Skip to content

Instantly share code, notes, and snippets.

@Demon-tk

Demon-tk/log.txt Secret

Created January 5, 2021 01:13
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save Demon-tk/8bf9dcf1770d7c75c8fc21c555101d91 to your computer and use it in GitHub Desktop.
Save Demon-tk/8bf9dcf1770d7c75c8fc21c555101d91 to your computer and use it in GitHub Desktop.
guillaumedsde/alpine-qbittorrent-openvpn log file
Tue Jan 5 00:54:15 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443
Tue Jan 5 00:54:15 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 00:54:15 2021 UDP link local: (not bound)
Tue Jan 5 00:54:15 2021 UDP link remote: [AF_INET]184.75.214.162:443
Tue Jan 5 00:54:15 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:54:17 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:54:21 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:54:29 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:54:45 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:55:15 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 00:55:15 2021 TLS Error: TLS handshake failed
Tue Jan 5 00:55:15 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 00:55:15 2021 Restart pause, 5 second(s)
Tue Jan 5 00:55:20 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443
Tue Jan 5 00:55:20 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 00:55:20 2021 UDP link local: (not bound)
Tue Jan 5 00:55:20 2021 UDP link remote: [AF_INET]184.75.214.162:443
Tue Jan 5 00:55:20 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:55:22 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:55:26 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:55:34 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:55:50 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:56:20 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 00:56:20 2021 TLS Error: TLS handshake failed
Tue Jan 5 00:56:20 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 00:56:20 2021 Restart pause, 5 second(s)
Tue Jan 5 00:56:25 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443
Tue Jan 5 00:56:25 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 00:56:25 2021 UDP link local: (not bound)
Tue Jan 5 00:56:25 2021 UDP link remote: [AF_INET]184.75.214.162:443
Tue Jan 5 00:56:25 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:56:27 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:56:31 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:56:39 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:56:55 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:57:25 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 00:57:25 2021 TLS Error: TLS handshake failed
Tue Jan 5 00:57:25 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 00:57:25 2021 Restart pause, 5 second(s)
Tue Jan 5 00:57:30 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443
Tue Jan 5 00:57:30 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 00:57:30 2021 UDP link local: (not bound)
Tue Jan 5 00:57:30 2021 UDP link remote: [AF_INET]184.75.214.162:443
Tue Jan 5 00:57:30 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:57:32 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:57:36 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:57:44 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:58:00 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:58:30 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 00:58:30 2021 TLS Error: TLS handshake failed
Tue Jan 5 00:58:30 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 00:58:30 2021 Restart pause, 5 second(s)
Tue Jan 5 00:58:35 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.214.162:443
Tue Jan 5 00:58:35 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 00:58:35 2021 UDP link local: (not bound)
Tue Jan 5 00:58:35 2021 UDP link remote: [AF_INET]184.75.214.162:443
Tue Jan 5 00:58:35 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:58:37 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:58:41 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:58:49 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:59:05 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:59:35 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 00:59:35 2021 TLS Error: TLS handshake failed
Tue Jan 5 00:59:35 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 00:59:35 2021 Restart pause, 10 second(s)
Tue Jan 5 00:59:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
Tue Jan 5 00:59:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 00:59:47 2021 UDP link local: (not bound)
Tue Jan 5 00:59:47 2021 UDP link remote: [AF_INET]162.219.176.2:443
Tue Jan 5 00:59:47 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:59:49 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 00:59:53 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:00:02 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:00:18 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:00:47 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 01:00:47 2021 TLS Error: TLS handshake failed
Tue Jan 5 01:00:47 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 01:00:47 2021 Restart pause, 20 second(s)
Tue Jan 5 01:01:07 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
Tue Jan 5 01:01:07 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:01:07 2021 UDP link local: (not bound)
Tue Jan 5 01:01:07 2021 UDP link remote: [AF_INET]162.219.176.2:443
Tue Jan 5 01:01:07 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:01:09 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:01:13 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:01:21 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:01:37 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:02:07 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 01:02:07 2021 TLS Error: TLS handshake failed
Tue Jan 5 01:02:07 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 01:02:07 2021 Restart pause, 40 second(s)
Tue Jan 5 01:02:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]162.219.176.2:443
Tue Jan 5 01:02:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:02:47 2021 UDP link local: (not bound)
Tue Jan 5 01:02:47 2021 UDP link remote: [AF_INET]162.219.176.2:443
Tue Jan 5 01:02:47 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:02:50 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:02:54 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:03:03 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:03:19 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:03:47 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 01:03:47 2021 TLS Error: TLS handshake failed
Tue Jan 5 01:03:47 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 01:03:47 2021 Restart pause, 80 second(s)
Tue Jan 5 01:05:08 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:05:08 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:05:08 2021 UDP link local: (not bound)
Tue Jan 5 01:05:08 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:05:08 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:05:10 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:05:14 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:05:22 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:05:39 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:06:08 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 01:06:08 2021 TLS Error: TLS handshake failed
Tue Jan 5 01:06:08 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 01:06:08 2021 Restart pause, 160 second(s)
Tue Jan 5 01:08:49 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:08:49 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:08:49 2021 UDP link local: (not bound)
Tue Jan 5 01:08:49 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:08:49 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:08:51 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:08:56 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:09:04 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:09:20 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:09:36 2021 event_wait : Interrupted system call (code=4)
Tue Jan 5 01:09:36 2021 SIGTERM received, sending exit notification to peer
Catching signal: SIGTERM
Exiting cleanly
[cont-finish.d] executing container finish scripts...
