A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)
GNU General Public License v3.0
621
stars
193
forks
source link
[+] There is a problem starting openvpn. Please, check nohup.out for details #94
[+] There is a problem starting openvpn. Please, check nohup.out for details
2021-08-02 18:07:11 AUTH: Received control message: AUTH_FAILED
2021-08-02 18:07:11 SIGTERM[soft,auth-failure] received, process exiting
2021-08-02 18:14:52 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2021-08-02 18:14:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2021-08-02 18:14:52 WARNING: file 'pass.txt' is group or others accessible
2021-08-02 18:14:52 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
2021-08-02 18:14:52 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
2021-08-02 18:14:52 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2021-08-02 18:14:52 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.180.4:25000
2021-08-02 18:14:52 Socket Buffers: R=[212992->212992] S=[212992->212992]
2021-08-02 18:14:52 UDP link local: (not bound)
2021-08-02 18:14:52 UDP link remote: [AF_INET]51.68.180.4:25000
2021-08-02 18:14:52 TLS: Initial packet from [AF_INET]51.68.180.4:25000, sid=fac2be26 f54cb538
2021-08-02 18:14:53 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
2021-08-02 18:14:53 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com
2021-08-02 18:14:55 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA
2021-08-02 18:14:55 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.180.4:25000
2021-08-02 18:14:56 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1)
2021-08-02 18:14:56 AUTH: Received control message: AUTH_FAILED
2021-08-02 18:14:56 SIGTERM[soft,auth-failure] received, process exiting
2021-08-02 18:36:33 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set.
2021-08-02 18:36:33 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning.
2021-08-02 18:36:33 WARNING: file 'pass.txt' is group or others accessible
2021-08-02 18:36:33 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021
2021-08-02 18:36:33 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10
2021-08-02 18:36:33 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
2021-08-02 18:36:33 TCP/UDP: Preserving recently used remote address: [AF_INET]37.187.158.97:53
2021-08-02 18:36:33 Socket Buffers: R=[212992->212992] S=[212992->212992]
2021-08-02 18:36:33 UDP link local: (not bound)
2021-08-02 18:36:33 UDP link remote: [AF_INET]37.187.158.97:53
[+] There is a problem starting openvpn. Please, check nohup.out for details
2021-08-02 18:07:11 AUTH: Received control message: AUTH_FAILED 2021-08-02 18:07:11 SIGTERM[soft,auth-failure] received, process exiting 2021-08-02 18:14:52 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2021-08-02 18:14:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2021-08-02 18:14:52 WARNING: file 'pass.txt' is group or others accessible 2021-08-02 18:14:52 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 2021-08-02 18:14:52 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 2021-08-02 18:14:52 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. 2021-08-02 18:14:52 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.180.4:25000 2021-08-02 18:14:52 Socket Buffers: R=[212992->212992] S=[212992->212992] 2021-08-02 18:14:52 UDP link local: (not bound) 2021-08-02 18:14:52 UDP link remote: [AF_INET]51.68.180.4:25000 2021-08-02 18:14:52 TLS: Initial packet from [AF_INET]51.68.180.4:25000, sid=fac2be26 f54cb538 2021-08-02 18:14:53 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2021-08-02 18:14:53 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2021-08-02 18:14:55 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA 2021-08-02 18:14:55 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.180.4:25000 2021-08-02 18:14:56 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1) 2021-08-02 18:14:56 AUTH: Received control message: AUTH_FAILED 2021-08-02 18:14:56 SIGTERM[soft,auth-failure] received, process exiting 2021-08-02 18:36:33 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2021-08-02 18:36:33 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2021-08-02 18:36:33 WARNING: file 'pass.txt' is group or others accessible 2021-08-02 18:36:33 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 2021-08-02 18:36:33 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 2021-08-02 18:36:33 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. 2021-08-02 18:36:33 TCP/UDP: Preserving recently used remote address: [AF_INET]37.187.158.97:53 2021-08-02 18:36:33 Socket Buffers: R=[212992->212992] S=[212992->212992] 2021-08-02 18:36:33 UDP link local: (not bound) 2021-08-02 18:36:33 UDP link remote: [AF_INET]37.187.158.97:53
please someone solve this issue