Code: Select all
Thu Nov 17 13:55:25 2016 us=348059 Current Parameter Settings:
Thu Nov 17 13:55:25 2016 us=348059 config = '..\user\custom.conf'
Thu Nov 17 13:55:25 2016 us=348059 mode = 0
Thu Nov 17 13:55:25 2016 us=348059 NOTE: --mute triggered...
Thu Nov 17 13:55:25 2016 us=348059 357 variation(s) on previous 3 message(s) suppressed by --mute
Thu Nov 17 13:55:25 2016 us=348059 OpenVPN 2.3.6 i686-w64-mingw32 [SSL (OpenSSL)] [LZO] [PKCS11] [IPv6] built on Dec 1 2014
Thu Nov 17 13:55:25 2016 us=348059 library versions: OpenSSL 1.0.2 22 Jan 2015, LZO 2.08
Thu Nov 17 13:55:27 2016 us=130622 LZO compression initialized
Thu Nov 17 13:55:27 2016 us=130622 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 13:55:27 2016 us=150651 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 13:55:27 2016 us=240780 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 13:55:27 2016 us=240780 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 13:55:27 2016 us=240780 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 13:55:27 2016 us=240780 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 13:55:27 2016 us=240780 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 13:55:27 2016 us=240780 Attempting to establish TCP connection with [AF_INET]70.32.38.69:443 [nonblock]
Thu Nov 17 13:55:28 2016 us=242220 TCP connection established with [AF_INET]70.32.38.69:443
Thu Nov 17 13:55:28 2016 us=242220 TCPv4_CLIENT link local: [undef]
Thu Nov 17 13:55:28 2016 us=242220 TCPv4_CLIENT link remote: [AF_INET]70.32.38.69:443
Thu Nov 17 13:55:28 2016 us=242220 TLS: Initial packet from [AF_INET]70.32.38.69:443, sid=30927b06 545526f0
Thu Nov 17 13:55:28 2016 us=252235 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Nov 17 13:55:28 2016 us=332350 VERIFY OK: depth=1, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=cryptostorm_is, [email protected]
Thu Nov 17 13:55:28 2016 us=332350 VERIFY OK: nsCertType=SERVER
Thu Nov 17 13:55:28 2016 us=332350 VERIFY OK: depth=0, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=server, [email protected]
Thu Nov 17 13:55:29 2016 us=534078 NOTE: --mute triggered...
Thu Nov 17 13:55:29 2016 us=534078 5 variation(s) on previous 3 message(s) suppressed by --mute
Thu Nov 17 13:55:29 2016 us=534078 [server] Peer Connection Initiated with [AF_INET]70.32.38.69:443
Thu Nov 17 13:55:31 2016 us=757275 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Thu Nov 17 13:55:31 2016 us=967577 PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,redirect-gateway bypass-dhcp,dhcp-option DNS 70.32.38.67,route-gateway 10.45.0.1,topology subnet,ping 20,ping-restart 60,ifconfig 10.45.206.219 255.255.0.0'
Thu Nov 17 13:55:31 2016 us=967577 OPTIONS IMPORT: timers and/or timeouts modified
Thu Nov 17 13:55:31 2016 us=967577 NOTE: --mute triggered...
Thu Nov 17 13:55:32 2016 us=67721 5 variation(s) on previous 3 message(s) suppressed by --mute
Thu Nov 17 13:55:32 2016 us=67721 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Thu Nov 17 13:55:32 2016 us=77736 open_tun, tt->ipv6=0
Thu Nov 17 13:55:32 2016 us=77736 TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{5899D730-1570-453C-A79C-EFC4C00421E9}.tap
Thu Nov 17 13:55:32 2016 us=77736 TAP-Windows Driver Version 9.21
Thu Nov 17 13:55:32 2016 us=77736 TAP-Windows MTU=1500
Thu Nov 17 13:55:32 2016 us=87750 Set TAP-Windows TUN subnet mode network/local/netmask = 10.45.0.0/10.45.206.219/255.255.0.0 [SUCCEEDED]
Thu Nov 17 13:55:32 2016 us=87750 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.45.206.219/255.255.0.0 on interface {5899D730-1570-453C-A79C-EFC4C00421E9} [DHCP-serv: 10.45.255.254, lease-time: 31536000]
Thu Nov 17 13:55:32 2016 us=87750 DHCP option string: 06044620 2643
Thu Nov 17 13:55:32 2016 us=87750 Successful ARP Flush on interface [16] {5899D730-1570-453C-A79C-EFC4C00421E9}
Thu Nov 17 13:55:37 2016 us=215123 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Thu Nov 17 13:55:37 2016 us=215123 C:\Windows\system32\route.exe ADD 70.32.38.69 MASK 255.255.255.255 192.168.1.1
Thu Nov 17 13:55:37 2016 us=245166 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Thu Nov 17 13:55:37 2016 us=245166 Route addition via IPAPI succeeded [adaptive]
Thu Nov 17 13:55:37 2016 us=245166 C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 11
Thu Nov 17 13:55:37 2016 us=245166 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Thu Nov 17 13:55:37 2016 us=245166 Route addition via IPAPI succeeded [adaptive]
Thu Nov 17 13:55:37 2016 us=245166 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.45.0.1
Thu Nov 17 13:55:37 2016 us=255180 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Thu Nov 17 13:55:37 2016 us=255180 Route addition via IPAPI succeeded [adaptive]
Thu Nov 17 13:55:37 2016 us=255180 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.45.0.1
Thu Nov 17 13:55:37 2016 us=265195 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Thu Nov 17 13:55:37 2016 us=265195 Route addition via IPAPI succeeded [adaptive]
Thu Nov 17 13:55:37 2016 us=265195 Initialization Sequence Completed
Connected
Thu Nov 17 14:15:29 2016 us=920148 VERIFY OK: depth=1, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=cryptostorm_is, [email protected]
Thu Nov 17 14:15:29 2016 us=920148 VERIFY OK: nsCertType=SERVER
Thu Nov 17 14:15:29 2016 us=920148 VERIFY OK: depth=0, C=CA, ST=QC, L=Montreal, O=Katana Holdings Limite / cryptostorm_darknet, OU=Tech Ops, CN=server, [email protected]
Thu Nov 17 14:15:31 2016 us=222020 NOTE: --mute triggered...
Thu Nov 17 14:17:44 2016 us=123123 5 variation(s) on previous 3 message(s) suppressed by --mute
Thu Nov 17 14:17:44 2016 us=123123 Connection reset, restarting [0]
Thu Nov 17 14:17:44 2016 us=123123 TCP/UDP: Closing socket
Thu Nov 17 14:17:44 2016 us=123123 SIGUSR1[soft,connection-reset] received, process restarting
Thu Nov 17 14:17:44 2016 us=123123 Restart pause, 5 second(s)
Thu Nov 17 14:17:49 2016 us=130323 Re-using SSL/TLS context
Thu Nov 17 14:17:49 2016 us=130323 LZO compression initialized
Thu Nov 17 14:17:49 2016 us=130323 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:17:49 2016 us=130323 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:18:01 2016 us=147603 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:18:01 2016 us=147603 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:18:01 2016 us=147603 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:18:01 2016 us=147603 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:18:01 2016 us=147603 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:18:01 2016 us=147603 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:18:13 2016 us=164883 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:18:13 2016 us=164883 TCP/UDP: Closing socket
Thu Nov 17 14:18:13 2016 us=164883 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:18:13 2016 us=164883 Restart pause, 5 second(s)
Thu Nov 17 14:18:18 2016 us=172083 Re-using SSL/TLS context
Thu Nov 17 14:18:18 2016 us=172083 LZO compression initialized
Thu Nov 17 14:18:18 2016 us=172083 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:18:18 2016 us=172083 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:18:30 2016 us=189363 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.net: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:18:30 2016 us=189363 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:18:30 2016 us=189363 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:18:30 2016 us=189363 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:18:30 2016 us=189363 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:18:30 2016 us=189363 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:18:42 2016 us=206643 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.net: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:18:42 2016 us=206643 TCP/UDP: Closing socket
Thu Nov 17 14:18:42 2016 us=206643 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:18:42 2016 us=206643 Restart pause, 5 second(s)
Thu Nov 17 14:18:47 2016 us=213843 Re-using SSL/TLS context
Thu Nov 17 14:18:47 2016 us=213843 LZO compression initialized
Thu Nov 17 14:18:47 2016 us=213843 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:18:47 2016 us=213843 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:18:59 2016 us=231123 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.org: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:18:59 2016 us=231123 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:18:59 2016 us=231123 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:18:59 2016 us=231123 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:18:59 2016 us=231123 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:18:59 2016 us=231123 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:19:11 2016 us=248403 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.org: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:19:11 2016 us=248403 TCP/UDP: Closing socket
Thu Nov 17 14:19:11 2016 us=248403 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:19:11 2016 us=248403 Restart pause, 5 second(s)
Thu Nov 17 14:19:16 2016 us=255603 Re-using SSL/TLS context
Thu Nov 17 14:19:16 2016 us=255603 LZO compression initialized
Thu Nov 17 14:19:16 2016 us=255603 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:19:16 2016 us=255603 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:19:28 2016 us=272883 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:19:28 2016 us=272883 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:19:28 2016 us=272883 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:19:28 2016 us=272883 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:19:28 2016 us=272883 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:19:28 2016 us=272883 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:19:40 2016 us=290163 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:19:40 2016 us=290163 TCP/UDP: Closing socket
Thu Nov 17 14:19:40 2016 us=290163 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:19:40 2016 us=290163 Restart pause, 5 second(s)
Thu Nov 17 14:19:45 2016 us=297363 Re-using SSL/TLS context
Thu Nov 17 14:19:45 2016 us=297363 LZO compression initialized
Thu Nov 17 14:19:45 2016 us=297363 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:19:45 2016 us=297363 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:19:57 2016 us=314643 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.net: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:19:57 2016 us=314643 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:19:57 2016 us=314643 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:19:57 2016 us=314643 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:19:57 2016 us=314643 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:19:57 2016 us=314643 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:20:09 2016 us=331923 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.net: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:20:09 2016 us=331923 TCP/UDP: Closing socket
Thu Nov 17 14:20:09 2016 us=331923 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:20:09 2016 us=331923 Restart pause, 5 second(s)
Thu Nov 17 14:20:14 2016 us=339123 Re-using SSL/TLS context
Thu Nov 17 14:20:14 2016 us=339123 LZO compression initialized
Thu Nov 17 14:20:14 2016 us=339123 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:20:14 2016 us=339123 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:20:26 2016 us=356403 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.org: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:20:26 2016 us=356403 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:20:26 2016 us=356403 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:20:26 2016 us=356403 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:20:26 2016 us=356403 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:20:26 2016 us=356403 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:20:38 2016 us=373683 RESOLVE: Cannot resolve host address: windows-ussouth.cryptostorm.org: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:20:38 2016 us=373683 TCP/UDP: Closing socket
Thu Nov 17 14:20:38 2016 us=373683 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:20:38 2016 us=373683 Restart pause, 5 second(s)
Thu Nov 17 14:20:43 2016 us=380883 Re-using SSL/TLS context
Thu Nov 17 14:20:43 2016 us=380883 LZO compression initialized
Thu Nov 17 14:20:43 2016 us=380883 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:20:43 2016 us=380883 Socket Buffers: R=[8192->8192] S=[8192->8192]
Thu Nov 17 14:20:55 2016 us=398163 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:20:55 2016 us=398163 Data Channel MTU parms [ L:1604 D:1450 EF:104 EB:135 ET:0 EL:0 AF:3/1 ]
Thu Nov 17 14:20:55 2016 us=398163 Local Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-client'
Thu Nov 17 14:20:55 2016 us=398163 Expected Remote Options String: 'V4,dev-type tun,link-mtu 1604,tun-mtu 1500,proto TCPv4_SERVER,comp-lzo,cipher AES-256-CBC,auth SHA512,keysize 256,key-method 2,tls-server'
Thu Nov 17 14:20:55 2016 us=398163 Local Options hash (VER=V4): '06d8c75c'
Thu Nov 17 14:20:55 2016 us=398163 Expected Remote Options hash (VER=V4): 'b20ffe30'
Thu Nov 17 14:21:07 2016 us=415443 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Thu Nov 17 14:21:07 2016 us=415443 TCP/UDP: Closing socket
Thu Nov 17 14:21:07 2016 us=415443 SIGUSR1[soft,init_instance] received, process restarting
Thu Nov 17 14:21:07 2016 us=415443 Restart pause, 5 second(s)
Thu Nov 17 14:21:12 2016 us=422643 Re-using SSL/TLS context
Thu Nov 17 14:21:12 2016 us=422643 LZO compression initialized
Thu Nov 17 14:21:12 2016 us=422643 Control Channel MTU parms [ L:1604 D:140 EF:40 EB:0 ET:0 EL:0 ]
Thu Nov 17 14:21:12 2016 us=422643 Socket Buffers: R=[8192->8192] S=[8192->8192]
Code: Select all
Thu Nov 17 14:21:07 2016 us=415443 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
Server: 127.0.0.1
Address: 127.0.0.1#53
Non-authoritative answer:
Name: windows-ussouth.cstorm.pw
Address: 108.62.19.133
Name: windows-ussouth.cstorm.pw
Address: 70.32.38.69
Code: Select all
Nov 18 12:29:54: Viscosity Mac 1.6.7b5 (1363)
Nov 18 12:29:54: Viscosity OpenVPN Engine Started
Nov 18 12:29:54: Running on Mac OS X 10.12.2
Nov 18 12:29:54: ---------
Nov 18 12:29:54: Checking reachability status of connection...
Nov 18 12:29:54: Connection is reachable. Starting connection attempt.
Nov 18 12:29:56: OpenVPN 2.3.13 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [PKCS11] [MH] [IPv6] built on Nov 4 2016
Nov 18 12:29:56: library versions: OpenSSL 1.0.2j 26 Sep 2016, LZO 2.09
Nov 18 12:29:59: UDPv4 link local: [undef]
Nov 18 12:29:59: UDPv4 link remote: [AF_INET]108.62.19.132:443
Nov 18 12:29:59: WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Nov 18 12:30:00: [server] Peer Connection Initiated with [AF_INET]108.62.19.132:443
Nov 18 12:30:02: Opening utun (connect(AF_SYS_CONTROL)): Resource busy
Nov 18 12:30:02: Opened utun device utun1
Nov 18 12:30:02: do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Nov 18 12:30:02: /sbin/ifconfig utun1 delete
Nov 18 12:30:02: NOTE: Tried to delete pre-existing tun/tap instance -- No Problem if failure
Nov 18 12:30:02: /sbin/ifconfig utun1 10.33.164.138 10.33.164.138 netmask 255.255.0.0 mtu 1500 up
Nov 18 12:30:02: Initialization Sequence Completed
Nov 18 12:30:02: DNS mode set to: Full
parityboy wrote:@OP
This part is interesting:Code: Select all
Thu Nov 17 14:21:07 2016 us=415443 RESOLVE: Cannot resolve host address: windows-ussouth.cstorm.pw: The requested name is valid, but no data of the requested type was found.
It looks like it's trying to re-negotiate the tunnel, but isn't keeping hold of the tunnel's public IP address, and when it does go and do a DNS lookup, it fails - like it receives an empty response perhaps? Or, it's expecting the same address it used last time and is getting different one from the pool. Would that really cause an issue?
While my CS connection is active:Server: 127.0.0.1
Address: 127.0.0.1#53
Non-authoritative answer:
Name: windows-ussouth.cstorm.pw
Address: 108.62.19.133
Name: windows-ussouth.cstorm.pw
Address: 70.32.38.69
Just out of interest, are you using the Cryptostorm widget or the official OpenVPN client?
Code: Select all
Nov 19 22:02:16 vilnius nm-openvpn[7797]: Initialization Sequence Completed
Nov 19 22:46:13 vilnius nm-openvpn[7797]: [server] Inactivity timeout (--ping-restart), restarting
Nov 19 22:46:13 vilnius nm-openvpn[7797]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 19 22:46:15 vilnius nm-openvpn[7797]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 19 22:46:15 vilnius nm-openvpn[7797]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 19 22:46:35 vilnius nm-openvpn[7797]: RESOLVE: Cannot resolve host address: linux-denmark.cryptostorm.net: Temporary failure in name resolution
Code: Select all
Nov 19 22:46:13 vilnius nm-openvpn[7797]: [server] Inactivity timeout (--ping-restart), restarting
Code: Select all
Nov 20 11:36:49 odessa nm-openvpn[19138]: Initialization Sequence Completed
Nov 21 00:20:59 odessa nm-openvpn[19138]: [server] Inactivity timeout (--ping-restart), restarting
Nov 21 00:20:59 odessa nm-openvpn[19138]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 21 00:21:01 odessa nm-openvpn[19138]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 21 00:21:01 odessa nm-openvpn[19138]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 21 00:21:41 odessa nm-openvpn[19138]: RESOLVE: Cannot resolve host address: linux-england.cryptostorm.net: Temporary failure in name resolution
parityboy wrote:@NYOB
Is "Narwhal" the latest client? Might it be worth giving a beta a try if there's one floating around?
EDIT
I decided to capture some logs to see what would happen when my own connection dropped and yup, the same issue. This is on Linux Mint 17.3 KDE.Code: Select all
Nov 19 22:02:16 vilnius nm-openvpn[7797]: Initialization Sequence Completed
Nov 19 22:46:13 vilnius nm-openvpn[7797]: [server] Inactivity timeout (--ping-restart), restarting
Nov 19 22:46:13 vilnius nm-openvpn[7797]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 19 22:46:15 vilnius nm-openvpn[7797]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 19 22:46:15 vilnius nm-openvpn[7797]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 19 22:46:35 vilnius nm-openvpn[7797]: RESOLVE: Cannot resolve host address: linux-denmark.cryptostorm.net: Temporary failure in name resolution
In this case the connection lasted 44 mins before it fell over while connected to the Denmark node. The part that caught my eye this time around (apart from the failure in DNS resolution) is this:Code: Select all
Nov 19 22:46:13 vilnius nm-openvpn[7797]: [server] Inactivity timeout (--ping-restart), restarting
Inactivity timeout? Really? So OpenVPN has an issue with an idle connection? I'm sure it never used to - it used to stay up for days.
UPDATE
OK, so when the tunnel gets into this state, the default route is still set to 10.xx.0.1, but that address cannot be pinged. I forgot to check, but it would appear that the openvpn process dies, and leaves the networking configuration in an inconsistent state.
For my own part, I'm going to update my OpenVPN software (currently 2.3.2) to the latest version, and see how it performs.
UPDATE #2
Well, after updating OpenVPN to version 2.3.13, the connection managed to stay up for just shy of 13 hours. See below.Code: Select all
Nov 20 11:36:49 odessa nm-openvpn[19138]: Initialization Sequence Completed
Nov 21 00:20:59 odessa nm-openvpn[19138]: [server] Inactivity timeout (--ping-restart), restarting
Nov 21 00:20:59 odessa nm-openvpn[19138]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 21 00:21:01 odessa nm-openvpn[19138]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 21 00:21:01 odessa nm-openvpn[19138]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 21 00:21:41 odessa nm-openvpn[19138]: RESOLVE: Cannot resolve host address: linux-england.cryptostorm.net: Temporary failure in name resolution
parityboy wrote:@NYOB
Is "Narwhal" the latest client? Might it be worth giving a beta a try if there's one floating around?
EDIT
I decided to capture some logs to see what would happen when my own connection dropped and yup, the same issue. This is on Linux Mint 17.3 KDE.
Code: Select all
ping 15
ping-exit 60
Code: Select all
Nov 25 01:36:44 vilnius nm-openvpn[2933]: [server] Inactivity timeout (--ping-restart), restarting
Nov 25 01:36:44 vilnius nm-openvpn[2933]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 25 01:36:46 vilnius nm-openvpn[2933]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 25 01:36:46 vilnius nm-openvpn[2933]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 25 01:36:46 vilnius nm-openvpn[2933]: UDPv4 link local: [undef]
Nov 25 01:36:46 vilnius nm-openvpn[2933]: UDPv4 link remote: [AF_INET]176.10.104.50:443
Nov 25 01:36:46 vilnius nm-openvpn[2933]: [server] Peer Connection Initiated with [AF_INET]176.10.104.50:443
Nov 25 01:36:48 vilnius nm-openvpn[2933]: Preserving previous TUN/TAP instance: tun0
Nov 25 01:36:48 vilnius nm-openvpn[2933]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.186.74 255.255.0.0 restart
Nov 25 01:36:48 vilnius nm-openvpn[2933]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
parityboy wrote:@Khariz
I'm starting to wonder...is it a configuration issue on the exit nodes, or are they under some kind of attack? And if it's an attack, why CS and not (for example) AirVPN or PIA?
NOYB wrote:
Never considered the possibility of attack and have no idea how causality could be proven. If that is happening, can see this is very bad news. Might mean people with unlimited budgets could be driving out small businesses. Where does this end?
Inactivity timeout (--ping-restart), restarting
...
RESOLVE: Cannot resolve host address: xxx.cryptostorm.net: Temporary failure in name resolution
PUSH: Received control message: 'PUSH_REPLY,persist-key,persist-tun,redirect-gateway def1,redirect-gateway bypass-dhcp,dhcp-option DNS 108.62.19.131,route-gateway 10.44.0.1,topology subnet,ping 20,ping-restart 60,ifconfig 10.44.78.120 255.255.0.0'
Code: Select all
Nov 25 16:53:45 vilnius nm-openvpn[5977]: Initialization Sequence Completed
Nov 26 02:06:43 vilnius nm-openvpn[5977]: [server] Inactivity timeout (--ping-restart), restarting
Nov 26 02:06:43 vilnius nm-openvpn[5977]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 26 02:06:45 vilnius nm-openvpn[5977]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 26 02:06:45 vilnius nm-openvpn[5977]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 26 02:07:00 vilnius nm-openvpn[5977]: UDPv4 link local: [undef]
Nov 26 02:07:00 vilnius nm-openvpn[5977]: UDPv4 link remote: [AF_INET]176.10.104.50:443
Nov 26 02:08:00 vilnius nm-openvpn[5977]: [UNDEF] Inactivity timeout (--ping-restart), restarting
Nov 26 02:08:00 vilnius nm-openvpn[5977]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 26 02:08:02 vilnius nm-openvpn[5977]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 26 02:08:02 vilnius nm-openvpn[5977]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 26 02:08:02 vilnius nm-openvpn[5977]: UDPv4 link local: [undef]
Nov 26 02:08:02 vilnius nm-openvpn[5977]: UDPv4 link remote: [AF_INET]185.60.147.79:443
Nov 26 02:08:02 vilnius nm-openvpn[5977]: [server] Peer Connection Initiated with [AF_INET]185.60.147.79:443
Nov 26 02:08:04 vilnius nm-openvpn[5977]: Preserving previous TUN/TAP instance: tun0
Nov 26 02:08:04 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.114.185 255.255.0.0 restart
Nov 26 02:08:04 vilnius nm-openvpn[5977]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Nov 26 02:08:05 vilnius nm-openvpn[5977]: TUN/TAP device tun0 opened
Nov 26 02:08:05 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.52.60 255.255.0.0 init
Nov 26 02:08:05 vilnius nm-openvpn[5977]: Initialization Sequence Completed
Code: Select all
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
linux-jord1.cry 192.168.1.1 255.255.255.255 UGH 0 0 0 eth0
192.168.1.0 * 255.255.255.0 U 1 0 0 eth0
Code: Select all
Nov 26 02:08:04 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.114.185 255.255.0.0 restart
Nov 26 02:08:04 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP Config Get) reply received.
Nov 26 02:08:04 vilnius NetworkManager[770]: <error> [1480126084.735340] [nm-vpn-connection.c:695] process_generic_config(): (tun0): failed to look up VPN interface index
Nov 26 02:08:04 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP4 Config Get) reply received.
Nov 26 02:08:04 vilnius NetworkManager[770]: SCPlugin-Ifupdown: devices removed (path: /sys/devices/virtual/net/tun0, iface: tun0)
Nov 26 02:08:05 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.52.60 255.255.0.0 init
Nov 26 02:08:05 vilnius NetworkManager[770]: SCPlugin-Ifupdown: devices added (path: /sys/devices/virtual/net/tun0, iface: tun0)
Nov 26 02:08:05 vilnius NetworkManager[770]: SCPlugin-Ifupdown: device added (path: /sys/devices/virtual/net/tun0, iface: tun0): no ifupdown configuration found.
Nov 26 02:08:05 vilnius NetworkManager[770]: <warn> /sys/devices/virtual/net/tun0: couldn't determine device driver; ignoring...
Nov 26 02:08:05 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP Config Get) reply received.
Nov 26 02:08:05 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP4 Config Get) reply received.
parityboy wrote:@thread
OK, I decided to do one more experiment. My host (running Mint 17.3) was connected to the DE node in the normal way with both the DNS resolver and the IP pushed down from the server. That connection lasted 6h20m.
A VM (also running Mint 17.3 and bridged to the host) was connected to the CH node, but only taking an IP address from the server. The DNS was manually set to a out-of-tunnel on-LAN pfSense DNS forwarder, which in turn is configured to forward to three Cryptostorm DeepDNS resolvers over the naked Internet connection.
So far, that connection has lasted 8 hours. Let's see if it lasts 8 more...
UPDATE
It didn't.See below
Code: Select all
Nov 25 16:53:45 vilnius nm-openvpn[5977]: Initialization Sequence Completed
Nov 26 02:06:43 vilnius nm-openvpn[5977]: [server] Inactivity timeout (--ping-restart), restarting
Nov 26 02:06:43 vilnius nm-openvpn[5977]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 26 02:06:45 vilnius nm-openvpn[5977]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 26 02:06:45 vilnius nm-openvpn[5977]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 26 02:07:00 vilnius nm-openvpn[5977]: UDPv4 link local: [undef]
Nov 26 02:07:00 vilnius nm-openvpn[5977]: UDPv4 link remote: [AF_INET]176.10.104.50:443
Nov 26 02:08:00 vilnius nm-openvpn[5977]: [UNDEF] Inactivity timeout (--ping-restart), restarting
Nov 26 02:08:00 vilnius nm-openvpn[5977]: SIGUSR1[soft,ping-restart] received, process restarting
Nov 26 02:08:02 vilnius nm-openvpn[5977]: WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Nov 26 02:08:02 vilnius nm-openvpn[5977]: NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Nov 26 02:08:02 vilnius nm-openvpn[5977]: UDPv4 link local: [undef]
Nov 26 02:08:02 vilnius nm-openvpn[5977]: UDPv4 link remote: [AF_INET]185.60.147.79:443
Nov 26 02:08:02 vilnius nm-openvpn[5977]: [server] Peer Connection Initiated with [AF_INET]185.60.147.79:443
Nov 26 02:08:04 vilnius nm-openvpn[5977]: Preserving previous TUN/TAP instance: tun0
Nov 26 02:08:04 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.114.185 255.255.0.0 restart
Nov 26 02:08:04 vilnius nm-openvpn[5977]: NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Nov 26 02:08:05 vilnius nm-openvpn[5977]: TUN/TAP device tun0 opened
Nov 26 02:08:05 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.52.60 255.255.0.0 init
Nov 26 02:08:05 vilnius nm-openvpn[5977]: Initialization Sequence Completed
Looks like it reconnected doesn't it? It did, apart from thisCode: Select all
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
linux-jord1.cry 192.168.1.1 255.255.255.255 UGH 0 0 0 eth0
192.168.1.0 * 255.255.255.0 U 1 0 0 eth0
Ass you can see, the tun0 interface isn't active and the default route hasn't been set. From Network Manager, I got this.Code: Select all
Nov 26 02:08:04 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.114.185 255.255.0.0 restart
Nov 26 02:08:04 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP Config Get) reply received.
Nov 26 02:08:04 vilnius NetworkManager[770]: <error> [1480126084.735340] [nm-vpn-connection.c:695] process_generic_config(): (tun0): failed to look up VPN interface index
Nov 26 02:08:04 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP4 Config Get) reply received.
Nov 26 02:08:04 vilnius NetworkManager[770]: SCPlugin-Ifupdown: devices removed (path: /sys/devices/virtual/net/tun0, iface: tun0)
Nov 26 02:08:05 vilnius nm-openvpn[5977]: /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper tun0 1500 1602 10.33.52.60 255.255.0.0 init
Nov 26 02:08:05 vilnius NetworkManager[770]: SCPlugin-Ifupdown: devices added (path: /sys/devices/virtual/net/tun0, iface: tun0)
Nov 26 02:08:05 vilnius NetworkManager[770]: SCPlugin-Ifupdown: device added (path: /sys/devices/virtual/net/tun0, iface: tun0): no ifupdown configuration found.
Nov 26 02:08:05 vilnius NetworkManager[770]: <warn> /sys/devices/virtual/net/tun0: couldn't determine device driver; ignoring...
Nov 26 02:08:05 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP Config Get) reply received.
Nov 26 02:08:05 vilnius NetworkManager[770]: <info> VPN connection 'CS CH' (IP4 Config Get) reply received.
@Fermi
Just out of interest, which version of OpenVPN is deployed to the exit nodes?
[server] Inactivity timeout (--ping-restart), restarting
RESOLVE: Cannot resolve host address:
Khariz wrote:Buy the AirVPN subscription now. The Black Friday deal is 35% off making a year cost only $37.00.
Doesn't hurt to have either way for that price.
cryptostorm_support wrote:@Parityboy
Thanks for your help/input in this. if we can find out what is causing:[server] Inactivity timeout (--ping-restart), restarting
all subsequent actions causing the trouble will not have to take place.
Adding persist-remote-ip would also help in preventing:RESOLVE: Cannot resolve host address:
I have sessions on 4 different exit nodes: DE, CH, PT, DK which are stable for days weeks in a row.
@NOYB and others:
We will have a look into this.
/fermi
parityboy wrote:@Fermi
It might be a good idea to actually check that the server instance is actually sending pings in the first place. If it is, that would point to DPI and/or network interference.
UPDATE
Just to let everyone know, I'm experiencing the very same issue on Android 5.1.1 running Arne Scwhab's OpenVPN client, connected to the DE node. This is definitely a server/network issue.
22:33:37 2016 us=293779 RECEIVED PING PACKET
22:34:37 2016 us=738332 RECEIVED PING PACKET
22:35:13 2016 us=458883 RECEIVED PING PACKET
22:35:37 2016 us=344539 RECEIVED PING PACKET
22:36:13 2016 us=389301 RECEIVED PING PACKET
21:21:24 2016 us=333098 SENT PING
21:22:19 2016 us=449388 SENT PING
21:22:57 2016 us=334075 SENT PING
21:23:19 2016 us=441406 SENT PING
21:23:57 2016 us=149393 SENT PING
Fermi wrote:@Parityboy,
The "pings" are being sent. These do not behave like ICMP pings. No reply is expected. The client sends ping packets to the server, and the server sends ping packets to the client.
This should be according to the pushed directive ping 20. The client should receive a ping every 20 seconds and the client should send out a ping every 20 seconds.
This is visible when using verb 7 without mute and grepping: SENT PING and RECEIVED PING PACKET
On Windows client we see an inbound ping every 20 seconds, and an outbound ping every 60s. This isn't really according to the OpenVPN man pages?
On Linux client inbound ping (although the same directives are used as the Windows server) isn't every 20 seconds:22:33:37 2016 us=293779 RECEIVED PING PACKET
22:34:37 2016 us=738332 RECEIVED PING PACKET
22:35:13 2016 us=458883 RECEIVED PING PACKET
22:35:37 2016 us=344539 RECEIVED PING PACKET
22:36:13 2016 us=389301 RECEIVED PING PACKET
same for the ping sent by the client:21:21:24 2016 us=333098 SENT PING
21:22:19 2016 us=449388 SENT PING
21:22:57 2016 us=334075 SENT PING
21:23:19 2016 us=441406 SENT PING
21:23:57 2016 us=149393 SENT PING
Even if the timing isn't strict, the tunnel stays active as long as pings go back and forth.
If one or both sides have stopped pinging, this will result in a 'Inactivity timeout', followed by a restart after a couple of minutes. (I've seen this situation a couple of times.)
Weird we see different behavior between Linux and Windows, and we see a difference in what is mentioned in the man pages.
df and myself have connections with ussouth that have been stable for hours now (without changes server or client side).
Are you in the possibility to run this verb 7 test?
/fermi
Code: Select all
Mon Nov 28 13:47:08 2016 us=995025 SENT PING
Mon Nov 28 13:47:09 2016 us=37716 RECEIVED PING PACKET
Mon Nov 28 14:18:29 2016 us=720566 SENT PING
Mon Nov 28 14:24:02 2016 us=970964 RECEIVED PING PACKET
Mon Nov 28 14:24:04 2016 us=22564 SENT PING
Mon Nov 28 14:25:06 2016 us=417565 SENT PING
Mon Nov 28 14:25:06 2016 us=977230 RECEIVED PING PACKET
Mon Nov 28 14:26:09 2016 us=962394 RECEIVED PING PACKET
Mon Nov 28 14:26:10 2016 us=983903 SENT PING
Mon Nov 28 14:27:14 2016 us=352496 SENT PING
Mon Nov 28 14:27:14 2016 us=392445 RECEIVED PING PACKET
Code: Select all
Mon Nov 28 16:17:56 2016 us=494804 SENT PING
Mon Nov 28 16:17:56 2016 us=536991 RECEIVED PING PACKET
Mon Nov 28 16:18:16 2016 us=569124 SENT PING
Mon Nov 28 16:18:16 2016 us=611220 RECEIVED PING PACKET
Mon Nov 28 19:59:33 2016 us=32305 RECEIVED PING PACKET
Mon Nov 28 20:00:54 2016 us=278170 SENT PING
Mon Nov 28 20:05:09 2016 us=191954 RECEIVED PING PACKET
Mon Nov 28 20:05:44 2016 us=143904 RECEIVED PING PACKET
Mon Nov 28 20:06:32 2016 us=466662 RECEIVED PING PACKET
Mon Nov 28 20:07:05 2016 us=195165 RECEIVED PING PACKET
Mon Nov 28 20:07:26 2016 us=370024 RECEIVED PING PACKET
Mon Nov 28 20:07:59 2016 us=193517 RECEIVED PING PACKET
Mon Nov 28 20:08:19 2016 us=474228 RECEIVED PING PACKET
Mon Nov 28 20:08:23 2016 us=536906 SENT PING
Mon Nov 28 20:08:39 2016 us=699787 RECEIVED PING PACKET
Mon Nov 28 20:09:05 2016 us=368090 RECEIVED PING PACKET
Mon Nov 28 20:09:26 2016 us=190613 RECEIVED PING PACKET
Mon Nov 28 20:09:26 2016 us=190667 SENT PING
Mon Nov 28 20:09:46 2016 us=190514 RECEIVED PING PACKET
Mon Nov 28 20:10:06 2016 us=378085 RECEIVED PING PACKET
Mon Nov 28 20:10:26 2016 us=669843 RECEIVED PING PACKET
Mon Nov 28 20:10:40 2016 us=35 SENT PING
Mon Nov 28 20:11:05 2016 us=350276 RECEIVED PING PACKET
Mon Nov 28 20:11:13 2016 us=443022 SENT PING
Mon Nov 28 20:11:25 2016 us=187532 RECEIVED PING PACKET
Mon Nov 28 20:11:33 2016 us=409246 SENT PING
Mon Nov 28 20:11:45 2016 us=419354 RECEIVED PING PACKET
Mon Nov 28 20:12:05 2016 us=354623 RECEIVED PING PACKET
Mon Nov 28 20:12:43 2016 us=400417 RECEIVED PING PACKET
Mon Nov 28 20:13:06 2016 us=201927 RECEIVED PING PACKET
Mon Nov 28 20:13:26 2016 us=354683 RECEIVED PING PACKET
Mon Nov 28 20:13:40 2016 us=488660 SENT PING
Mon Nov 28 20:13:46 2016 us=625964 RECEIVED PING PACKET
Mon Nov 28 20:14:06 2016 us=185965 RECEIVED PING PACKET
Mon Nov 28 20:14:27 2016 us=184631 RECEIVED PING PACKET
Mon Nov 28 20:14:41 2016 us=313414 SENT PING
Mon Nov 28 20:15:06 2016 us=391007 RECEIVED PING PACKET
Mon Nov 28 20:15:17 2016 us=643069 SENT PING
Mon Nov 28 20:15:26 2016 us=182592 RECEIVED PING PACKET
Mon Nov 28 20:15:37 2016 us=230909 SENT PING
Mon Nov 28 20:15:46 2016 us=592157 RECEIVED PING PACKET
Mon Nov 28 20:16:07 2016 us=182979 RECEIVED PING PACKET
Mon Nov 28 20:16:27 2016 us=279786 RECEIVED PING PACKET
Mon Nov 28 20:17:06 2016 us=190233 RECEIVED PING PACKET
Mon Nov 28 20:17:27 2016 us=285357 RECEIVED PING PACKET
Mon Nov 28 20:17:40 2016 us=511608 SENT PING
Mon Nov 28 20:17:47 2016 us=192776 RECEIVED PING PACKET
Mon Nov 28 20:18:08 2016 us=189139 RECEIVED PING PACKET
Mon Nov 28 20:18:29 2016 us=284231 RECEIVED PING PACKET
Mon Nov 28 20:25:09 2016 us=336041 RECEIVED PING PACKET
Mon Nov 28 20:25:29 2016 us=518703 RECEIVED PING PACKET
Mon Nov 28 20:25:49 2016 us=570888 RECEIVED PING PACKET
Mon Nov 28 20:26:10 2016 us=218488 RECEIVED PING PACKET
Mon Nov 28 20:26:31 2016 us=285659 RECEIVED PING PACKET
Mon Nov 28 20:26:41 2016 us=446630 SENT PING
Mon Nov 28 20:27:07 2016 us=177574 RECEIVED PING PACKET
Mon Nov 28 20:27:17 2016 us=440991 SENT PING
Mon Nov 28 20:27:28 2016 us=178579 RECEIVED PING PACKET
Mon Nov 28 20:27:39 2016 us=239517 SENT PING
Mon Nov 28 20:27:48 2016 us=624283 RECEIVED PING PACKET
Mon Nov 28 20:28:09 2016 us=71463 RECEIVED PING PACKET
Mon Nov 28 20:28:28 2016 us=196289 RECEIVED PING PACKET
Mon Nov 28 20:28:40 2016 us=219341 SENT PING
Mon Nov 28 20:29:07 2016 us=380558 RECEIVED PING PACKET
Mon Nov 28 20:29:15 2016 us=623985 SENT PING
Mon Nov 28 20:29:28 2016 us=195280 RECEIVED PING PACKET
Mon Nov 28 20:29:39 2016 us=419504 SENT PING
Mon Nov 28 20:29:48 2016 us=953745 RECEIVED PING PACKET
Mon Nov 28 20:30:08 2016 us=526400 RECEIVED PING PACKET
Mon Nov 28 20:30:28 2016 us=614144 RECEIVED PING PACKET
Mon Nov 28 20:30:42 2016 us=919039 SENT PING
Mon Nov 28 20:31:06 2016 us=511007 RECEIVED PING PACKET
Mon Nov 28 20:31:17 2016 us=597899 SENT PING
Mon Nov 28 20:31:26 2016 us=192636 RECEIVED PING PACKET
Mon Nov 28 20:31:40 2016 us=727366 SENT PING
Mon Nov 28 20:31:47 2016 us=15061 RECEIVED PING PACKET
Mon Nov 28 20:32:06 2016 us=457629 RECEIVED PING PACKET
Mon Nov 28 20:32:26 2016 us=888188 RECEIVED PING PACKET
Mon Nov 28 20:32:41 2016 us=253120 SENT PING
Mon Nov 28 20:33:07 2016 us=553513 RECEIVED PING PACKET
Mon Nov 28 20:33:15 2016 us=590322 SENT PING
Mon Nov 28 20:33:27 2016 us=190462 RECEIVED PING PACKET
Mon Nov 28 20:33:40 2016 us=531854 SENT PING
Mon Nov 28 20:33:47 2016 us=583514 RECEIVED PING PACKET
Mon Nov 28 20:34:07 2016 us=959113 RECEIVED PING PACKET
Mon Nov 28 20:34:28 2016 us=103915 RECEIVED PING PACKET
Mon Nov 28 20:34:29 2016 us=260541 SENT PING
Mon Nov 28 20:35:22 2016 us=274804 RECEIVED PING PACKET
Mon Nov 28 20:35:43 2016 us=207933 RECEIVED PING PACKET
Mon Nov 28 20:36:03 2016 us=218688 RECEIVED PING PACKET
Mon Nov 28 20:36:23 2016 us=228152 RECEIVED PING PACKET
Mon Nov 28 20:36:44 2016 us=230765 RECEIVED PING PACKET
Mon Nov 28 20:36:44 2016 us=230819 SENT PING
Mon Nov 28 20:37:32 2016 us=282925 RECEIVED PING PACKET
Mon Nov 28 20:38:26 2016 us=751512 RECEIVED PING PACKET
Mon Nov 28 20:39:20 2016 us=51913 RECEIVED PING PACKET
Mon Nov 28 20:39:30 2016 us=69638 SENT PING
Mon Nov 28 20:39:40 2016 us=62627 RECEIVED PING PACKET
Mon Nov 28 20:40:01 2016 us=97589 RECEIVED PING PACKET
Mon Nov 28 20:40:27 2016 us=127124 RECEIVED PING PACKET
Mon Nov 28 20:40:42 2016 us=449557 SENT PING
Mon Nov 28 20:41:35 2016 us=637697 RECEIVED PING PACKET
Mon Nov 28 20:41:35 2016 us=637750 SENT PING
Mon Nov 28 20:41:56 2016 us=172738 RECEIVED PING PACKET
Mon Nov 28 20:42:16 2016 us=136628 RECEIVED PING PACKET
Mon Nov 28 20:42:36 2016 us=144914 RECEIVED PING PACKET
Mon Nov 28 20:42:42 2016 us=174822 SENT PING
Mon Nov 28 20:42:56 2016 us=179247 RECEIVED PING PACKET
Mon Nov 28 20:43:27 2016 us=534697 SENT PING
Mon Nov 28 20:43:58 2016 us=302850 SENT PING
Mon Nov 28 20:45:08 2016 us=775485 RECEIVED PING PACKET
Mon Nov 28 20:45:35 2016 us=61421 RECEIVED PING PACKET
Mon Nov 28 20:45:41 2016 us=176050 SENT PING
Mon Nov 28 20:45:55 2016 us=443266 RECEIVED PING PACKET
Mon Nov 28 20:46:41 2016 us=348930 RECEIVED PING PACKET
Mon Nov 28 20:46:42 2016 us=538203 SENT PING
Mon Nov 28 20:47:20 2016 us=235589 RECEIVED PING PACKET
Mon Nov 28 20:47:26 2016 us=613281 SENT PING
Mon Nov 28 20:47:40 2016 us=235765 RECEIVED PING PACKET
Mon Nov 28 20:47:46 2016 us=345565 SENT PING
Mon Nov 28 20:48:22 2016 us=269796 RECEIVED PING PACKET
Mon Nov 28 20:54:27 2016 us=944618 RECEIVED PING PACKET
Mon Nov 28 20:55:11 2016 us=416578 RECEIVED PING PACKET
Mon Nov 28 20:55:58 2016 us=238622 RECEIVED PING PACKET
Mon Nov 28 20:56:18 2016 us=699626 RECEIVED PING PACKET
Mon Nov 28 20:56:39 2016 us=425971 RECEIVED PING PACKET
Mon Nov 28 20:57:10 2016 us=251492 RECEIVED PING PACKET
Mon Nov 28 20:57:21 2016 us=654719 SENT PING
Mon Nov 28 20:57:30 2016 us=237951 RECEIVED PING PACKET
Mon Nov 28 20:57:50 2016 us=758986 RECEIVED PING PACKET
Mon Nov 28 20:58:35 2016 us=165138 RECEIVED PING PACKET
Mon Nov 28 20:58:46 2016 us=674423 SENT PING
Mon Nov 28 20:59:34 2016 us=531274 RECEIVED PING PACKET
Mon Nov 28 21:00:21 2016 us=732145 RECEIVED PING PACKET
Mon Nov 28 21:00:42 2016 us=165997 RECEIVED PING PACKET
Mon Nov 28 21:00:43 2016 us=328550 SENT PING
Mon Nov 28 21:01:10 2016 us=285599 RECEIVED PING PACKET
Mon Nov 28 21:01:31 2016 us=375476 RECEIVED PING PACKET
Mon Nov 28 21:01:43 2016 us=421862 SENT PING
Mon Nov 28 21:02:16 2016 us=231588 RECEIVED PING PACKET
Mon Nov 28 21:02:37 2016 us=253311 RECEIVED PING PACKET
Mon Nov 28 21:02:41 2016 us=272914 SENT PING
Mon Nov 28 21:03:09 2016 us=496992 RECEIVED PING PACKET
Mon Nov 28 21:03:53 2016 us=239719 RECEIVED PING PACKET
Mon Nov 28 21:04:27 2016 us=38248 RECEIVED PING PACKET
Mon Nov 28 21:05:34 2016 us=485374 SENT PING
Mon Nov 28 21:05:34 2016 us=527320 RECEIVED PING PACKET
Mon Nov 28 21:05:54 2016 us=758367 RECEIVED PING PACKET
Mon Nov 28 21:06:14 2016 us=216713 RECEIVED PING PACKET
Mon Nov 28 21:06:43 2016 us=99990 RECEIVED PING PACKET
Mon Nov 28 21:06:45 2016 us=353711 SENT PING
Mon Nov 28 21:07:28 2016 us=261176 RECEIVED PING PACKET
Mon Nov 28 21:07:34 2016 us=281132 SENT PING
Mon Nov 28 21:07:48 2016 us=924221 RECEIVED PING PACKET
Mon Nov 28 21:07:54 2016 us=223759 SENT PING
Mon Nov 28 21:08:09 2016 us=230044 RECEIVED PING PACKET
Mon Nov 28 21:08:29 2016 us=497556 RECEIVED PING PACKET
Mon Nov 28 21:09:11 2016 us=170885 RECEIVED PING PACKET
Mon Nov 28 21:09:32 2016 us=183111 RECEIVED PING PACKET
Mon Nov 28 21:09:43 2016 us=427409 SENT PING
Mon Nov 28 21:09:52 2016 us=721502 RECEIVED PING PACKET
Mon Nov 28 21:10:12 2016 us=836587 RECEIVED PING PACKET
Mon Nov 28 21:10:33 2016 us=161466 RECEIVED PING PACKET
Mon Nov 28 21:10:44 2016 us=643182 SENT PING
Mon Nov 28 21:11:11 2016 us=232869 RECEIVED PING PACKET
Mon Nov 28 21:11:19 2016 us=333260 SENT PING
Mon Nov 28 21:11:31 2016 us=449703 RECEIVED PING PACKET
Mon Nov 28 21:11:39 2016 us=726641 SENT PING
Mon Nov 28 21:11:51 2016 us=398428 RECEIVED PING PACKET
Mon Nov 28 21:12:12 2016 us=418228 RECEIVED PING PACKET
Mon Nov 28 21:12:32 2016 us=425654 RECEIVED PING PACKET
Mon Nov 28 21:12:46 2016 us=635514 SENT PING
Mon Nov 28 21:13:11 2016 us=270501 RECEIVED PING PACKET
Mon Nov 28 21:13:21 2016 us=433374 SENT PING
Mon Nov 28 21:13:31 2016 us=424186 RECEIVED PING PACKET
Mon Nov 28 21:13:41 2016 us=875257 SENT PING
Mon Nov 28 21:13:51 2016 us=397590 RECEIVED PING PACKET
Mon Nov 28 21:14:11 2016 us=599784 RECEIVED PING PACKET
Mon Nov 28 21:14:31 2016 us=240666 RECEIVED PING PACKET
Mon Nov 28 21:14:45 2016 us=419596 SENT PING
Mon Nov 28 21:15:12 2016 us=239553 RECEIVED PING PACKET
Mon Nov 28 21:15:19 2016 us=385406 SENT PING
Mon Nov 28 21:15:33 2016 us=428487 RECEIVED PING PACKET
Mon Nov 28 21:15:39 2016 us=724896 SENT PING
Mon Nov 28 21:15:53 2016 us=528377 RECEIVED PING PACKET
Mon Nov 28 21:16:14 2016 us=238858 RECEIVED PING PACKET
Mon Nov 28 21:16:34 2016 us=236771 RECEIVED PING PACKET
Mon Nov 28 21:16:46 2016 us=583848 SENT PING
Mon Nov 28 21:17:11 2016 us=631876 RECEIVED PING PACKET
Mon Nov 28 21:17:22 2016 us=757859 SENT PING
Mon Nov 28 21:17:31 2016 us=944199 RECEIVED PING PACKET
Mon Nov 28 21:17:42 2016 us=167558 SENT PING
Mon Nov 28 21:17:51 2016 us=602786 RECEIVED PING PACKET
Mon Nov 28 21:18:12 2016 us=235198 RECEIVED PING PACKET
Mon Nov 28 21:18:33 2016 us=236047 RECEIVED PING PACKET
Mon Nov 28 21:26:14 2016 us=345776 RECEIVED PING PACKET
Mon Nov 28 21:27:35 2016 us=753152 SENT PING
Mon Nov 28 21:28:15 2016 us=397220 SENT PING
Mon Nov 28 21:28:35 2016 us=580164 SENT PING
Mon Nov 28 21:29:00 2016 us=968284 SENT PING
Code: Select all
Tue Nov 29 01:04:06 2016 us=85367 RECEIVED PING PACKET
Tue Nov 29 01:04:26 2016 us=571286 RECEIVED PING PACKET
Tue Nov 29 01:04:47 2016 us=194898 RECEIVED PING PACKET
Tue Nov 29 01:06:06 2016 us=114638 RECEIVED PING PACKET
Tue Nov 29 01:06:12 2016 us=197991 SENT PING
Tue Nov 29 01:06:27 2016 us=292332 RECEIVED PING PACKET
Tue Nov 29 04:15:07 2016 us=387888 RECEIVED PING PACKET
Tue Nov 29 04:16:00 2016 us=245109 RECEIVED PING PACKET
Tue Nov 29 04:16:21 2016 us=241663 RECEIVED PING PACKET
Tue Nov 29 04:16:41 2016 us=691503 RECEIVED PING PACKET
Tue Nov 29 04:17:01 2016 us=390713 RECEIVED PING PACKET
Tue Nov 29 04:17:22 2016 us=412375 RECEIVED PING PACKET
Tue Nov 29 04:17:32 2016 us=438420 SENT PING
Tue Nov 29 04:17:57 2016 us=366977 RECEIVED PING PACKET
Tue Nov 29 04:18:08 2016 us=745702 SENT PING
Tue Nov 29 04:18:17 2016 us=736170 RECEIVED PING PACKET
parityboy wrote:@thread
OK, the test on the DK node has now lasted 26 hours and it's been stable the entire time, no drops. Hopefully whatever was causing the drops is no longer active.
Code: Select all
Tue Nov 29 19:57:26 2016 us=836813 SENT PING
Tue Nov 29 19:58:00 2016 us=884092 SENT PING
Code: Select all
Tue Nov 29 19:57:26 2016 us=927669 RECEIVED PING PACKET
Tue Nov 29 19:58:00 2016 us=884015 RECEIVED PING PACKET
parityboy wrote:@0x24d
What's the address for the Amsterdam node? I don't see it in the config files on GitHub.
parityboy wrote:@Khariz
Ahhh, OK.
@0x24d
46.165.222.248 is the Frankfurt instance for Android/iOS/Linux/UNIX. 46.165.222.246 is the DeepDNS resolver on that box, if I remember rightly.
Code: Select all
/usr/sbin/openvpn --remote linux-denmark.cryptostorm.net 443 udp --comp-lzo --nobind --dev tun --cipher AES-256-CBC --auth SHA512 --auth-nocache --reneg-sec 0 --syslog nm-openvpn --mssfix --script-security 2 --up /usr/lib/NetworkManager/nm-openvpn-service-openvpn-helper --bus-name org.freedesktop.NetworkManager.openvpn.Connection_30 --tun -- --up-restart --persist-key --persist-tun --management /var/run/NetworkManager/nm-openvpn-4e459987-4c33-4d0c-b1bd-c6246fe297ab unix --management-client-user root --management-client-group root --management-query-passwords --auth-retry interact --route-noexec --ifconfig-noexec --client --auth-user-pass --ca /home/mint/.local/share/networkmanagement/certificates/cstorm_linux_denmark_1-4/ca.crt --user nm-openvpn --group nm-openvpn --chroot /var/lib/openvpn/chroot
0x24d wrote:Update
Connection to Latvia dropped after 22 minutes.
Fermi wrote:seems disturbingly normal
/fermi
Code: Select all
Thu Dec 1 22:17:31 2016 us=888158 TLS: tls_pre_encrypt: key_id=2
Thu Dec 1 22:17:31 2016 us=888226 UDPv4 WRITE [161] to [AF_INET]5.101.137.252:443: P_DATA_V1 kid=2 DATA len=160
Thu Dec 1 22:17:38 2016 us=130257 UDPv4 WRITE [14] to [AF_INET]5.101.137.252:443: P_CONTROL_SOFT_RESET_V1 kid=3 [ ] pid=0 DATA len=0
Thu Dec 1 22:17:38 2016 us=489534 TUN READ [192]
Thu Dec 1 22:17:38 2016 us=489613 TLS: tls_pre_encrypt: key_id=2
Thu Dec 1 22:17:38 2016 us=489704 UDPv4 WRITE [289] to [AF_INET]5.101.137.252:443: P_DATA_V1 kid=2 DATA len=288
Thu Dec 1 22:17:39 2016 us=656121 TUN READ [60]
Thu Dec 1 22:17:39 2016 us=656199 MSS: 1460 -> 1258
Thu Dec 1 22:17:39 2016 us=656229 TLS: tls_pre_encrypt: key_id=2
Thu Dec 1 22:17:39 2016 us=656331 UDPv4 WRITE [161] to [AF_INET]5.101.137.252:443: P_DATA_V1 kid=2 DATA len=160
Thu Dec 1 22:17:39 2016 us=912124 TUN READ [60]
Thu Dec 1 22:17:39 2016 us=912190 MSS: 1460 -> 1258
Thu Dec 1 22:17:39 2016 us=912217 TLS: tls_pre_encrypt: key_id=2
Thu Dec 1 22:17:39 2016 us=912303 UDPv4 WRITE [161] to [AF_INET]5.101.137.252:443: P_DATA_V1 kid=2 DATA len=160
Thu Dec 1 22:17:52 2016 us=298078 [server] Inactivity timeout (--ping-restart), restarting
Thu Dec 1 22:17:52 2016 us=298168 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298226 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298440 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298487 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298545 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298584 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298613 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298642 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298673 TCP/UDP: Closing socket
Thu Dec 1 22:17:52 2016 us=298732 PID packet_id_free
Thu Dec 1 22:17:52 2016 us=298787 SIGUSR1[soft,ping-restart] received, process restarting
Return to “member support & tech assistance”
Users browsing this forum: parityboy and 6 guests