[cont-finish.d] done.
[s6-finish] waiting for services.
The Web UI administrator username is: admin
The Web UI administrator password is still the default one: adminadmin
This is a security risk, please consider changing your password from program preferences.
s6-svwait: fatal: supervisor died
[s6-finish] sending all processes the TERM signal.
Tue Jan 5 01:09:37 2021 event_wait : Interrupted system call (code=4)
Tue Jan 5 01:09:37 2021 Ignoring SIGHUP received during exit notification
Tue Jan 5 01:09:37 2021 event_wait : Interrupted system call (code=4)
Tue Jan 5 01:09:37 2021 SIGTERM[hard,] received, process exiting
[s6-finish] sending all processes the KILL signal and exiting.
[s6-init] making user provided files available at /var/run/s6/etc...exited 0.
[s6-init] ensuring user provided files have correct perms...exited 0.
[fix-attrs.d] applying ownership & permissions fixes...
[fix-attrs.d] done.
[cont-init.d] executing container initialization scripts...
[cont-init.d] 01-setup-permissions: executing...
[cont-init.d] 01-setup-permissions: exited 0.
[cont-init.d] 02-setup-openvpn: executing...
Tue Jan 5 01:09:43 2021 TUN/TAP device tun0 opened
Tue Jan 5 01:09:43 2021 Persist state set to: ON
OpenVPN provider not set. Using configuration at /config/openvpn/config.ovpn
[cont-init.d] 02-setup-openvpn: exited 0.
[cont-init.d] 03-setup-iptables: executing...
[cont-init.d] 03-setup-iptables: exited 0.
[cont-init.d] done.
[services.d] starting services
[services.d] done.
Tue Jan 5 01:09:44 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:44 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:44 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:44 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:44 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:44 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:44 2021 UDP link local: (not bound)
Tue Jan 5 01:09:44 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:44 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=cfc813b3 eeccf4c3
Tue Jan 5 01:09:44 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:44 2021 VERIFY KU OK
Tue Jan 5 01:09:44 2021 Validating certificate extended key usage
Tue Jan 5 01:09:44 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:44 2021 VERIFY EKU OK
Tue Jan 5 01:09:44 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:44 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:44 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:45 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:45 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM'
Tue Jan 5 01:09:45 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:45 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:45 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:45 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:45 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:45 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:45 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:45 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:45 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:45 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:45 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:45 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:45 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:45 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:45 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:45 2021 Exiting due to fatal error
Tue Jan 5 01:09:45 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:45 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:45 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:45 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:45 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:45 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:45 2021 UDP link local: (not bound)
Tue Jan 5 01:09:45 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:45 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=146b0ee3 2be676a1
Tue Jan 5 01:09:45 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:45 2021 VERIFY KU OK
Tue Jan 5 01:09:45 2021 Validating certificate extended key usage
Tue Jan 5 01:09:45 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:45 2021 VERIFY EKU OK
Tue Jan 5 01:09:45 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:45 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:45 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:46 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:46 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM'
Tue Jan 5 01:09:46 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:46 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:46 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:46 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:46 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:46 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:46 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:46 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:46 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:46 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:46 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:46 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:46 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:47 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:47 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:47 2021 Exiting due to fatal error
Tue Jan 5 01:09:47 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:47 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:47 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:47 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:47 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:47 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:47 2021 UDP link local: (not bound)
Tue Jan 5 01:09:47 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:47 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=2606377c 8a5a2b01
Tue Jan 5 01:09:47 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:47 2021 VERIFY KU OK
Tue Jan 5 01:09:47 2021 Validating certificate extended key usage
Tue Jan 5 01:09:47 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:47 2021 VERIFY EKU OK
Tue Jan 5 01:09:47 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:47 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:47 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:48 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:48 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM'
Tue Jan 5 01:09:48 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:48 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:48 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:48 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:48 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:48 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:48 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:48 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:48 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:48 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:48 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:48 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:48 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:48 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:48 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:48 2021 Exiting due to fatal error
Tue Jan 5 01:09:48 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:48 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:48 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:48 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:48 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:48 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:48 2021 UDP link local: (not bound)
Tue Jan 5 01:09:48 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:48 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=ba9f8ca9 454dc3dd
Tue Jan 5 01:09:48 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:48 2021 VERIFY KU OK
Tue Jan 5 01:09:48 2021 Validating certificate extended key usage
Tue Jan 5 01:09:48 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:48 2021 VERIFY EKU OK
Tue Jan 5 01:09:48 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:48 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:48 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:49 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:49 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM'
Tue Jan 5 01:09:49 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:49 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:49 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:49 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:49 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:49 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:49 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:49 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:49 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:49 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:49 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:49 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:49 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:49 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:49 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:49 2021 Exiting due to fatal error
Tue Jan 5 01:09:50 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:50 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:50 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:50 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:50 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:50 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:50 2021 UDP link local: (not bound)
Tue Jan 5 01:09:50 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:50 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=eb3561ea 4f660cb8
Tue Jan 5 01:09:50 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:50 2021 VERIFY KU OK
Tue Jan 5 01:09:50 2021 Validating certificate extended key usage
Tue Jan 5 01:09:50 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:50 2021 VERIFY EKU OK
Tue Jan 5 01:09:50 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:50 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:50 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:51 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:51 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 8,cipher AES-256-GCM'
Tue Jan 5 01:09:51 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:51 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:51 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:51 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:51 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:51 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:51 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:51 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:51 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:51 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:51 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:51 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:51 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:51 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:51 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:51 2021 Exiting due to fatal error
Tue Jan 5 01:09:51 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:51 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:51 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:51 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:51 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:51 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:51 2021 UDP link local: (not bound)
Tue Jan 5 01:09:51 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:51 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=3a8c253e 7c750985
Tue Jan 5 01:09:51 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:51 2021 VERIFY KU OK
Tue Jan 5 01:09:51 2021 Validating certificate extended key usage
Tue Jan 5 01:09:51 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:51 2021 VERIFY EKU OK
Tue Jan 5 01:09:51 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:51 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:51 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:52 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:52 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM'
Tue Jan 5 01:09:52 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:52 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:52 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:52 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:52 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:52 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:52 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:52 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:52 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:52 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:52 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:52 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:52 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:52 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:52 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:52 2021 Exiting due to fatal error
Tue Jan 5 01:09:52 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:52 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:52 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:52 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:52 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:52 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:52 2021 UDP link local: (not bound)
Tue Jan 5 01:09:52 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:53 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=69245bba 48231555
Tue Jan 5 01:09:53 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:53 2021 VERIFY KU OK
Tue Jan 5 01:09:53 2021 Validating certificate extended key usage
Tue Jan 5 01:09:53 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:53 2021 VERIFY EKU OK
Tue Jan 5 01:09:53 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:53 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:53 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:54 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:54 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 8,cipher AES-256-GCM'
Tue Jan 5 01:09:54 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:54 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:54 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:54 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:54 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:54 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:54 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:54 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:54 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:54 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:54 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:54 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:54 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:54 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:54 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:54 2021 Exiting due to fatal error
Tue Jan 5 01:09:54 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:54 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:54 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:54 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:54 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:54 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:54 2021 UDP link local: (not bound)
Tue Jan 5 01:09:54 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:54 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=213d03ef 3ae198d7
Tue Jan 5 01:09:54 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:54 2021 VERIFY KU OK
Tue Jan 5 01:09:54 2021 Validating certificate extended key usage
Tue Jan 5 01:09:54 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:54 2021 VERIFY EKU OK
Tue Jan 5 01:09:54 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:54 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:54 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:55 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:55 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM'
Tue Jan 5 01:09:55 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:55 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:55 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:55 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:55 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:55 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:55 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:55 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:55 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:55 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:55 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:55 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:55 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:55 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:55 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:55 2021 Exiting due to fatal error
Tue Jan 5 01:09:56 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:56 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:56 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:56 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:56 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:56 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:56 2021 UDP link local: (not bound)
Tue Jan 5 01:09:56 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:56 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=9febc4ab 067d4a25
Tue Jan 5 01:09:56 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:56 2021 VERIFY KU OK
Tue Jan 5 01:09:56 2021 Validating certificate extended key usage
Tue Jan 5 01:09:56 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:56 2021 VERIFY EKU OK
Tue Jan 5 01:09:56 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:56 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:56 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:57 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:09:59 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 8,cipher AES-256-GCM'
Tue Jan 5 01:09:59 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:09:59 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:09:59 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:09:59 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:09:59 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:59 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:09:59 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:09:59 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:09:59 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:09:59 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:09:59 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:09:59 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:09:59 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:09:59 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:09:59 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:09:59 2021 Exiting due to fatal error
Tue Jan 5 01:09:59 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:09:59 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:09:59 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:59 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:09:59 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:59 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:09:59 2021 UDP link local: (not bound)
Tue Jan 5 01:09:59 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:09:59 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=0ae15882 1cf78916
Tue Jan 5 01:09:59 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:09:59 2021 VERIFY KU OK
Tue Jan 5 01:09:59 2021 Validating certificate extended key usage
Tue Jan 5 01:09:59 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:09:59 2021 VERIFY EKU OK
Tue Jan 5 01:09:59 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:09:59 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:09:59 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:01 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:10:01 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM'
Tue Jan 5 01:10:01 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:10:01 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:10:01 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:10:01 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:10:01 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:01 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:01 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:10:01 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:10:01 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:10:01 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:10:01 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:10:01 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:10:01 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:10:01 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:10:01 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:10:01 2021 Exiting due to fatal error
Tue Jan 5 01:10:01 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:10:01 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:10:01 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:01 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:01 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:01 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:10:01 2021 UDP link local: (not bound)
Tue Jan 5 01:10:01 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:01 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=906f0de1 072effe5
Tue Jan 5 01:10:01 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:10:01 2021 VERIFY KU OK
Tue Jan 5 01:10:01 2021 Validating certificate extended key usage
Tue Jan 5 01:10:01 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:10:01 2021 VERIFY EKU OK
Tue Jan 5 01:10:01 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:10:01 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:10:01 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:02 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:10:02 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM'
Tue Jan 5 01:10:02 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:10:02 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:10:02 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:10:02 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:10:02 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:02 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:02 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:10:02 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:10:02 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:10:02 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:10:02 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:10:02 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:10:02 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:10:02 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:10:02 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:10:02 2021 Exiting due to fatal error
