Hackplayers / 4nonimizer

A bash script for anonymizing the public IP used to browsing Internet, managing the connection to TOR network and to different VPNs providers (OpenVPN)
GNU General Public License v3.0
621 stars 193 forks source link

[+] There is a problem starting openvpn. Please, check nohup.out for details #94

Open webhoster03 opened 3 years ago

webhoster03 commented 3 years ago

[+] There is a problem starting openvpn. Please, check nohup.out for details

2021-08-02 18:07:11 AUTH: Received control message: AUTH_FAILED 2021-08-02 18:07:11 SIGTERM[soft,auth-failure] received, process exiting 2021-08-02 18:14:52 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2021-08-02 18:14:52 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2021-08-02 18:14:52 WARNING: file 'pass.txt' is group or others accessible 2021-08-02 18:14:52 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 2021-08-02 18:14:52 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 2021-08-02 18:14:52 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. 2021-08-02 18:14:52 TCP/UDP: Preserving recently used remote address: [AF_INET]51.68.180.4:25000 2021-08-02 18:14:52 Socket Buffers: R=[212992->212992] S=[212992->212992] 2021-08-02 18:14:52 UDP link local: (not bound) 2021-08-02 18:14:52 UDP link remote: [AF_INET]51.68.180.4:25000 2021-08-02 18:14:52 TLS: Initial packet from [AF_INET]51.68.180.4:25000, sid=fac2be26 f54cb538 2021-08-02 18:14:53 VERIFY OK: depth=1, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2021-08-02 18:14:53 VERIFY OK: depth=0, C=CH, ST=Zurich, L=Zurich, O=vpnbook.com, OU=IT, CN=vpnbook.com, name=vpnbook.com, emailAddress=admin@vpnbook.com 2021-08-02 18:14:55 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 1024 bit RSA 2021-08-02 18:14:55 [vpnbook.com] Peer Connection Initiated with [AF_INET]51.68.180.4:25000 2021-08-02 18:14:56 SENT CONTROL [vpnbook.com]: 'PUSH_REQUEST' (status=1) 2021-08-02 18:14:56 AUTH: Received control message: AUTH_FAILED 2021-08-02 18:14:56 SIGTERM[soft,auth-failure] received, process exiting 2021-08-02 18:36:33 WARNING: Compression for receiving enabled. Compression has been used in the past to break encryption. Sent packets are not compressed unless "allow-compression yes" is also set. 2021-08-02 18:36:33 DEPRECATED OPTION: --cipher set to 'AES-128-CBC' but missing in --data-ciphers (AES-256-GCM:AES-128-GCM). Future OpenVPN version will ignore --cipher for cipher negotiations. Add 'AES-128-CBC' to --data-ciphers or change --cipher 'AES-128-CBC' to --data-ciphers-fallback 'AES-128-CBC' to silence this warning. 2021-08-02 18:36:33 WARNING: file 'pass.txt' is group or others accessible 2021-08-02 18:36:33 OpenVPN 2.5.1 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2021 2021-08-02 18:36:33 library versions: OpenSSL 1.1.1k 25 Mar 2021, LZO 2.10 2021-08-02 18:36:33 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info. 2021-08-02 18:36:33 TCP/UDP: Preserving recently used remote address: [AF_INET]37.187.158.97:53 2021-08-02 18:36:33 Socket Buffers: R=[212992->212992] S=[212992->212992] 2021-08-02 18:36:33 UDP link local: (not bound) 2021-08-02 18:36:33 UDP link remote: [AF_INET]37.187.158.97:53

please someone solve this issue