· 6 years ago · Oct 20, 2019, 05:02 PM
120-10-2019 19:59:07 Application version 1.6.9 started
220-10-2019 19:49:58 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.6.9 работает на xiaomi Redmi Note 7 (sdm660), Android 9 (PKQ1.180904.001) API 28, ABI arm64-v8a, (xiaomi/lavender_ru/lavender:9/PKQ1.180904.001/V10.3.5.0.PFGRUXM:user/release-keys)
320-10-2019 19:49:59 Background loading servers
420-10-2019 19:50:00 Servers list received
520-10-2019 19:50:00 Создание конфигурации…
620-10-2019 19:50:00 started Socket Thread
720-10-2019 19:50:00 Статус сети: CONNECTED LTE to MOBILE internet.beeline.ru
820-10-2019 19:50:00 Current Parameter Settings:
920-10-2019 19:50:00 config = '/data/user/0/com.fourksoft.openvpn/cache/android.conf'
1020-10-2019 19:50:00 mode = 0
1120-10-2019 19:50:00 show_ciphers = DISABLED
1220-10-2019 19:50:00 show_digests = DISABLED
1320-10-2019 19:50:00 show_engines = DISABLED
1420-10-2019 19:50:00 genkey = DISABLED
1520-10-2019 19:50:00 key_pass_file = '[UNDEF]'
1620-10-2019 19:50:00 show_tls_ciphers = DISABLED
1720-10-2019 19:50:00 connect_retry_max = 5
1820-10-2019 19:50:00 Connection profiles [0]:
1920-10-2019 19:50:00 proto = tcp-client
2020-10-2019 19:50:00 local = '[UNDEF]'
2120-10-2019 19:50:00 local_port = '[UNDEF]'
2220-10-2019 19:50:00 remote = '46.148.20.47'
2320-10-2019 19:50:00 remote_port = '995'
2420-10-2019 19:50:00 remote_float = DISABLED
2520-10-2019 19:50:00 bind_defined = DISABLED
2620-10-2019 19:50:00 bind_local = DISABLED
2720-10-2019 19:50:00 bind_ipv6_only = DISABLED
2820-10-2019 19:50:00 NOTE: --mute triggered...
2920-10-2019 19:50:00 164 variation(s) on previous 20 message(s) suppressed by --mute
3020-10-2019 19:50:00 OpenVPN 2.5-icsopenvpn [git:2e4a63f07] arm64-v8a [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Aug 13 2019
3120-10-2019 19:50:00 library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10
3220-10-2019 19:50:00 MANAGEMENT: Connected to management server at /data/user/0/com.fourksoft.openvpn/cache/mgmtsocket
3320-10-2019 19:50:00 MANAGEMENT: CMD 'hold release'
3420-10-2019 19:50:00 MANAGEMENT: CMD 'bytecount 2'
3520-10-2019 19:50:00 MANAGEMENT: CMD 'state on'
3620-10-2019 19:50:00 MANAGEMENT: CMD 'proxy NONE'
3720-10-2019 19:50:01 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
3820-10-2019 19:50:01 Control Channel MTU parms [ L:1623 D:1210 EF:40 EB:0 ET:0 EL:3 ]
3920-10-2019 19:50:01 Data Channel MTU parms [ L:1623 D:1450 EF:123 EB:406 ET:0 EL:3 ]
4020-10-2019 19:50:01 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_CLIENT,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client'
4120-10-2019 19:50:01 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1559,tun-mtu 1500,proto TCPv4_SERVER,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-server'
4220-10-2019 19:50:01 TCP/UDP: Preserving recently used remote address: [AF_INET]46.148.20.47:995
4320-10-2019 19:50:01 Socket Buffers: R=[4194304->524288] S=[524288->524288]
4420-10-2019 19:50:01 Attempting to establish TCP connection with [AF_INET]46.148.20.47:995 [nonblock]
4520-10-2019 19:50:01 MANAGEMENT: >STATE:1571590201,TCP_CONNECT,,,,,,
4620-10-2019 19:50:01 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
4720-10-2019 19:50:02 TCP connection established with [AF_INET]46.148.20.47:995
4820-10-2019 19:50:02 MANAGEMENT: CMD 'needok 'PROTECTFD' ok'
4920-10-2019 19:50:02 TCP_CLIENT link local: (not bound)
5020-10-2019 19:50:02 TCP_CLIENT link remote: [AF_INET]46.148.20.47:995
5120-10-2019 19:50:02 MANAGEMENT: >STATE:1571590202,WAIT,,,,,,
5220-10-2019 19:50:02 Scrambler: disabled by config
5320-10-2019 19:50:02 MANAGEMENT: >STATE:1571590202,AUTH,,,,,,
5420-10-2019 19:50:02 TLS: Initial packet from [AF_INET]46.148.20.47:995, sid=ca025439 3a90fd51
5520-10-2019 19:50:02 VERIFY OK: depth=1, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=HideME CA, emailAddress=feedback@hideme.ru
5620-10-2019 19:50:02 VERIFY OK: nsCertType=SERVER
5720-10-2019 19:50:02 VERIFY OK: depth=0, C=DE, ST=Bayern, L=Gunzenhausen, O=HideME, CN=server, emailAddress=feedback@hideme.ru
5820-10-2019 19:50:03 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1559', remote='link-mtu 1543'
5920-10-2019 19:50:03 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher BF-CBC'
6020-10-2019 19:50:03 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128'
6120-10-2019 19:50:03 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
6220-10-2019 19:50:03 [server] Peer Connection Initiated with [AF_INET]46.148.20.47:995
6320-10-2019 19:50:04 MANAGEMENT: >STATE:1571590204,GET_CONFIG,,,,,,
6420-10-2019 19:50:04 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
6520-10-2019 19:50:04 PUSH: Received control message: 'PUSH_REPLY,route 10.101.16.0 255.255.240.0,topology net30,ping 8,ping-restart 45,ifconfig 10.101.25.46 10.101.25.45,peer-id 0,cipher AES-256-GCM'
6620-10-2019 19:50:04 OPTIONS IMPORT: timers and/or timeouts modified
6720-10-2019 19:50:04 OPTIONS IMPORT: --ifconfig/up options modified
6820-10-2019 19:50:04 OPTIONS IMPORT: route options modified
6920-10-2019 19:50:04 OPTIONS IMPORT: peer-id set
7020-10-2019 19:50:04 OPTIONS IMPORT: adjusting link_mtu to 1626
7120-10-2019 19:50:04 OPTIONS IMPORT: data channel crypto options modified
7220-10-2019 19:50:04 Data Channel: using negotiated cipher 'AES-256-GCM'
7320-10-2019 19:50:04 Data Channel MTU parms [ L:1554 D:1450 EF:54 EB:406 ET:0 EL:3 ]
7420-10-2019 19:50:04 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
7520-10-2019 19:50:04 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
7620-10-2019 19:50:04 GDG: SIOCGIFHWADDR(lo) failed
7720-10-2019 19:50:04 ROUTE_GATEWAY 127.100.103.119/255.0.0.0 IFACE=lo
7820-10-2019 19:50:04 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
7920-10-2019 19:50:04 MANAGEMENT: >STATE:1571590204,ASSIGN_IP,,10.101.25.46,,,,
8020-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'IFCONFIG' ok'
8120-10-2019 19:50:04 MANAGEMENT: >STATE:1571590204,ADD_ROUTES,,,,,,
8220-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'ROUTE' ok'
8320-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'ROUTE' ok'
8420-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
8520-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'DNSSERVER' ok'
8620-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'DNSDOMAIN' ok'
8720-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'PERSIST_TUN_ACTION' OPEN_BEFORE_CLOSE'
8820-10-2019 19:50:04 Открытие TUN-интерфейса:
8920-10-2019 19:50:04 Адрес IPv4: 10.101.25.46/30 IPv6: null MTU: 1500
9020-10-2019 19:50:04 DNS-сервер: 1.1.1.1, 1.1.1.1, Домен: com.fourksoft.openvpn
9120-10-2019 19:50:04 Маршруты: 0.0.0.0/0, 10.101.16.0/20, 10.101.25.44/30
9220-10-2019 19:50:04 Исключенные маршруты:
9320-10-2019 19:50:04 Подключенные маршруты сервиса VPN: 0.0.0.0/0
9420-10-2019 19:50:04 MANAGEMENT: CMD 'needok 'OPENTUN' ok'
9520-10-2019 19:50:04 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
9620-10-2019 19:50:04 Initialization Sequence Completed
9720-10-2019 19:50:04 MANAGEMENT: >STATE:1571590204,CONNECTED,SUCCESS,10.101.25.46,46.148.20.47,995,10.42.69.239,49349
9820-10-2019 19:50:21 Obtaining IP address
9920-10-2019 19:50:21 Obtaining IP address
10020-10-2019 19:50:23 Internal authentication is successful
10120-10-2019 19:50:23 Obtaining location
10220-10-2019 19:50:23 Current IP received : 46.148.20.12;46.148.20.12
10320-10-2019 19:50:24 Location received
10420-10-2019 19:50:24 Current location : Ukraine
10520-10-2019 19:50:34 Background loading servers
10620-10-2019 19:50:37 Servers list received
10720-10-2019 19:50:42 MANAGEMENT: CMD 'signal SIGINT'
10820-10-2019 19:50:42 TCP/UDP: Closing socket
10920-10-2019 19:50:42 Closing TUN/TAP interface
11020-10-2019 19:50:42 SIGINT[hard,] received, process exiting
11120-10-2019 19:50:42 MANAGEMENT: >STATE:1571590242,EXITING,SIGINT,,,,,
11220-10-2019 19:50:42 Obtaining IP address
11320-10-2019 19:50:42 Obtaining IP address
11420-10-2019 19:50:43 Obtaining IP address
11520-10-2019 19:50:43 Obtaining IP address
11620-10-2019 19:50:44 Obtaining location
11720-10-2019 19:50:44 Current IP received : 85.115.248.60;85.115.248.60
11820-10-2019 19:50:45 Obtaining location
11920-10-2019 19:50:45 Current IP received : 85.115.248.60;85.115.248.60
12020-10-2019 19:50:45 Location received
12120-10-2019 19:50:45 Location received
12220-10-2019 19:50:45 Current location : Russian Federation
12320-10-2019 19:50:45 Current location : Russian Federation
12420-10-2019 19:51:31 Obtaining IP address
12520-10-2019 19:51:32 Obtaining location
12620-10-2019 19:51:32 Current IP received : 85.115.248.60;85.115.248.60
12720-10-2019 19:51:32 Location received
12820-10-2019 19:52:30 Obtaining IP address
12920-10-2019 19:52:31 Obtaining location
13020-10-2019 19:52:31 Current IP received : 85.115.248.60;85.115.248.60
13120-10-2019 19:52:32 Location received
13220-10-2019 19:54:46 Obtaining IP address
13320-10-2019 19:54:47 Obtaining location
13420-10-2019 19:54:47 Current IP received : 85.115.248.60;85.115.248.60
13520-10-2019 19:54:47 Location received
13620-10-2019 19:55:33 Obtaining IP address
13720-10-2019 19:55:34 Obtaining location
13820-10-2019 19:55:34 Current IP received : 85.115.248.60;85.115.248.60
13920-10-2019 19:55:35 Location received
14020-10-2019 19:56:14 Obtaining IP address
14120-10-2019 19:56:14 Obtaining location
14220-10-2019 19:56:14 Current IP received : 85.115.248.60;85.115.248.60
14320-10-2019 19:56:15 Location received
14420-10-2019 19:56:58 Obtaining IP address
14520-10-2019 19:56:59 Obtaining location
14620-10-2019 19:56:59 Current IP received : 85.115.248.60;85.115.248.60
14720-10-2019 19:56:59 Location received
14820-10-2019 19:57:25 Obtaining IP address
14920-10-2019 19:57:28 Obtaining IP address
15020-10-2019 19:57:28 Obtaining location
15120-10-2019 19:57:28 Current IP received : 85.115.248.60;85.115.248.60
15220-10-2019 19:57:28 Obtaining location
15320-10-2019 19:57:28 Current IP received : 85.115.248.60;85.115.248.60
15420-10-2019 19:57:29 Location received
15520-10-2019 19:57:29 Start to create IKEv2 profile...
15620-10-2019 19:57:29 Location received
15720-10-2019 19:57:29 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 9 - PKQ1.180904.001/2019-08-05, Redmi Note 7 - xiaomi/lavender_ru/Xiaomi, Linux 4.4.153-perf+, aarch64)
15820-10-2019 19:57:29 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
15920-10-2019 19:57:29 spawning 16 worker threads
16020-10-2019 19:57:29 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' and private key
16120-10-2019 19:57:29 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
16220-10-2019 19:57:29 initiating IKE_SA android[1] to 46.148.20.47
16320-10-2019 19:57:29 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
16420-10-2019 19:57:29 sending packet: from 10.42.69.239[47195] to 46.148.20.47[500] (716 bytes)
16520-10-2019 19:57:29 received packet: from 46.148.20.47[500] to 10.42.69.239[47195] (60 bytes)
16620-10-2019 19:57:29 parsed IKE_SA_INIT response 0 [ N(COOKIE) ]
16720-10-2019 19:57:29 initiating IKE_SA android[1] to 46.148.20.47
16820-10-2019 19:57:29 generating IKE_SA_INIT request 0 [ N(COOKIE) SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
16920-10-2019 19:57:29 sending packet: from 10.42.69.239[47195] to 46.148.20.47[500] (748 bytes)
17020-10-2019 19:57:29 received packet: from 46.148.20.47[500] to 10.42.69.239[47195] (38 bytes)
17120-10-2019 19:57:29 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
17220-10-2019 19:57:29 peer didn't accept DH group ECP_256, it requested MODP_2048
17320-10-2019 19:57:29 initiating IKE_SA android[1] to 46.148.20.47
17420-10-2019 19:57:29 generating IKE_SA_INIT request 0 [ N(COOKIE) SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
17520-10-2019 19:57:29 sending packet: from 10.42.69.239[47195] to 46.148.20.47[500] (940 bytes)
17620-10-2019 19:57:29 received packet: from 46.148.20.47[500] to 10.42.69.239[47195] (481 bytes)
17720-10-2019 19:57:29 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
17820-10-2019 19:57:29 local host is behind NAT, sending keep alives
17920-10-2019 19:57:29 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
18020-10-2019 19:57:29 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
18120-10-2019 19:57:29 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
18220-10-2019 19:57:29 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name"
18320-10-2019 19:57:29 establishing CHILD_SA android{1}
18420-10-2019 19:57:29 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
18520-10-2019 19:57:29 splitting IKE message with length of 2228 bytes into 2 fragments
18620-10-2019 19:57:29 generating IKE_AUTH request 1 [ EF(1/2) ]
18720-10-2019 19:57:29 generating IKE_AUTH request 1 [ EF(2/2) ]
18820-10-2019 19:57:29 sending packet: from 10.42.69.239[42868] to 46.148.20.47[4500] (1368 bytes)
18920-10-2019 19:57:29 sending packet: from 10.42.69.239[42868] to 46.148.20.47[4500] (925 bytes)
19020-10-2019 19:57:30 received packet: from 46.148.20.47[4500] to 10.42.69.239[42868] (1248 bytes)
19120-10-2019 19:57:30 parsed IKE_AUTH response 1 [ EF(1/2) ]
19220-10-2019 19:57:30 received fragment #1 of 2, waiting for complete IKE message
19320-10-2019 19:57:30 received packet: from 46.148.20.47[4500] to 10.42.69.239[42868] (546 bytes)
19420-10-2019 19:57:30 parsed IKE_AUTH response 1 [ EF(2/2) ]
19520-10-2019 19:57:30 received fragment #2 of 2, reassembling fragmented IKE message
19620-10-2019 19:57:30 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
19720-10-2019 19:57:30 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
19820-10-2019 19:57:30 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
19920-10-2019 19:57:30 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
20020-10-2019 19:57:30 checking certificate status of "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
20120-10-2019 19:57:30 certificate status is not available
20220-10-2019 19:57:30 reached self-signed root ca with a path length of 0
20320-10-2019 19:57:30 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
20420-10-2019 19:57:30 IKE_SA android[1] established between 10.42.69.239[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.20.47[server]
20520-10-2019 19:57:30 scheduling rekeying in 35586s
20620-10-2019 19:57:30 maximum IKE_SA lifetime 36186s
20720-10-2019 19:57:30 installing DNS server 8.8.8.8
20820-10-2019 19:57:30 installing DNS server 8.8.4.4
20920-10-2019 19:57:30 installing DNS server 8.8.8.8
21020-10-2019 19:57:30 installing DNS server 8.8.4.4
21120-10-2019 19:57:30 installing new virtual IP 10.126.96.114
21220-10-2019 19:57:30 CHILD_SA android{1} established with SPIs a2d64704_i c0746cda_o and TS 10.126.96.114/32 === 0.0.0.0/0
21320-10-2019 19:57:30 setting up TUN device for CHILD_SA android{1}
21420-10-2019 19:57:30 successfully created TUN device
21520-10-2019 19:57:32 Obtaining IP address
21620-10-2019 19:57:32 Obtaining IP address
21720-10-2019 19:57:33 Obtaining IP address
21820-10-2019 19:57:33 Obtaining IP address
21920-10-2019 19:57:33 Obtaining IP address
22020-10-2019 19:57:33 Obtaining IP address
22120-10-2019 19:57:34 Obtaining location
22220-10-2019 19:57:34 Current IP received : 46.148.20.12;46.148.20.12
22320-10-2019 19:57:35 Location received
22420-10-2019 19:57:35 Current location : Ukraine
22520-10-2019 19:57:35 Obtaining location
22620-10-2019 19:57:35 Current IP received : 46.148.20.12;46.148.20.12
22720-10-2019 19:57:35 Location received
22820-10-2019 19:57:35 Current location : Ukraine
22920-10-2019 19:57:43 Obtaining IP address
23020-10-2019 19:57:44 Obtaining location
23120-10-2019 19:57:44 Current IP received : 46.148.20.12;46.148.20.12
23220-10-2019 19:57:45 Location received
23320-10-2019 19:57:45 Current location : Ukraine
23420-10-2019 19:58:00 null WARN: <-- HTTP FAILED: java.net.SocketTimeoutException: failed to connect to /10.117.0.1 (port 443) from /10.42.69.239 (port 41550) after 30000ms
23520-10-2019 19:58:04 Internal authentication error
23620-10-2019 19:58:05 Obtaining IP address
23720-10-2019 19:58:05 Obtaining IP address
23820-10-2019 19:58:05 Obtaining IP address
23920-10-2019 19:58:05 Obtaining IP address
24020-10-2019 19:58:06 Obtaining location
24120-10-2019 19:58:06 Current IP received : 46.148.20.12;46.148.20.12
24220-10-2019 19:58:06 Location received
24320-10-2019 19:58:06 Obtaining location
24420-10-2019 19:58:06 Current IP received : 46.148.20.12;46.148.20.12
24520-10-2019 19:58:06 Current location : Ukraine
24620-10-2019 19:58:06 Location received
24720-10-2019 19:58:06 Current location : Ukraine
24820-10-2019 19:58:11 Internal authentication is successful
24920-10-2019 19:58:12 Obtaining IP address
25020-10-2019 19:58:12 deleting IKE_SA android[1] between 10.42.69.239[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.20.47[server]
25120-10-2019 19:58:12 sending DELETE for IKE_SA android[1]
25220-10-2019 19:58:12 generating INFORMATIONAL request 2 [ D ]
25320-10-2019 19:58:12 sending packet: from 10.42.69.239[42868] to 46.148.20.47[4500] (65 bytes)
25420-10-2019 19:58:13 Obtaining IP address
25520-10-2019 19:58:13 Obtaining location
25620-10-2019 19:58:13 Current IP received : 85.115.248.60;85.115.248.60
25720-10-2019 19:58:13 Obtaining location
25820-10-2019 19:58:13 Current IP received : 85.115.248.60;85.115.248.60
25920-10-2019 19:58:14 Location received
26020-10-2019 19:58:14 Location received
26120-10-2019 19:58:14 Current location : Russian Federation
26220-10-2019 19:58:14 Obtaining IP address
26320-10-2019 19:58:15 Obtaining location
26420-10-2019 19:58:15 Current IP received : 85.115.248.60;85.115.248.60
26520-10-2019 19:58:15 Obtaining IP address
26620-10-2019 19:58:15 Location received
26720-10-2019 19:58:15 Current location : Russian Federation
26820-10-2019 19:58:16 Start to create IKEv2 profile...
26920-10-2019 19:58:16 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 9 - PKQ1.180904.001/2019-08-05, Redmi Note 7 - xiaomi/lavender_ru/Xiaomi, Linux 4.4.153-perf+, aarch64)
27020-10-2019 19:58:16 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
27120-10-2019 19:58:16 spawning 16 worker threads
27220-10-2019 19:58:16 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' and private key
27320-10-2019 19:58:16 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
27420-10-2019 19:58:16 initiating IKE_SA android[2] to 46.148.21.34
27520-10-2019 19:58:16 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
27620-10-2019 19:58:16 sending packet: from 10.42.69.239[44473] to 46.148.21.34[500] (716 bytes)
27720-10-2019 19:58:16 received packet: from 46.148.21.34[500] to 10.42.69.239[44473] (38 bytes)
27820-10-2019 19:58:16 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
27920-10-2019 19:58:16 peer didn't accept DH group ECP_256, it requested MODP_2048
28020-10-2019 19:58:16 initiating IKE_SA android[2] to 46.148.21.34
28120-10-2019 19:58:16 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
28220-10-2019 19:58:16 sending packet: from 10.42.69.239[44473] to 46.148.21.34[500] (908 bytes)
28320-10-2019 19:58:16 Obtaining location
28420-10-2019 19:58:16 Current IP received : 85.115.248.60;85.115.248.60
28520-10-2019 19:58:16 received packet: from 46.148.21.34[500] to 10.42.69.239[44473] (481 bytes)
28620-10-2019 19:58:16 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
28720-10-2019 19:58:16 local host is behind NAT, sending keep alives
28820-10-2019 19:58:16 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
28920-10-2019 19:58:16 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
29020-10-2019 19:58:16 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
29120-10-2019 19:58:16 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name"
29220-10-2019 19:58:16 establishing CHILD_SA android{2}
29320-10-2019 19:58:16 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
29420-10-2019 19:58:16 splitting IKE message with length of 2228 bytes into 2 fragments
29520-10-2019 19:58:16 generating IKE_AUTH request 1 [ EF(1/2) ]
29620-10-2019 19:58:16 generating IKE_AUTH request 1 [ EF(2/2) ]
29720-10-2019 19:58:16 sending packet: from 10.42.69.239[46118] to 46.148.21.34[4500] (1368 bytes)
29820-10-2019 19:58:16 sending packet: from 10.42.69.239[46118] to 46.148.21.34[4500] (925 bytes)
29920-10-2019 19:58:16 Location received
30020-10-2019 19:58:16 received packet: from 46.148.21.34[4500] to 10.42.69.239[46118] (1248 bytes)
30120-10-2019 19:58:16 parsed IKE_AUTH response 1 [ EF(1/2) ]
30220-10-2019 19:58:16 received fragment #1 of 2, waiting for complete IKE message
30320-10-2019 19:58:16 received packet: from 46.148.21.34[4500] to 10.42.69.239[46118] (546 bytes)
30420-10-2019 19:58:16 parsed IKE_AUTH response 1 [ EF(2/2) ]
30520-10-2019 19:58:16 received fragment #2 of 2, reassembling fragmented IKE message
30620-10-2019 19:58:16 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
30720-10-2019 19:58:16 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
30820-10-2019 19:58:16 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
30920-10-2019 19:58:16 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
31020-10-2019 19:58:16 checking certificate status of "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
31120-10-2019 19:58:16 certificate status is not available
31220-10-2019 19:58:16 reached self-signed root ca with a path length of 0
31320-10-2019 19:58:16 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
31420-10-2019 19:58:16 IKE_SA android[2] established between 10.42.69.239[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.21.34[server]
31520-10-2019 19:58:16 scheduling rekeying in 35460s
31620-10-2019 19:58:16 maximum IKE_SA lifetime 36060s
31720-10-2019 19:58:16 installing DNS server 8.8.8.8
31820-10-2019 19:58:16 installing DNS server 8.8.4.4
31920-10-2019 19:58:16 installing DNS server 8.8.8.8
32020-10-2019 19:58:16 installing DNS server 8.8.4.4
32120-10-2019 19:58:16 installing new virtual IP 10.123.64.247
32220-10-2019 19:58:16 CHILD_SA android{2} established with SPIs 12959b4d_i c667d07c_o and TS 10.123.64.247/32 === 0.0.0.0/0
32320-10-2019 19:58:16 setting up TUN device for CHILD_SA android{2}
32420-10-2019 19:58:16 successfully created TUN device
32520-10-2019 19:58:18 Obtaining IP address
32620-10-2019 19:58:18 Obtaining IP address
32720-10-2019 19:58:22 Obtaining location
32820-10-2019 19:58:22 Current IP received : 46.148.21.31;46.148.21.31
32920-10-2019 19:58:22 Location received
33020-10-2019 19:58:22 Current location : Ukraine
33120-10-2019 19:58:32 Background loading servers
33220-10-2019 19:58:33 Servers list received
33320-10-2019 19:58:40 Obtaining IP address
33420-10-2019 19:58:40 Obtaining IP address
33520-10-2019 19:58:40 Obtaining IP address
33620-10-2019 19:58:40 Obtaining IP address
33720-10-2019 19:58:41 Obtaining location
33820-10-2019 19:58:41 Current IP received : 46.148.21.31;46.148.21.31
33920-10-2019 19:58:41 Location received
34020-10-2019 19:58:41 Current location : Ukraine
34120-10-2019 19:58:41 Obtaining location
34220-10-2019 19:58:41 Current IP received : 46.148.21.31;46.148.21.31
34320-10-2019 19:58:42 Location received
34420-10-2019 19:58:42 Current location : Ukraine
34520-10-2019 19:58:46 null WARN: <-- HTTP FAILED: java.net.SocketTimeoutException: failed to connect to /10.117.0.1 (port 443) from /10.42.69.239 (port 41630) after 30000ms
34620-10-2019 19:58:59 Internal authentication error
34720-10-2019 19:59:03 Internal authentication error
34820-10-2019 19:59:04 Obtaining IP address
34920-10-2019 19:59:04 Obtaining IP address
35020-10-2019 19:59:04 deleting IKE_SA android[2] between 10.42.69.239[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.21.34[server]
35120-10-2019 19:59:04 sending DELETE for IKE_SA android[2]
35220-10-2019 19:59:04 generating INFORMATIONAL request 2 [ D ]
35320-10-2019 19:59:04 sending packet: from 10.42.69.239[46118] to 46.148.21.34[4500] (65 bytes)
35420-10-2019 19:59:04 Obtaining IP address
35520-10-2019 19:59:04 Obtaining IP address
35620-10-2019 19:59:04 Obtaining IP address
35720-10-2019 19:59:05 Obtaining location
35820-10-2019 19:59:05 Current IP received : 85.115.248.60;85.115.248.60
35920-10-2019 19:59:06 Obtaining location
36020-10-2019 19:59:06 Current IP received : 85.115.248.60;85.115.248.60
36120-10-2019 19:59:06 Location received
36220-10-2019 19:59:06 Current location : Russian Federation
36320-10-2019 19:59:06 Obtaining location
36420-10-2019 19:59:06 Current IP received : 85.115.248.60;85.115.248.60
36520-10-2019 19:59:06 Location received
36620-10-2019 19:59:06 Location received
36720-10-2019 19:59:07 Current location : Russian Federation