Hackplayers / 4nonimizer

A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)
GNU General Public License v3.0
612 stars 192 forks source link

hello 4nonimizer gives me this error. Can anybody help me? #69

Open Vickycri opened 5 years ago

Vickycri commented 5 years ago

[+] There is a problem starting openvpn. Please, check nohup.out for details

Wed Jul 3 17:31:59 2019 TCP_CLIENT link local: (not bound) Wed Jul 3 17:31:59 2019 TCP_CLIENT link remote: [AF_INET]5.62.62.136:443 Wed Jul 3 17:31:59 2019 TLS: Initial packet from [AF_INET]5.62.62.136:443, sid=34d3290e 401481f4 Wed Jul 3 17:31:59 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Jul 3 17:31:59 2019 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=info@privax.com Wed Jul 3 17:31:59 2019 VERIFY OK: nsCertType=SERVER Wed Jul 3 17:31:59 2019 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=info@privax.com Wed Jul 3 17:32:00 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Jul 3 17:32:00 2019 [server] Peer Connection Initiated with [AF_INET]5.62.62.136:443 Wed Jul 3 17:32:01 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed Jul 3 17:32:01 2019 AUTH: Received control message: AUTH_FAILED Wed Jul 3 17:32:01 2019 SIGTERM[soft,auth-failure] received, process exiting Wed Jul 3 17:40:54 2019 WARNING: file 'pass.txt' is group or others accessible Wed Jul 3 17:40:54 2019 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Feb 20 2019 Wed Jul 3 17:40:54 2019 library versions: OpenSSL 1.1.1c 28 May 2019, LZO 2.10 Wed Jul 3 17:40:54 2019 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead. Wed Jul 3 17:40:54 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]5.62.62.188:553 Wed Jul 3 17:40:54 2019 Socket Buffers: R=[212992->212992] S=[212992->212992] Wed Jul 3 17:40:54 2019 UDP link local: (not bound) Wed Jul 3 17:40:54 2019 UDP link remote: [AF_INET]5.62.62.188:553 Wed Jul 3 17:40:54 2019 TLS: Initial packet from [AF_INET]5.62.62.188:553, sid=be526b52 d6915717 Wed Jul 3 17:40:54 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Wed Jul 3 17:40:54 2019 VERIFY OK: depth=1, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=hidemyass.com, emailAddress=info@privax.com Wed Jul 3 17:40:54 2019 VERIFY OK: nsCertType=SERVER Wed Jul 3 17:40:54 2019 VERIFY OK: depth=0, C=UK, ST=London, L=London, O=Privax Ltd, OU=HMA Pro VPN, CN=server, emailAddress=info@privax.com Wed Jul 3 17:40:54 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA Wed Jul 3 17:40:54 2019 [server] Peer Connection Initiated with [AF_INET]5.62.62.188:553 Wed Jul 3 17:40:55 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) Wed Jul 3 17:40:56 2019 AUTH: Received control message: AUTH_FAILED Wed Jul 3 17:40:56 2019 SIGTERM[soft,auth-failure] received, process exiting