Tue Jan 5 01:10:02 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:10:02 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:10:02 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:02 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:02 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:02 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:10:02 2021 UDP link local: (not bound)
Tue Jan 5 01:10:02 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:02 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=136f2399 1e7528f8
Tue Jan 5 01:10:02 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:10:02 2021 VERIFY KU OK
Tue Jan 5 01:10:02 2021 Validating certificate extended key usage
Tue Jan 5 01:10:02 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:10:02 2021 VERIFY EKU OK
Tue Jan 5 01:10:02 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:10:02 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:10:02 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:04 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:10:04 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 3,cipher AES-256-GCM'
Tue Jan 5 01:10:04 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:10:04 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:10:04 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:10:04 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:10:04 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:04 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:04 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:10:04 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:10:04 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:10:04 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:10:04 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:10:04 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:10:04 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:10:04 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:10:04 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:10:04 2021 Exiting due to fatal error
Tue Jan 5 01:10:04 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:10:04 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:10:04 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:04 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:04 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:04 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:10:04 2021 UDP link local: (not bound)
Tue Jan 5 01:10:04 2021 UDP link remote: [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:04 2021 TLS: Initial packet from [AF_INET]184.75.223.234:443, sid=66d143be 1c1ba242
Tue Jan 5 01:10:04 2021 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Tue Jan 5 01:10:04 2021 VERIFY KU OK
Tue Jan 5 01:10:04 2021 Validating certificate extended key usage
Tue Jan 5 01:10:04 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Jan 5 01:10:04 2021 VERIFY EKU OK
Tue Jan 5 01:10:04 2021 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Avior, emailAddress=info@airvpn.org
Tue Jan 5 01:10:04 2021 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_CHACHA20_POLY1305_SHA256, 4096 bit RSA
Tue Jan 5 01:10:04 2021 [Avior] Peer Connection Initiated with [AF_INET]184.75.223.234:443
Tue Jan 5 01:10:05 2021 SENT CONTROL [Avior]: 'PUSH_REQUEST' (status=1)
Tue Jan 5 01:10:05 2021 PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.10.244.1,dhcp-option DNS6 fde6:7a:7d20:6f4::1,tun-ipv6,route-gateway 10.10.244.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:6f4::1062/64 fde6:7a:7d20:6f4::1,ifconfig 10.10.244.100 255.255.255.0,peer-id 7,cipher AES-256-GCM'
Tue Jan 5 01:10:05 2021 Pushed option removed by filter: 'dhcp-option DNS 10.10.244.1'
Tue Jan 5 01:10:05 2021 Pushed option removed by filter: 'dhcp-option DNS6 fde6:7a:7d20:6f4::1'
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: timers and/or timeouts modified
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: compression parms modified
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: --ifconfig/up options modified
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: route options modified
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: route-related options modified
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: peer-id set
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: adjusting link_mtu to 1625
Tue Jan 5 01:10:05 2021 OPTIONS IMPORT: data channel crypto options modified
Tue Jan 5 01:10:05 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Jan 5 01:10:05 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:05 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Jan 5 01:10:05 2021 ROUTE_GATEWAY 172.24.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:18:00:02
Tue Jan 5 01:10:05 2021 GDG6: remote_host_ipv6=n/a
Tue Jan 5 01:10:05 2021 ROUTE6: default_gateway=UNDEF
Tue Jan 5 01:10:05 2021 TUN/TAP device tun1 opened
Tue Jan 5 01:10:05 2021 TUN/TAP TX queue length set to 100
Tue Jan 5 01:10:05 2021 /usr/sbin/ip-su link set dev tun1 up mtu 1500
Tue Jan 5 01:10:05 2021 /usr/sbin/ip-su addr add dev tun1 10.10.244.100/24 broadcast 10.10.244.255
Tue Jan 5 01:10:05 2021 /usr/sbin/ip-su -6 addr add fde6:7a:7d20:6f4::1062/64 dev tun1
RTNETLINK answers: Permission denied
Tue Jan 5 01:10:05 2021 Linux ip -6 addr add failed: external program exited with error status: 2
Tue Jan 5 01:10:05 2021 Exiting due to fatal error
Tue Jan 5 01:10:05 2021 OpenVPN 2.4.9 x86_64-alpine-linux-musl [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Apr 20 2020
Tue Jan 5 01:10:05 2021 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
Tue Jan 5 01:10:05 2021 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:05 2021 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Jan 5 01:10:07 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443
Tue Jan 5 01:10:07 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:10:07 2021 UDP link local: (not bound)
Tue Jan 5 01:10:07 2021 UDP link remote: [AF_INET]104.254.90.194:443
Tue Jan 5 01:10:07 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:10:09 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:10:13 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:10:21 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:10:37 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:11:07 2021 TLS Error: TLS key negotiation failed to occur within 60 seconds (check your network connectivity)
Tue Jan 5 01:11:07 2021 TLS Error: TLS handshake failed
Tue Jan 5 01:11:07 2021 SIGUSR1[soft,tls-error] received, process restarting
Tue Jan 5 01:11:07 2021 Restart pause, 5 second(s)
Tue Jan 5 01:11:12 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]104.254.90.194:443
Tue Jan 5 01:11:12 2021 Socket Buffers: R=[212992->212992] S=[212992->212992]
Tue Jan 5 01:11:12 2021 UDP link local: (not bound)
Tue Jan 5 01:11:12 2021 UDP link remote: [AF_INET]104.254.90.194:443
Tue Jan 5 01:11:12 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:11:14 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:11:19 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:11:27 2021 write UDP: Operation not permitted (code=1)
Tue Jan 5 01:11:43 2021 write UDP: Operation not permitted (code=1)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment