We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[+] There is a problem starting openvpn. Please, check nohup.out for details
Wed Jul 3 17:31:59 2019 TCP_CLIENT link local: (not bound) Wed Jul 3 17:31:59 2019 TCP_CLIENT link remote: [AF_INET]5.62.62.136:443 Wed Jul 3 17:31:59 2019 TLS: Initial packet from [AF_INET]5.62.62.136:443, sid=34d3290e 401481f4 Wed Jul 3 17:31:59 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Jul 3 17:31:59 2019 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=[email protected] Wed Jul 3 17:31:59 2019 VERIFY OK: nsCertType=SERVER Wed Jul 3 17:31:59 2019 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=[email protected] Wed Jul 3 17:32:00 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Jul 3 17:32:00 2019 [server] Peer Connection Initiated with [AF_INET]5.62.62.136:443 Wed Jul 3 17:32:01 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed Jul 3 17:32:01 2019 AUTH: Received control message: AUTH_FAILED Wed Jul 3 17:32:01 2019 SIGTERM[soft,auth-failure] received, process exiting Wed Jul 3 17:40:54 2019 WARNING: file 'pass.txt' is group or others accessible Wed Jul 3 17:40:54 2019 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019 Wed Jul 3 17:40:54 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10 Wed Jul 3 17:40:54 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Wed Jul 3 17:40:54 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]5.62.62.188:553 Wed Jul 3 17:40:54 2019 Socket Buffers: R=[212992->212992] S=[212992->212992] Wed Jul 3 17:40:54 2019 UDP link local: (not bound) Wed Jul 3 17:40:54 2019 UDP link remote: [AF_INET]5.62.62.188:553 Wed Jul 3 17:40:54 2019 TLS: Initial packet from [AF_INET]5.62.62.188:553, sid=be526b52 d6915717 Wed Jul 3 17:40:54 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Jul 3 17:40:54 2019 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=[email protected] Wed Jul 3 17:40:54 2019 VERIFY OK: nsCertType=SERVER Wed Jul 3 17:40:54 2019 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=[email protected] Wed Jul 3 17:40:54 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Jul 3 17:40:54 2019 [server] Peer Connection Initiated with [AF_INET]5.62.62.188:553 Wed Jul 3 17:40:55 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed Jul 3 17:40:56 2019 AUTH: Received control message: AUTH_FAILED Wed Jul 3 17:40:56 2019 SIGTERM[soft,auth-failure] received, process exiting
The text was updated successfully, but these errors were encountered:
No branches or pull requests
[+] There is a problem starting openvpn. Please, check nohup.out for details
Wed Jul 3 17:31:59 2019 TCP_CLIENT link local: (not bound)
Wed Jul 3 17:31:59 2019 TCP_CLIENT link remote: [AF_INET]5.62.62.136:443
Wed Jul 3 17:31:59 2019 TLS: Initial packet from [AF_INET]5.62.62.136:443, sid=34d3290e 401481f4
Wed Jul 3 17:31:59 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Jul 3 17:31:59 2019 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=[email protected]
Wed Jul 3 17:31:59 2019 VERIFY OK: nsCertType=SERVER
Wed Jul 3 17:31:59 2019 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=[email protected]
Wed Jul 3 17:32:00 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed Jul 3 17:32:00 2019 [server] Peer Connection Initiated with [AF_INET]5.62.62.136:443
Wed Jul 3 17:32:01 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Jul 3 17:32:01 2019 AUTH: Received control message: AUTH_FAILED
Wed Jul 3 17:32:01 2019 SIGTERM[soft,auth-failure] received, process exiting
Wed Jul 3 17:40:54 2019 WARNING: file 'pass.txt' is group or others accessible
Wed Jul 3 17:40:54 2019 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019
Wed Jul 3 17:40:54 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10
Wed Jul 3 17:40:54 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
Wed Jul 3 17:40:54 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]5.62.62.188:553
Wed Jul 3 17:40:54 2019 Socket Buffers: R=[212992->212992] S=[212992->212992]
Wed Jul 3 17:40:54 2019 UDP link local: (not bound)
Wed Jul 3 17:40:54 2019 UDP link remote: [AF_INET]5.62.62.188:553
Wed Jul 3 17:40:54 2019 TLS: Initial packet from [AF_INET]5.62.62.188:553, sid=be526b52 d6915717
Wed Jul 3 17:40:54 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Jul 3 17:40:54 2019 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=[email protected]
Wed Jul 3 17:40:54 2019 VERIFY OK: nsCertType=SERVER
Wed Jul 3 17:40:54 2019 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=[email protected]
Wed Jul 3 17:40:54 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Wed Jul 3 17:40:54 2019 [server] Peer Connection Initiated with [AF_INET]5.62.62.188:553
Wed Jul 3 17:40:55 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Wed Jul 3 17:40:56 2019 AUTH: Received control message: AUTH_FAILED
Wed Jul 3 17:40:56 2019 SIGTERM[soft,auth-failure] received, process exiting
The text was updated successfully, but these errors were encountered: