You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2020-11-29 22:34:47 UDP link local: (not bound)
2020-11-29 22:34:47 UDP link remote: [AF_INET]192.99.37.222:25000
2020-11-29 22:34:47 TLS: Initial packet from [AF_INET]192.99.37.222:25000, sid=724f2f12 a7d3c9cb
2020-11-29 22:34:47 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-29 22:34:47 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:34:47 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:34:49 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2020-11-29 22:34:49 [vpnbook.com] Peer Connection Initiated with [AF_INET]192.99.37.222:25000
2020-11-29 22:34:50 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2020-11-29 22:34:50 AUTH: Received control message: AUTH_FAILED
2020-11-29 22:34:50 SIGTERM[soft,auth-failure] received, process exiting
2020-11-29 22:38:48 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2020-11-29 22:38:48 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2020-11-29 22:38:48 WARNING: file 'pass.txt' is group or others accessible
2020-11-29 22:38:48 OpenVPN 2.5.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Oct 28 2020
2020-11-29 22:38:48 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
2020-11-29 22:38:48 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2020-11-29 22:38:48 TCP/UDP: Preserving recently used remote address: [AF_INET]198.27.69.198:53
2020-11-29 22:38:48 Socket Buffers: R=[212992->212992] S=[212992->212992]
2020-11-29 22:38:48 UDP link local: (not bound)
2020-11-29 22:38:48 UDP link remote: [AF_INET]198.27.69.198:53
2020-11-29 22:38:48 TLS: Initial packet from [AF_INET]198.27.69.198:53, sid=3937530d b8e28dd7
2020-11-29 22:38:48 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-29 22:38:50 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:38:50 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:38:53 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2020-11-29 22:38:53 [vpnbook.com] Peer Connection Initiated with [AF_INET]198.27.69.198:53
2020-11-29 22:38:54 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2020-11-29 22:38:54 AUTH: Received control message: AUTH_FAILED
2020-11-29 22:38:54 SIGTERM[soft,auth-failure] received, process exiting
**** I have tried to go tot he website and copy new credentials into the pass.txt file or what not for vpn book. I have tried execute /opt/4nonimizer/vpn/vpnbook/vpn-get-pass.sh, as well. I even tried a few silly stuff like updating and uninstalling and reinstalling. I have looked at most of the issues with this same title to no avail. Please help,,,,
The text was updated successfully, but these errors were encountered:
2020-11-29 22:34:47 UDP link local: (not bound)
2020-11-29 22:34:47 UDP link remote: [AF_INET]192.99.37.222:25000
2020-11-29 22:34:47 TLS: Initial packet from [AF_INET]192.99.37.222:25000, sid=724f2f12 a7d3c9cb
2020-11-29 22:34:47 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-29 22:34:47 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:34:47 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:34:49 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2020-11-29 22:34:49 [vpnbook.com] Peer Connection Initiated with [AF_INET]192.99.37.222:25000
2020-11-29 22:34:50 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2020-11-29 22:34:50 AUTH: Received control message: AUTH_FAILED
2020-11-29 22:34:50 SIGTERM[soft,auth-failure] received, process exiting
2020-11-29 22:38:48 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2020-11-29 22:38:48 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2020-11-29 22:38:48 WARNING: file 'pass.txt' is group or others accessible
2020-11-29 22:38:48 OpenVPN 2.5.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Oct 28 2020
2020-11-29 22:38:48 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
2020-11-29 22:38:48 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2020-11-29 22:38:48 TCP/UDP: Preserving recently used remote address: [AF_INET]198.27.69.198:53
2020-11-29 22:38:48 Socket Buffers: R=[212992->212992] S=[212992->212992]
2020-11-29 22:38:48 UDP link local: (not bound)
2020-11-29 22:38:48 UDP link remote: [AF_INET]198.27.69.198:53
2020-11-29 22:38:48 TLS: Initial packet from [AF_INET]198.27.69.198:53, sid=3937530d b8e28dd7
2020-11-29 22:38:48 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-29 22:38:50 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:38:50 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=[email protected]
2020-11-29 22:38:53 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2020-11-29 22:38:53 [vpnbook.com] Peer Connection Initiated with [AF_INET]198.27.69.198:53
2020-11-29 22:38:54 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2020-11-29 22:38:54 AUTH: Received control message: AUTH_FAILED
2020-11-29 22:38:54 SIGTERM[soft,auth-failure] received, process exiting
**** I have tried to go tot he website and copy new credentials into the pass.txt file or what not for vpn book. I have tried execute /opt/4nonimizer/vpn/vpnbook/vpn-get-pass.sh, as well. I even tried a few silly stuff like updating and uninstalling and reinstalling. I have looked at most of the issues with this same title to no avail. Please help,,,,
The text was updated successfully, but these errors were encountered: