 5 01:10:04 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA | |
Tue Jan 5 01:10:04 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443 | |
Tue Jan 5 01:10:05 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1) | |
Tue Jan 5 01:10:05 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM' | |
Tue Jan 5 01:10:05 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1' | |
Tue Jan 5 01:10:05 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1' | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: timers and/or timeouts modified | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: compression parms modified | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: --ifconfig/up options modified | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: route options modified | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: route-related options modified | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: peer-id set | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: adjusting link_mtu to 1625 | |
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: data channel crypto options modified | |
Tue Jan 5 01:10:05 2021 Data Channel: using negotiated cipher 'AES-256-GCM' | |
Tue Jan 5 01:10:05 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:05 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key | |
Tue Jan 5 01:10:05 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02 | |
Tue Jan 5 01:10:05 2021 GDG6: remote_host_ipv6=n/a | |
Tue Jan 5 01:10:05 2021 ROUTE6: default_gateway=UNDEF | |
Tue Jan 5 01:10:05 2021 TUN/TAP device tun1 opened | |
Tue Jan 5 01:10:05 2021 TUN/TAP TX queue length set to 100 | |
Tue Jan 5 01:10:05 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500 | |
Tue Jan 5 01:10:05 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255 | |
Tue Jan 5 01:10:05 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1 | |
RTNETLINK answers: Permission denied | |
Tue Jan 5 01:10:05 2021 Linux ip -6 addr add failed: external program exited with error status: 2 | |
Tue Jan 5 01:10:05 2021 Exiting due to fatal error | |
Tue Jan 5 01:10:05 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020 | |
Tue Jan 5 01:10:05 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 | |
Tue Jan 5 01:10:05 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:05 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication | |
Tue Jan 5 01:10:07 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 | |
Tue Jan 5 01:10:07 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:10:07 2021 UDP link local: (not bound) | |
Tue Jan 5 01:10:07 2021 UDP link remote: [AF_INET]104.254.90.194:443 | |
Tue Jan 5 01:10:07 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:10:09 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:10:13 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:10:21 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:10:37 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:11:07 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity) | |
Tue Jan 5 01:11:07 2021 TLS Error: TLS handshake failed | |
Tue Jan 5 01:11:07 2021 SIGUSR1[soft,tls-error] received, process restarting | |
Tue Jan 5 01:11:07 2021 Restart pause, 5 second(s) | |
Tue Jan 5 01:11:12 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443 | |
Tue Jan 5 01:11:12 2021 Socket Buffers: R=[212992->212992] S=[212992->212992] | |
Tue Jan 5 01:11:12 2021 UDP link local: (not bound) | |
Tue Jan 5 01:11:12 2021 UDP link remote: [AF_INET]104.254.90.194:443 | |
Tue Jan 5 01:11:12 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:11:14 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:11:19 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:11:27 2021 write UDP: Operation not permitted (code=1) | |
Tue Jan 5 01:11:43 2021 write UDP: Operation not permitted (code=1) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment