· 6 years ago · Oct 20, 2019, 05:12 PM
120-10-2019 20:08:20 Application version 1.6.9 started
220-10-2019 20:05:01 создан CN=Markus Saar,OU=corporation,O=inCloak Network Ltd.,L=Belize City,ST=Belize,C=BZ 1.6.9 работает на xiaomi Redmi Note 7 (sdm660), Android 9 (PKQ1.180904.001) API 28, ABI arm64-v8a, (xiaomi/lavender_ru/lavender:9/PKQ1.180904.001/V10.3.5.0.PFGRUXM:user/release-keys)
320-10-2019 20:05:01 Background loading servers
420-10-2019 20:05:03 Servers list received
520-10-2019 20:05:06 Obtaining IP address
620-10-2019 20:05:07 Obtaining location
720-10-2019 20:05:07 Current IP received : 85.115.248.244;85.115.248.244
820-10-2019 20:05:07 Location received
920-10-2019 20:05:08 Start to create IKEv2 profile...
1020-10-2019 20:05:08 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 9 - PKQ1.180904.001/2019-08-05, Redmi Note 7 - xiaomi/lavender_ru/Xiaomi, Linux 4.4.153-perf+, aarch64)
1120-10-2019 20:05:08 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
1220-10-2019 20:05:08 spawning 16 worker threads
1320-10-2019 20:05:08 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' and private key
1420-10-2019 20:05:08 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
1520-10-2019 20:05:08 initiating IKE_SA android[2] to 46.148.21.34
1620-10-2019 20:05:08 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
1720-10-2019 20:05:08 sending packet: from 10.42.69.239[44473] to 46.148.21.34[500] (716 bytes)
1820-10-2019 20:05:08 received packet: from 46.148.21.34[500] to 10.42.69.239[44473] (38 bytes)
1920-10-2019 20:05:08 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
2020-10-2019 20:05:08 peer didn't accept DH group ECP_256, it requested MODP_2048
2120-10-2019 20:05:08 initiating IKE_SA android[2] to 46.148.21.34
2220-10-2019 20:05:08 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
2320-10-2019 20:05:08 sending packet: from 10.42.69.239[44473] to 46.148.21.34[500] (908 bytes)
2420-10-2019 20:05:08 received packet: from 46.148.21.34[500] to 10.42.69.239[44473] (481 bytes)
2520-10-2019 20:05:08 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
2620-10-2019 20:05:08 local host is behind NAT, sending keep alives
2720-10-2019 20:05:08 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
2820-10-2019 20:05:08 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
2920-10-2019 20:05:08 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
3020-10-2019 20:05:08 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name"
3120-10-2019 20:05:08 establishing CHILD_SA android{2}
3220-10-2019 20:05:08 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
3320-10-2019 20:05:08 splitting IKE message with length of 2228 bytes into 2 fragments
3420-10-2019 20:05:08 generating IKE_AUTH request 1 [ EF(1/2) ]
3520-10-2019 20:05:08 generating IKE_AUTH request 1 [ EF(2/2) ]
3620-10-2019 20:05:08 sending packet: from 10.42.69.239[46118] to 46.148.21.34[4500] (1368 bytes)
3720-10-2019 20:05:08 sending packet: from 10.42.69.239[46118] to 46.148.21.34[4500] (925 bytes)
3820-10-2019 20:05:08 received packet: from 46.148.21.34[4500] to 10.42.69.239[46118] (1248 bytes)
3920-10-2019 20:05:08 parsed IKE_AUTH response 1 [ EF(1/2) ]
4020-10-2019 20:05:08 received fragment #1 of 2, waiting for complete IKE message
4120-10-2019 20:05:08 received packet: from 46.148.21.34[4500] to 10.42.69.239[46118] (546 bytes)
4220-10-2019 20:05:08 parsed IKE_AUTH response 1 [ EF(2/2) ]
4320-10-2019 20:05:08 received fragment #2 of 2, reassembling fragmented IKE message
4420-10-2019 20:05:08 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
4520-10-2019 20:05:08 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
4620-10-2019 20:05:08 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
4720-10-2019 20:05:08 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
