vpnbook.com Received control message: AUTH_FAILED

This forum is for general conversation and user-user networking.

Moderators: TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech, TinCanTech

Post Reply
BruhLookAtThisDuuuude
OpenVpn Newbie
Posts: 2
Joined: Wed Mar 13, 2019 11:49 am

vpnbook.com Received control message: AUTH_FAILED

Post by BruhLookAtThisDuuuude » Wed Mar 13, 2019 1:12 pm

Hey folks,

so I recently installed OpenVPN and downloaded a bunch of .ovpn files from vpnbook to test. It worked in the beginning, but after I created a task in the task scheduler to make it connect on every computer startup, it just tried connecting indefinitely. I don't know what the problem is, so I'm gonna post the log file here:

Code: Select all

Wed Mar 13 12:20:09 2019 Flag 'def1' added to --redirect-gateway (iservice is in use)
Wed Mar 13 12:20:09 2019 OpenVPN 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 21 2019
Wed Mar 13 12:20:09 2019 Windows version 6.1 (Windows 7) 64bit
Wed Mar 13 12:20:09 2019 library versions: OpenSSL 1.1.0j  20 Nov 2018, LZO 2.10
Enter Management Password:
Wed Mar 13 12:20:09 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Wed Mar 13 12:20:09 2019 Need hold release from management interface, waiting...
Wed Mar 13 12:20:09 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Wed Mar 13 12:20:10 2019 MANAGEMENT: CMD 'state on'
Wed Mar 13 12:20:10 2019 MANAGEMENT: CMD 'log all on'
Wed Mar 13 12:20:10 2019 MANAGEMENT: CMD 'echo all on'
Wed Mar 13 12:20:10 2019 MANAGEMENT: CMD 'bytecount 5'
Wed Mar 13 12:20:10 2019 MANAGEMENT: CMD 'hold off'
Wed Mar 13 12:20:10 2019 MANAGEMENT: CMD 'hold release'
Wed Mar 13 12:20:10 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:10 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:10 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:10 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:10 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:10 2019 MANAGEMENT: >STATE:1552476010,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:11 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:11 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:11 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:11 2019 MANAGEMENT: >STATE:1552476011,WAIT,,,,,,
Wed Mar 13 12:20:11 2019 MANAGEMENT: >STATE:1552476011,AUTH,,,,,,
Wed Mar 13 12:20:11 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=5e9b16ac 162dbd27
Wed Mar 13 12:20:11 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Mar 13 12:20:11 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:11 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:11 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:11 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:12 2019 MANAGEMENT: >STATE:1552476012,GET_CONFIG,,,,,,
Wed Mar 13 12:20:12 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:12 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:12 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:12 2019 MANAGEMENT: >STATE:1552476012,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:12 2019 Restart pause, 5 second(s)
Wed Mar 13 12:20:17 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:17 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:17 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:17 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:17 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:17 2019 MANAGEMENT: >STATE:1552476017,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:18 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:18 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:18 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:18 2019 MANAGEMENT: >STATE:1552476018,WAIT,,,,,,
Wed Mar 13 12:20:18 2019 MANAGEMENT: >STATE:1552476018,AUTH,,,,,,
Wed Mar 13 12:20:18 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=931e32cd b1dfda99
Wed Mar 13 12:20:18 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:18 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:18 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:18 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:19 2019 MANAGEMENT: >STATE:1552476019,GET_CONFIG,,,,,,
Wed Mar 13 12:20:19 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:20 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:20 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:20 2019 MANAGEMENT: >STATE:1552476020,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:20 2019 Restart pause, 5 second(s)
Wed Mar 13 12:20:25 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:25 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:25 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:25 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:25 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:25 2019 MANAGEMENT: >STATE:1552476025,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:26 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:26 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:26 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:26 2019 MANAGEMENT: >STATE:1552476026,WAIT,,,,,,
Wed Mar 13 12:20:26 2019 MANAGEMENT: >STATE:1552476026,AUTH,,,,,,
Wed Mar 13 12:20:26 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=bab2fa01 61dfca7c
Wed Mar 13 12:20:26 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:26 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:26 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:26 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:27 2019 MANAGEMENT: >STATE:1552476027,GET_CONFIG,,,,,,
Wed Mar 13 12:20:27 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:27 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:27 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:27 2019 MANAGEMENT: >STATE:1552476027,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:27 2019 Restart pause, 5 second(s)
Wed Mar 13 12:20:32 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:32 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:32 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:32 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:32 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:32 2019 MANAGEMENT: >STATE:1552476032,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:33 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:33 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:33 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:33 2019 MANAGEMENT: >STATE:1552476033,WAIT,,,,,,
Wed Mar 13 12:20:33 2019 MANAGEMENT: >STATE:1552476033,AUTH,,,,,,
Wed Mar 13 12:20:33 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=9f7eed32 55daeb25
Wed Mar 13 12:20:33 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:33 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:34 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:34 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:35 2019 MANAGEMENT: >STATE:1552476035,GET_CONFIG,,,,,,
Wed Mar 13 12:20:35 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:35 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:35 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:35 2019 MANAGEMENT: >STATE:1552476035,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:35 2019 Restart pause, 5 second(s)
Wed Mar 13 12:20:40 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:40 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:40 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:40 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:40 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:40 2019 MANAGEMENT: >STATE:1552476040,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:41 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:41 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:41 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:41 2019 MANAGEMENT: >STATE:1552476041,WAIT,,,,,,
Wed Mar 13 12:20:41 2019 MANAGEMENT: >STATE:1552476041,AUTH,,,,,,
Wed Mar 13 12:20:41 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=8817f3be 99ee481e
Wed Mar 13 12:20:41 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:41 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:41 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:41 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:42 2019 MANAGEMENT: >STATE:1552476042,GET_CONFIG,,,,,,
Wed Mar 13 12:20:42 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:43 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:43 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:43 2019 MANAGEMENT: >STATE:1552476043,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:43 2019 Restart pause, 5 second(s)
Wed Mar 13 12:20:48 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:48 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:48 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:48 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:48 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:48 2019 MANAGEMENT: >STATE:1552476048,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:49 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:49 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:49 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:49 2019 MANAGEMENT: >STATE:1552476049,WAIT,,,,,,
Wed Mar 13 12:20:49 2019 MANAGEMENT: >STATE:1552476049,AUTH,,,,,,
Wed Mar 13 12:20:49 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=14112a50 bd813c14
Wed Mar 13 12:20:49 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:49 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:49 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:49 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:51 2019 MANAGEMENT: >STATE:1552476051,GET_CONFIG,,,,,,
Wed Mar 13 12:20:51 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:51 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:51 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:51 2019 MANAGEMENT: >STATE:1552476051,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:51 2019 Restart pause, 5 second(s)
Wed Mar 13 12:20:56 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:20:56 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:20:56 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:56 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:20:56 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:20:56 2019 MANAGEMENT: >STATE:1552476056,TCP_CONNECT,,,,,,
Wed Mar 13 12:20:57 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:57 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:20:57 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:57 2019 MANAGEMENT: >STATE:1552476057,WAIT,,,,,,
Wed Mar 13 12:20:57 2019 MANAGEMENT: >STATE:1552476057,AUTH,,,,,,
Wed Mar 13 12:20:57 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=405bc6da 99393753
Wed Mar 13 12:20:57 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:57 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:20:57 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:20:57 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:20:58 2019 MANAGEMENT: >STATE:1552476058,GET_CONFIG,,,,,,
Wed Mar 13 12:20:58 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:58 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:20:58 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:20:58 2019 MANAGEMENT: >STATE:1552476058,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:20:58 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:03 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:03 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:03 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:03 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:03 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:03 2019 MANAGEMENT: >STATE:1552476063,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:04 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:04 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:04 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:04 2019 MANAGEMENT: >STATE:1552476064,WAIT,,,,,,
Wed Mar 13 12:21:04 2019 MANAGEMENT: >STATE:1552476064,AUTH,,,,,,
Wed Mar 13 12:21:04 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=20687919 0f858019
Wed Mar 13 12:21:05 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:05 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:05 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:05 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:06 2019 MANAGEMENT: >STATE:1552476066,GET_CONFIG,,,,,,
Wed Mar 13 12:21:06 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:06 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:06 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:06 2019 MANAGEMENT: >STATE:1552476066,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:06 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:11 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:11 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:11 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:11 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:11 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:11 2019 MANAGEMENT: >STATE:1552476071,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:12 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:12 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:12 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:12 2019 MANAGEMENT: >STATE:1552476072,WAIT,,,,,,
Wed Mar 13 12:21:12 2019 MANAGEMENT: >STATE:1552476072,AUTH,,,,,,
Wed Mar 13 12:21:12 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=e45b8668 4626276a
Wed Mar 13 12:21:12 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:12 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:13 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:13 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:14 2019 MANAGEMENT: >STATE:1552476074,GET_CONFIG,,,,,,
Wed Mar 13 12:21:14 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:14 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:14 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:14 2019 MANAGEMENT: >STATE:1552476074,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:14 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:19 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:19 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:19 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:19 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:19 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:19 2019 MANAGEMENT: >STATE:1552476079,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:20 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:20 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:20 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:20 2019 MANAGEMENT: >STATE:1552476080,WAIT,,,,,,
Wed Mar 13 12:21:20 2019 MANAGEMENT: >STATE:1552476080,AUTH,,,,,,
Wed Mar 13 12:21:20 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=40d427c3 bdc737de
Wed Mar 13 12:21:20 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:20 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:20 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:20 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:21 2019 MANAGEMENT: >STATE:1552476081,GET_CONFIG,,,,,,
Wed Mar 13 12:21:21 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:22 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:22 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:22 2019 MANAGEMENT: >STATE:1552476082,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:22 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:27 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:27 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:27 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:27 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:27 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:27 2019 MANAGEMENT: >STATE:1552476087,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:28 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:28 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:28 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:28 2019 MANAGEMENT: >STATE:1552476088,WAIT,,,,,,
Wed Mar 13 12:21:28 2019 MANAGEMENT: >STATE:1552476088,AUTH,,,,,,
Wed Mar 13 12:21:28 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=df881aa3 034b9c22
Wed Mar 13 12:21:28 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:28 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:28 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:28 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:30 2019 MANAGEMENT: >STATE:1552476090,GET_CONFIG,,,,,,
Wed Mar 13 12:21:30 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:30 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:30 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:30 2019 MANAGEMENT: >STATE:1552476090,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:30 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:35 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:35 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:35 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:35 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:35 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:35 2019 MANAGEMENT: >STATE:1552476095,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:36 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:36 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:36 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:36 2019 MANAGEMENT: >STATE:1552476096,WAIT,,,,,,
Wed Mar 13 12:21:36 2019 MANAGEMENT: >STATE:1552476096,AUTH,,,,,,
Wed Mar 13 12:21:36 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=a479471d 6108e6e2
Wed Mar 13 12:21:36 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:36 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:36 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:36 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:37 2019 MANAGEMENT: >STATE:1552476097,GET_CONFIG,,,,,,
Wed Mar 13 12:21:37 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:37 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:37 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:37 2019 MANAGEMENT: >STATE:1552476097,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:37 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:42 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:42 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:42 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:42 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:42 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:42 2019 MANAGEMENT: >STATE:1552476102,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:43 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:43 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:43 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:43 2019 MANAGEMENT: >STATE:1552476103,WAIT,,,,,,
Wed Mar 13 12:21:44 2019 MANAGEMENT: >STATE:1552476104,AUTH,,,,,,
Wed Mar 13 12:21:44 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=20b8d5a9 13b166da
Wed Mar 13 12:21:44 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:44 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:44 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:44 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:45 2019 MANAGEMENT: >STATE:1552476105,GET_CONFIG,,,,,,
Wed Mar 13 12:21:45 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:45 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:45 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:45 2019 MANAGEMENT: >STATE:1552476105,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:45 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:50 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:50 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:50 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:50 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:50 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:50 2019 MANAGEMENT: >STATE:1552476110,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:51 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:51 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:51 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:51 2019 MANAGEMENT: >STATE:1552476111,WAIT,,,,,,
Wed Mar 13 12:21:51 2019 MANAGEMENT: >STATE:1552476111,AUTH,,,,,,
Wed Mar 13 12:21:51 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=8ea67f5d 30b98cd4
Wed Mar 13 12:21:51 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:51 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:51 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:51 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:53 2019 MANAGEMENT: >STATE:1552476113,GET_CONFIG,,,,,,
Wed Mar 13 12:21:53 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:21:53 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:21:53 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:21:53 2019 MANAGEMENT: >STATE:1552476113,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:21:53 2019 Restart pause, 5 second(s)
Wed Mar 13 12:21:58 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:21:58 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:21:58 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:58 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:21:58 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:21:58 2019 MANAGEMENT: >STATE:1552476118,TCP_CONNECT,,,,,,
Wed Mar 13 12:21:59 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:59 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:21:59 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:21:59 2019 MANAGEMENT: >STATE:1552476119,WAIT,,,,,,
Wed Mar 13 12:21:59 2019 MANAGEMENT: >STATE:1552476119,AUTH,,,,,,
Wed Mar 13 12:21:59 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=f36460a5 9df144f1
Wed Mar 13 12:21:59 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:59 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:21:59 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:21:59 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:00 2019 MANAGEMENT: >STATE:1552476120,GET_CONFIG,,,,,,
Wed Mar 13 12:22:00 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:22:00 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:22:00 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:22:00 2019 MANAGEMENT: >STATE:1552476120,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:22:00 2019 Restart pause, 5 second(s)
Wed Mar 13 12:22:05 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:22:05 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:22:05 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:05 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:22:05 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:22:05 2019 MANAGEMENT: >STATE:1552476125,TCP_CONNECT,,,,,,
Wed Mar 13 12:22:06 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:06 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:22:06 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:06 2019 MANAGEMENT: >STATE:1552476126,WAIT,,,,,,
Wed Mar 13 12:22:07 2019 MANAGEMENT: >STATE:1552476127,AUTH,,,,,,
Wed Mar 13 12:22:07 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=15e10fce d0f8e62c
Wed Mar 13 12:22:07 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:07 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:07 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:22:07 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:08 2019 MANAGEMENT: >STATE:1552476128,GET_CONFIG,,,,,,
Wed Mar 13 12:22:08 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:22:08 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:22:08 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:22:08 2019 MANAGEMENT: >STATE:1552476128,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:22:08 2019 Restart pause, 5 second(s)
Wed Mar 13 12:22:13 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:22:13 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:22:13 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:13 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:22:13 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:22:13 2019 MANAGEMENT: >STATE:1552476133,TCP_CONNECT,,,,,,
Wed Mar 13 12:22:14 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:14 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:22:14 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:14 2019 MANAGEMENT: >STATE:1552476134,WAIT,,,,,,
Wed Mar 13 12:22:14 2019 MANAGEMENT: >STATE:1552476134,AUTH,,,,,,
Wed Mar 13 12:22:14 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=aa427d36 75d62716
Wed Mar 13 12:22:15 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:15 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:15 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:22:15 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:16 2019 MANAGEMENT: >STATE:1552476136,GET_CONFIG,,,,,,
Wed Mar 13 12:22:16 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:22:16 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:22:16 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:22:16 2019 MANAGEMENT: >STATE:1552476136,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:22:16 2019 Restart pause, 5 second(s)
Wed Mar 13 12:22:21 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:22:21 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:22:21 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:21 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:22:21 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:22:21 2019 MANAGEMENT: >STATE:1552476141,TCP_CONNECT,,,,,,
Wed Mar 13 12:22:22 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:22 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:22:22 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:22 2019 MANAGEMENT: >STATE:1552476142,WAIT,,,,,,
Wed Mar 13 12:22:22 2019 MANAGEMENT: >STATE:1552476142,AUTH,,,,,,
Wed Mar 13 12:22:22 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=42f3148b 2da11edf
Wed Mar 13 12:22:22 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:22 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:22 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:22:22 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:23 2019 MANAGEMENT: >STATE:1552476143,GET_CONFIG,,,,,,
Wed Mar 13 12:22:23 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:22:24 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:22:24 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:22:24 2019 MANAGEMENT: >STATE:1552476144,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:22:24 2019 Restart pause, 5 second(s)
Wed Mar 13 12:22:29 2019 WARNING: No server certificate verification method has been enabled.  See http://openvpn.net/howto.html#mitm for more info.
Wed Mar 13 12:22:29 2019 NOTE: --fast-io is disabled since we are running on Windows
Wed Mar 13 12:22:29 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:29 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Wed Mar 13 12:22:29 2019 Attempting to establish TCP connection with [AF_INET]51.68.152.226:443 [nonblock]
Wed Mar 13 12:22:29 2019 MANAGEMENT: >STATE:1552476149,TCP_CONNECT,,,,,,
Wed Mar 13 12:22:30 2019 TCP connection established with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:30 2019 TCP_CLIENT link local: (not bound)
Wed Mar 13 12:22:30 2019 TCP_CLIENT link remote: [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:30 2019 MANAGEMENT: >STATE:1552476150,WAIT,,,,,,
Wed Mar 13 12:22:30 2019 MANAGEMENT: >STATE:1552476150,AUTH,,,,,,
Wed Mar 13 12:22:30 2019 TLS: Initial packet from [AF_INET]51.68.152.226:443, sid=239eff83 4fed8933
Wed Mar 13 12:22:30 2019 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:30 2019 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
Wed Mar 13 12:22:30 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
Wed Mar 13 12:22:30 2019 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.152.226:443
Wed Mar 13 12:22:31 2019 MANAGEMENT: >STATE:1552476151,GET_CONFIG,,,,,,
Wed Mar 13 12:22:31 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:22:32 2019 AUTH: Received control message: AUTH_FAILED
Wed Mar 13 12:22:32 2019 SIGUSR1[soft,auth-failure] received, process restarting
Wed Mar 13 12:22:32 2019 MANAGEMENT: >STATE:1552476152,RECONNECTING,auth-failure,,,,,
Wed Mar 13 12:22:32 2019 Restart pause, 5 second(s)
Wed Mar 13 12:22:34 2019 SIGTERM[hard,init_instance] received, process exiting
Wed Mar 13 12:22:34 2019 MANAGEMENT: >STATE:1552476154,EXITING,init_instance,,,,,

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: WARNING: No server certificate verification method has been enabled.

Post by TinCanTech » Wed Mar 13, 2019 2:08 pm

BruhLookAtThisDuuuude wrote:
Wed Mar 13, 2019 1:12 pm
Wed Mar 13 12:20:12 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:12 2019 AUTH: Received control message: AUTH_FAILED
Ask vpnbook.

BruhLookAtThisDuuuude
OpenVpn Newbie
Posts: 2
Joined: Wed Mar 13, 2019 11:49 am

Re: WARNING: No server certificate verification method has been enabled.

Post by BruhLookAtThisDuuuude » Wed Mar 13, 2019 2:13 pm

TinCanTech wrote:
Wed Mar 13, 2019 2:08 pm
BruhLookAtThisDuuuude wrote:
Wed Mar 13, 2019 1:12 pm
Wed Mar 13 12:20:12 2019 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
Wed Mar 13 12:20:12 2019 AUTH: Received control message: AUTH_FAILED
Ask vpnbook.
Ok, I will.

TinCanTech
OpenVPN Protagonist
Posts: 11137
Joined: Fri Jun 03, 2016 1:17 pm

Re: WARNING: No server certificate verification method has been enabled.

Post by TinCanTech » Wed Mar 13, 2019 2:22 pm

It is probably the user/password you are using is wrong.

Post Reply