A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)
GNU General Public License v3.0
622
stars
193
forks
source link
There is a problem starting openvpn. Please, check nohup.out for details ( a little different then previous ones) #88
2020-11-29 22:34:47 UDP link local: (not bound)
2020-11-29 22:34:47 UDP link remote: [AF_INET]192.99.37.222:25000
2020-11-29 22:34:47 TLS: Initial packet from [AF_INET]192.99.37.222:25000, sid=724f2f12 a7d3c9cb
2020-11-29 22:34:47 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-29 22:34:47 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
2020-11-29 22:34:47 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
2020-11-29 22:34:49 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2020-11-29 22:34:49 [vpnbook.com] Peer Connection Initiated with [AF_INET]192.99.37.222:25000
2020-11-29 22:34:50 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2020-11-29 22:34:50 AUTH: Received control message: AUTH_FAILED
2020-11-29 22:34:50 SIGTERM[soft,auth-failure] received, process exiting
2020-11-29 22:38:48 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2020-11-29 22:38:48 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2020-11-29 22:38:48 WARNING: file 'pass.txt' is group or others accessible
2020-11-29 22:38:48 OpenVPN 2.5.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Oct 28 2020
2020-11-29 22:38:48 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10
2020-11-29 22:38:48 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2020-11-29 22:38:48 TCP/UDP: Preserving recently used remote address: [AF_INET]198.27.69.198:53
2020-11-29 22:38:48 Socket Buffers: R=[212992->212992] S=[212992->212992]
2020-11-29 22:38:48 UDP link local: (not bound)
2020-11-29 22:38:48 UDP link remote: [AF_INET]198.27.69.198:53
2020-11-29 22:38:48 TLS: Initial packet from [AF_INET]198.27.69.198:53, sid=3937530d b8e28dd7
2020-11-29 22:38:48 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
2020-11-29 22:38:50 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
2020-11-29 22:38:50 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
2020-11-29 22:38:53 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2020-11-29 22:38:53 [vpnbook.com] Peer Connection Initiated with [AF_INET]198.27.69.198:53
2020-11-29 22:38:54 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2020-11-29 22:38:54 AUTH: Received control message: AUTH_FAILED
2020-11-29 22:38:54 SIGTERM[soft,auth-failure] received, process exiting
**** I have tried to go tot he website and copy new credentials into the pass.txt file or what not for vpn book. I have tried execute /opt/4nonimizer/vpn/vpnbook/vpn-get-pass.sh, as well. I even tried a few silly stuff like updating and uninstalling and reinstalling. I have looked at most of the issues with this same title to no avail. Please help,,,,
2020-11-29 22:34:47 UDP link local: (not bound) 2020-11-29 22:34:47 UDP link remote: [AF_INET]192.99.37.222:25000 2020-11-29 22:34:47 TLS: Initial packet from [AF_INET]192.99.37.222:25000, sid=724f2f12 a7d3c9cb 2020-11-29 22:34:47 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2020-11-29 22:34:47 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2020-11-29 22:34:47 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2020-11-29 22:34:49 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA 2020-11-29 22:34:49 [vpnbook.com] Peer Connection Initiated with [AF_INET]192.99.37.222:25000 2020-11-29 22:34:50 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1) 2020-11-29 22:34:50 AUTH: Received control message: AUTH_FAILED 2020-11-29 22:34:50 SIGTERM[soft,auth-failure] received, process exiting 2020-11-29 22:38:48 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2020-11-29 22:38:48 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2020-11-29 22:38:48 WARNING: file 'pass.txt' is group or others accessible 2020-11-29 22:38:48 OpenVPN 2.5.0 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Oct 28 2020 2020-11-29 22:38:48 library versions: OpenSSL 1.1.1g 21 Apr 2020, LZO 2.10 2020-11-29 22:38:48 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. 2020-11-29 22:38:48 TCP/UDP: Preserving recently used remote address: [AF_INET]198.27.69.198:53 2020-11-29 22:38:48 Socket Buffers: R=[212992->212992] S=[212992->212992] 2020-11-29 22:38:48 UDP link local: (not bound) 2020-11-29 22:38:48 UDP link remote: [AF_INET]198.27.69.198:53 2020-11-29 22:38:48 TLS: Initial packet from [AF_INET]198.27.69.198:53, sid=3937530d b8e28dd7 2020-11-29 22:38:48 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this 2020-11-29 22:38:50 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2020-11-29 22:38:50 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2020-11-29 22:38:53 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA 2020-11-29 22:38:53 [vpnbook.com] Peer Connection Initiated with [AF_INET]198.27.69.198:53 2020-11-29 22:38:54 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1) 2020-11-29 22:38:54 AUTH: Received control message: AUTH_FAILED 2020-11-29 22:38:54 SIGTERM[soft,auth-failure] received, process exiting
**** I have tried to go tot he website and copy new credentials into the pass.txt file or what not for vpn book. I have tried execute /opt/4nonimizer/vpn/vpnbook/vpn-get-pass.sh, as well. I even tried a few silly stuff like updating and uninstalling and reinstalling. I have looked at most of the issues with this same title to no avail. Please help,,,,