4820-10-2019 20:05:08 checking certificate status of "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
4920-10-2019 20:05:08 certificate status is not available
5020-10-2019 20:05:08 reached self-signed root ca with a path length of 0
5120-10-2019 20:05:08 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
5220-10-2019 20:05:08 IKE_SA android[2] established between 10.42.69.239[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.21.34[server]
5320-10-2019 20:05:08 scheduling rekeying in 35460s
5420-10-2019 20:05:08 maximum IKE_SA lifetime 36060s
5520-10-2019 20:05:08 installing DNS server 8.8.8.8
5620-10-2019 20:05:08 installing DNS server 8.8.4.4
5720-10-2019 20:05:08 installing DNS server 8.8.8.8
5820-10-2019 20:05:08 installing DNS server 8.8.4.4
5920-10-2019 20:05:08 installing new virtual IP 10.123.64.247
6020-10-2019 20:05:08 CHILD_SA android{2} established with SPIs 12959b4d_i c667d07c_o and TS 10.123.64.247/32 === 0.0.0.0/0
6120-10-2019 20:05:08 setting up TUN device for CHILD_SA android{2}
6220-10-2019 20:05:08 successfully created TUN device
6320-10-2019 20:05:08 deleting IKE_SA android[2] between 10.42.69.239[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.21.34[server]
6420-10-2019 20:05:08 sending DELETE for IKE_SA android[2]
6520-10-2019 20:05:08 generating INFORMATIONAL request 2 [ D ]
6620-10-2019 20:05:08 sending packet: from 10.42.69.239[46118] to 46.148.21.34[4500] (65 bytes)
6720-10-2019 20:05:08 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 9 - PKQ1.180904.001/2019-08-05, Redmi Note 7 - xiaomi/lavender_ru/Xiaomi, Linux 4.4.153-perf+, aarch64)
6820-10-2019 20:05:08 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
6920-10-2019 20:05:08 spawning 16 worker threads
7020-10-2019 20:05:08 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' and private key
7120-10-2019 20:05:08 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
7220-10-2019 20:05:08 initiating IKE_SA android[1] to 46.148.21.34
7320-10-2019 20:05:08 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
7420-10-2019 20:05:08 sending packet: from 10.211.59.28[42069] to 46.148.21.34[500] (716 bytes)
7520-10-2019 20:05:09 received packet: from 46.148.21.34[500] to 10.211.59.28[42069] (38 bytes)
7620-10-2019 20:05:09 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
7720-10-2019 20:05:09 peer didn't accept DH group ECP_256, it requested MODP_2048
7820-10-2019 20:05:09 initiating IKE_SA android[1] to 46.148.21.34
7920-10-2019 20:05:09 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
8020-10-2019 20:05:09 sending packet: from 10.211.59.28[42069] to 46.148.21.34[500] (908 bytes)
8120-10-2019 20:05:09 received packet: from 46.148.21.34[500] to 10.211.59.28[42069] (481 bytes)
8220-10-2019 20:05:09 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
8320-10-2019 20:05:09 local host is behind NAT, sending keep alives
8420-10-2019 20:05:09 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
8520-10-2019 20:05:09 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
8620-10-2019 20:05:09 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
8720-10-2019 20:05:09 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name"
8820-10-2019 20:05:09 establishing CHILD_SA android{1}
8920-10-2019 20:05:09 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
9020-10-2019 20:05:09 splitting IKE message with length of 2228 bytes into 2 fragments
9120-10-2019 20:05:09 generating IKE_AUTH request 1 [ EF(1/2) ]
9220-10-2019 20:05:09 generating IKE_AUTH request 1 [ EF(2/2) ]
9320-10-2019 20:05:09 sending packet: from 10.211.59.28[37397] to 46.148.21.34[4500] (1368 bytes)
9420-10-2019 20:05:09 sending packet: from 10.211.59.28[37397] to 46.148.21.34[4500] (925 bytes)
9520-10-2019 20:05:09 received packet: from 46.148.21.34[4500] to 10.211.59.28[37397] (1248 bytes)
9620-10-2019 20:05:09 parsed IKE_AUTH response 1 [ EF(1/2) ]
9720-10-2019 20:05:09 received fragment #1 of 2, waiting for complete IKE message
9820-10-2019 20:05:09 received packet: from 46.148.21.34[4500] to 10.211.59.28[37397] (546 bytes)
9920-10-2019 20:05:09 parsed IKE_AUTH response 1 [ EF(2/2) ]
10020-10-2019 20:05:09 received fragment #2 of 2, reassembling fragmented IKE message
10120-10-2019 20:05:09 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
10220-10-2019 20:05:09 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
10320-10-2019 20:05:09 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
10420-10-2019 20:05:09 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
10520-10-2019 20:05:09 checking certificate status of "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
10620-10-2019 20:05:09 certificate status is not available
10720-10-2019 20:05:09 reached self-signed root ca with a path length of 0
10820-10-2019 20:05:09 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
10920-10-2019 20:05:09 IKE_SA android[1] established between 10.211.59.28[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.21.34[server]
11020-10-2019 20:05:09 scheduling rekeying in 35938s
11120-10-2019 20:05:09 maximum IKE_SA lifetime 36538s
11220-10-2019 20:05:09 installing DNS server 8.8.8.8
11320-10-2019 20:05:09 installing DNS server 8.8.4.4
11420-10-2019 20:05:09 installing DNS server 8.8.8.8
11520-10-2019 20:05:09 installing DNS server 8.8.4.4
11620-10-2019 20:05:09 installing new virtual IP 10.123.64.247
11720-10-2019 20:05:09 CHILD_SA android{1} established with SPIs dbf31396_i cf7251c4_o and TS 10.123.64.247/32 === 0.0.0.0/0
11820-10-2019 20:05:09 setting up TUN device for CHILD_SA android{1}
11920-10-2019 20:05:09 successfully created TUN device
12020-10-2019 20:05:10 Obtaining IP address
12120-10-2019 20:05:10 Obtaining IP address
12220-10-2019 20:05:12 Obtaining location
12320-10-2019 20:05:12 Current IP received : 46.148.21.31;46.148.21.31
12420-10-2019 20:05:12 Location received
12520-10-2019 20:05:12 Current location : Ukraine
12620-10-2019 20:05:30 deleting IKE_SA android[1] between 10.211.59.28[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...46.148.21.34[server]
12720-10-2019 20:05:30 sending DELETE for IKE_SA android[1]
12820-10-2019 20:05:30 generating INFORMATIONAL request 2 [ D ]
12920-10-2019 20:05:30 sending packet: from 10.211.59.28[37397] to 46.148.21.34[4500] (65 bytes)
13020-10-2019 20:05:30 null WARN: <-- HTTP FAILED: java.net.SocketException: Socket closed
13120-10-2019 20:05:30 Obtaining IP address
13220-10-2019 20:05:30 Obtaining IP address
13320-10-2019 20:05:30 Obtaining IP address
13420-10-2019 20:05:30 Obtaining location
13520-10-2019 20:05:30 Current IP received : 85.115.248.244;85.115.248.244
13620-10-2019 20:05:30 Obtaining IP address
13720-10-2019 20:05:30 Obtaining IP address
13820-10-2019 20:05:31 Location received
13920-10-2019 20:05:31 Obtaining location
14020-10-2019 20:05:31 Current IP received : 85.115.248.244;85.115.248.244
14120-10-2019 20:05:31 Obtaining location
14220-10-2019 20:05:31 Current IP received : 85.115.248.244;85.115.248.244
14320-10-2019 20:05:31 Location received
14420-10-2019 20:05:31 Current location : Russian Federation
14520-10-2019 20:05:32 Location received
14620-10-2019 20:05:32 Current location : Russian Federation
14720-10-2019 20:05:39 Background loading servers
14820-10-2019 20:05:41 Servers list received
14920-10-2019 20:06:12 Obtaining IP address
15020-10-2019 20:06:13 Obtaining location
15120-10-2019 20:06:14 Current IP received : 85.115.248.244;85.115.248.244
15220-10-2019 20:06:14 Location received
15320-10-2019 20:06:17 Obtaining IP address
15420-10-2019 20:06:18 Obtaining location
15520-10-2019 20:06:18 Current IP received : 85.115.248.244;85.115.248.244
15620-10-2019 20:06:18 Start to create IKEv2 profile...
15720-10-2019 20:06:18 Starting IKE charon daemon (strongSwan 5.7.0dr1, Android 9 - PKQ1.180904.001/2019-08-05, Redmi Note 7 - xiaomi/lavender_ru/Xiaomi, Linux 4.4.153-perf+, aarch64)
15820-10-2019 20:06:18 loaded plugins: androidbridge charon android-log openssl fips-prf random nonce pubkey chapoly curve25519 pkcs1 pkcs8 pem xcbc hmac socket-default revocation eap-identity eap-mschapv2 eap-md5 eap-gtc eap-tls x509
15920-10-2019 20:06:18 spawning 16 worker threads
16020-10-2019 20:06:18 loaded user certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' and private key
16120-10-2019 20:06:18 loaded CA certificate 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name'
16220-10-2019 20:06:18 initiating IKE_SA android[2] to 45.114.116.215
16320-10-2019 20:06:18 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
16420-10-2019 20:06:18 sending packet: from 10.211.59.28[41302] to 45.114.116.215[500] (716 bytes)
16520-10-2019 20:06:18 Location received
16620-10-2019 20:06:19 received packet: from 45.114.116.215[500] to 10.211.59.28[41302] (38 bytes)
16720-10-2019 20:06:19 parsed IKE_SA_INIT response 0 [ N(INVAL_KE) ]
16820-10-2019 20:06:19 peer didn't accept DH group ECP_256, it requested MODP_2048
16920-10-2019 20:06:19 initiating IKE_SA android[2] to 45.114.116.215
17020-10-2019 20:06:19 generating IKE_SA_INIT request 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) N(FRAG_SUP) N(HASH_ALG) N(REDIR_SUP) ]
17120-10-2019 20:06:19 sending packet: from 10.211.59.28[41302] to 45.114.116.215[500] (908 bytes)
17220-10-2019 20:06:20 received packet: from 45.114.116.215[500] to 10.211.59.28[41302] (481 bytes)
17320-10-2019 20:06:20 parsed IKE_SA_INIT response 0 [ SA KE No N(NATD_S_IP) N(NATD_D_IP) CERTREQ N(FRAG_SUP) N(HASH_ALG) N(MULT_AUTH) ]
17420-10-2019 20:06:20 local host is behind NAT, sending keep alives
17520-10-2019 20:06:20 received cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
17620-10-2019 20:06:20 sending cert request for "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
17720-10-2019 20:06:20 authentication of 'C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name' (myself) with RSA_EMSA_PKCS1_SHA2_256 successful
17820-10-2019 20:06:20 sending end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name"
17920-10-2019 20:06:20 establishing CHILD_SA android{2}
18020-10-2019 20:06:20 generating IKE_AUTH request 1 [ IDi CERT N(INIT_CONTACT) CERTREQ IDr AUTH CPRQ(ADDR ADDR6 DNS DNS6) N(ESP_TFC_PAD_N) SA TSi TSr N(MOBIKE_SUP) N(NO_ADD_ADDR) N(MULT_AUTH) N(EAP_ONLY) N(MSG_ID_SYN_SUP) ]
18120-10-2019 20:06:20 splitting IKE message with length of 2228 bytes into 2 fragments
18220-10-2019 20:06:20 generating IKE_AUTH request 1 [ EF(1/2) ]
18320-10-2019 20:06:20 generating IKE_AUTH request 1 [ EF(2/2) ]
18420-10-2019 20:06:20 sending packet: from 10.211.59.28[38059] to 45.114.116.215[4500] (1368 bytes)
18520-10-2019 20:06:20 sending packet: from 10.211.59.28[38059] to 45.114.116.215[4500] (925 bytes)
18620-10-2019 20:06:22 received packet: from 45.114.116.215[4500] to 10.211.59.28[38059] (1248 bytes)
18720-10-2019 20:06:22 parsed IKE_AUTH response 1 [ EF(1/2) ]
18820-10-2019 20:06:22 received fragment #1 of 2, waiting for complete IKE message
18920-10-2019 20:06:22 received packet: from 45.114.116.215[4500] to 10.211.59.28[38059] (548 bytes)
19020-10-2019 20:06:22 parsed IKE_AUTH response 1 [ EF(2/2) ]
19120-10-2019 20:06:22 received fragment #2 of 2, reassembling fragmented IKE message
19220-10-2019 20:06:22 parsed IKE_AUTH response 1 [ IDr CERT AUTH CPRP(ADDR DNS DNS DNS DNS) SA TSi TSr ]
19320-10-2019 20:06:22 received end entity cert "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
19420-10-2019 20:06:22 using certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
19520-10-2019 20:06:22 using trusted ca certificate "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=HideMy.name CA, E=feedback@hidemy.name"
19620-10-2019 20:06:22 checking certificate status of "C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=server, E=feedback@hidemy.name"
19720-10-2019 20:06:22 certificate status is not available
19820-10-2019 20:06:22 reached self-signed root ca with a path length of 0
19920-10-2019 20:06:22 authentication of 'server' with RSA_EMSA_PKCS1_SHA2_256 successful
20020-10-2019 20:06:22 IKE_SA android[2] established between 10.211.59.28[C=DE, ST=Bayern, L=Gunzenhausen, O=HideMy.name, CN=hideme_722151225013658, E=feedback@hidemy.name]...45.114.116.215[server]
20120-10-2019 20:06:22 scheduling rekeying in 35527s
20220-10-2019 20:06:22 maximum IKE_SA lifetime 36127s
20320-10-2019 20:06:22 installing DNS server 8.8.8.8
20420-10-2019 20:06:22 installing DNS server 8.8.4.4
20520-10-2019 20:06:22 installing DNS server 8.8.8.8
20620-10-2019 20:06:22 installing DNS server 8.8.4.4
20720-10-2019 20:06:22 installing new virtual IP 10.111.112.6
20820-10-2019 20:06:22 CHILD_SA android{2} established with SPIs 0813bc67_i c5120662_o and TS 10.111.112.6/32 === 0.0.0.0/0
20920-10-2019 20:06:22 setting up TUN device for CHILD_SA android{2}
21020-10-2019 20:06:22 successfully created TUN device
21120-10-2019 20:06:24 Obtaining IP address
21220-10-2019 20:06:24 Obtaining IP address
21320-10-2019 20:06:42 Obtaining location
21420-10-2019 20:06:42 Current IP received : 45.114.116.192;45.114.116.192
21520-10-2019 20:06:45 Location received
21620-10-2019 20:06:45 Current location : Australia
21720-10-2019 20:06:52 null WARN: <-- HTTP FAILED: java.net.SocketTimeoutException: failed to connect to /10.117.0.1 (port 443) from /10.211.59.28 (port 42670) after 29999ms
21820-10-2019 20:07:13 Internal authentication is successful
21920-10-2019 20:07:19 Obtaining IP address
22020-10-2019 20:07:29 Obtaining location
22120-10-2019 20:07:29 Current IP received : 45.114.116.192;45.114.116.192
22220-10-2019 20:07:35 Location received
22320-10-2019 20:07:35 Current location : Australia
22420-10-2019 20:07:39 Obtaining IP address
22520-10-2019 20:07:39 Obtaining IP address
22620-10-2019 20:07:39 Obtaining IP address
22720-10-2019 20:07:39 Obtaining IP address
22820-10-2019 20:07:42 Obtaining IP address
22920-10-2019 20:07:43 Obtaining location
23020-10-2019 20:07:43 Current IP received : 45.114.116.192;45.114.116.192
23120-10-2019 20:07:44 Obtaining location
23220-10-2019 20:07:44 Current IP received : 45.114.116.192;45.114.116.192
23320-10-2019 20:07:46 Obtaining location
23420-10-2019 20:07:46 Current IP received : 45.114.116.192;45.114.116.192
23520-10-2019 20:07:47 Location received
23620-10-2019 20:07:47 Current location : Australia
23720-10-2019 20:07:48 Location received
23820-10-2019 20:07:48 Current location : Australia
23920-10-2019 20:07:49 Location received
24020-10-2019 20:07:49 Current location : Australia
24120-10-2019 20:07:53 Obtaining IP address
24220-10-2019 20:07:54 Background loading servers
24320-10-2019 20:08:00 Obtaining location
24420-10-2019 20:08:00 Current IP received : 45.114.116.192;45.114.116.192
24520-10-2019 20:08:02 Servers list received
24620-10-2019 20:08:03 Location received
24720-10-2019 20:08:03 Current location : Australia
24820-10-2019 20:08:19 Obtaining IP address
24920-10-2019 20:08:19 Obtaining IP address
25020-10-2019 20:08:19 Obtaining IP address
25120-10-2019 20:08:19 Obtaining IP address
25220-10-2019 20:08:22 Obtaining location
25320-10-2019 20:08:22 Current IP received : 45.114.116.192;45.114.116.192
25420-10-2019 20:08:24 Location received
25520-10-2019 20:08:24 Current location : Australia
25620-10-2019 20:08:26 Obtaining location
25720-10-2019 20:08:26 Current IP received : 45.114.116.192;45.114.116.192