haugene / docker-transmission-openvpn

Docker container running Transmission torrent client with WebUI over an OpenVPN tunnel
GNU General Public License v3.0
4.15k stars 1.21k forks source link

Messes with Plex Container #1270

Closed otmpp closed 4 years ago

otmpp commented 4 years ago

Describe the problem

I am running this on openmediavault through the docker GUI. I have managed to get this image to work with my cyberghost VPN setting it as a custom VPN. I have set it up on its own network that I have created to try and make it independent from the rest of the computer. My only issue is that for some reason my Plex container can no longer be accessed well whenever I have downloaded something requiring me to restart it. It's network is done as host. This does not seem to affect any other containers whether they be done as host or bridge mode for network Add your docker run command

--cap-add=NET_ADMIN -d -p 9091:9091 -p 8888:8888 --dns 1.1.1.1 --sysctl net.ipv6.conf.all.disable_ipv6=1

Logs `STARTING TRANSMISSION NO PORT UPDATER FOR THIS PROVIDER Transmission startup script complete. STARTING TINYPROXY Found config file /etc/tinyproxy/tinyproxy.conf, updating settings. Setting tinyproxy port to 8888 Starting Tinyproxy lightweight HTTP proxy daemon: tinyproxy. Tinyproxy startup script complete. Sat Jun 27 17:33:16 2020 us=344040 /sbin/ip route add 190.*../32 via 172.17.0.1 Sat Jun 27 17:33:16 2020 us=346079 /sbin/ip route add 0.0.0.0/1 via 10.203.3.1 Sat Jun 27 17:33:16 2020 us=347893 /sbin/ip route add 128.0.0.0/1 via 10.203.3.1 Sat Jun 27 17:33:16 2020 us=349671 WARNING: OpenVPN was configured to add an IPv6 route over tun0. However, no IPv6 has been configured for this interface, therefore the route installation may fail or may not work as expected. Sat Jun 27 17:33:16 2020 us=349744 Initialization Sequence Completed Sat Jun 27 17:33:39 2020 us=453847 event_wait : Interrupted system call (code=4) Sat Jun 27 17:33:39 2020 us=453895 SIGTERM received, sending exit notification to peer Sat Jun 27 17:33:41 2020 us=430834 TCP/UDP: Closing socket Sat Jun 27 17:33:41 2020 us=430935 /sbin/ip route del 190..*./32 Sat Jun 27 17:33:41 2020 us=432923 /sbin/ip route del 0.0.0.0/1 Sat Jun 27 17:33:41 2020 us=434770 /sbin/ip route del 128.0.0.0/1 Sat Jun 27 17:33:41 2020 us=436684 Closing TUN/TAP interface Sat Jun 27 17:33:41 2020 us=436757 /sbin/ip addr del dev tun0 10.203.3.245/24 Sat Jun 27 17:33:41 2020 us=467289 /etc/openvpn/tunnelDown.sh tun0 1500 1572 10.203.3.245 255.255.255.0 init Sat Jun 27 17:33:41 2020 us=478722 SIGTERM[soft,exit-with-notification] received, process exiting Using OpenVPN provider: cyberghost No VPN configuration provided. Using default. Setting OPENVPN credentials... adding route to local network 192.168.0.0/24 via 172.17.0.1 dev eth0 Sat Jun 27 17:33:45 2020 us=400579 WARNING: file '/etc/openvpn/cyberghost/client.key' is group or others accessible Sat Jun 27 17:33:45 2020 us=400677 Current Parameter Settings: Sat Jun 27 17:33:45 2020 us=400690 config = '/etc/openvpn/cyberghost/default.ovpn' Sat Jun 27 17:33:45 2020 us=400700 mode = 0 Sat Jun 27 17:33:45 2020 us=400716 persist_config = DISABLED Sat Jun 27 17:33:45 2020 us=400726 persist_mode = 1 Sat Jun 27 17:33:45 2020 us=400768 show_ciphers = DISABLED Sat Jun 27 17:33:45 2020 us=400805 show_digests = DISABLED Sat Jun 27 17:33:45 2020 us=400831 show_engines = DISABLED Sat Jun 27 17:33:45 2020 us=400856 genkey = DISABLED Sat Jun 27 17:33:45 2020 us=400869 key_pass_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=400878 show_tls_ciphers = DISABLED Sat Jun 27 17:33:45 2020 us=400890 connect_retry_max = 0 Sat Jun 27 17:33:45 2020 us=400902 Connection profiles [0]: Sat Jun 27 17:33:45 2020 us=400913 proto = udp Sat Jun 27 17:33:45 2020 us=400924 local = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=400932 local_port = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=400943 remote = '87-1-nl.cg-dialup.net' Sat Jun 27 17:33:45 2020 us=400952 remote_port = '443' Sat Jun 27 17:33:45 2020 us=400962 remote_float = DISABLED Sat Jun 27 17:33:45 2020 us=400971 bind_defined = DISABLED Sat Jun 27 17:33:45 2020 us=400982 bind_local = DISABLED Sat Jun 27 17:33:45 2020 us=400991 bind_ipv6_only = DISABLED Sat Jun 27 17:33:45 2020 us=401002 connect_retry_seconds = 5 Sat Jun 27 17:33:45 2020 us=401011 connect_timeout = 120 Sat Jun 27 17:33:45 2020 us=401022 socks_proxy_server = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401031 socks_proxy_port = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401042 tun_mtu = 1500 Sat Jun 27 17:33:45 2020 us=401051 tun_mtu_defined = ENABLED Sat Jun 27 17:33:45 2020 us=401062 link_mtu = 1500 Sat Jun 27 17:33:45 2020 us=401070 link_mtu_defined = DISABLED Sat Jun 27 17:33:45 2020 us=401082 tun_mtu_extra = 0 Sat Jun 27 17:33:45 2020 us=401090 tun_mtu_extra_defined = DISABLED Sat Jun 27 17:33:45 2020 us=401102 mtu_discover_type = -1 Sat Jun 27 17:33:45 2020 us=401111 fragment = 0 Sat Jun 27 17:33:45 2020 us=401122 mssfix = 1450 Sat Jun 27 17:33:45 2020 us=401130 explicit_exit_notification = 2 Sat Jun 27 17:33:45 2020 us=401142 Connection profiles END Sat Jun 27 17:33:45 2020 us=401150 remote_random = DISABLED Sat Jun 27 17:33:45 2020 us=401162 ipchange = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401171 dev = 'tun' Sat Jun 27 17:33:45 2020 us=401182 dev_type = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401190 dev_node = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401202 lladdr = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401210 topology = 1 Sat Jun 27 17:33:45 2020 us=401221 ifconfig_local = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401230 ifconfig_remote_netmask = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401241 ifconfig_noexec = DISABLED Sat Jun 27 17:33:45 2020 us=401250 ifconfig_nowarn = DISABLED Sat Jun 27 17:33:45 2020 us=401260 ifconfig_ipv6_local = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401269 ifconfig_ipv6_netbits = 0 Sat Jun 27 17:33:45 2020 us=401280 ifconfig_ipv6_remote = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401289 shaper = 0 Sat Jun 27 17:33:45 2020 us=401300 mtu_test = 0 Sat Jun 27 17:33:45 2020 us=401309 mlock = DISABLED Sat Jun 27 17:33:45 2020 us=401320 keepalive_ping = 0 Sat Jun 27 17:33:45 2020 us=401329 keepalive_timeout = 0 Sat Jun 27 17:33:45 2020 us=401340 inactivity_timeout = 3600 Sat Jun 27 17:33:45 2020 us=401349 ping_send_timeout = 5 Sat Jun 27 17:33:45 2020 us=401359 ping_rec_timeout = 60 Sat Jun 27 17:33:45 2020 us=401368 ping_rec_timeout_action = 1 Sat Jun 27 17:33:45 2020 us=401378 ping_timer_remote = ENABLED Sat Jun 27 17:33:45 2020 us=401387 remap_sigusr1 = 0 Sat Jun 27 17:33:45 2020 us=401396 persist_tun = ENABLED Sat Jun 27 17:33:45 2020 us=401410 persist_local_ip = DISABLED Sat Jun 27 17:33:45 2020 us=401421 persist_remote_ip = DISABLED Sat Jun 27 17:33:45 2020 us=401430 persist_key = ENABLED Sat Jun 27 17:33:45 2020 us=401442 passtos = DISABLED Sat Jun 27 17:33:45 2020 us=401451 resolve_retry_seconds = 1000000000 Sat Jun 27 17:33:45 2020 us=401461 resolve_in_advance = DISABLED Sat Jun 27 17:33:45 2020 us=401470 username = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401479 groupname = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401490 chroot_dir = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401499 cd_dir = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401507 writepid = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401518 up_script = '/etc/openvpn/tunnelUp.sh' Sat Jun 27 17:33:45 2020 us=401527 down_script = '/etc/openvpn/tunnelDown.sh' Sat Jun 27 17:33:45 2020 us=401539 down_pre = DISABLED Sat Jun 27 17:33:45 2020 us=401548 up_restart = DISABLED Sat Jun 27 17:33:45 2020 us=401558 up_delay = ENABLED Sat Jun 27 17:33:45 2020 us=401567 daemon = DISABLED Sat Jun 27 17:33:45 2020 us=401578 inetd = 0 Sat Jun 27 17:33:45 2020 us=401587 log = DISABLED Sat Jun 27 17:33:45 2020 us=401598 suppress_timestamps = DISABLED Sat Jun 27 17:33:45 2020 us=401607 machine_readable_output = DISABLED Sat Jun 27 17:33:45 2020 us=401618 nice = 0 Sat Jun 27 17:33:45 2020 us=401627 verbosity = 4 Sat Jun 27 17:33:45 2020 us=401636 mute = 0 Sat Jun 27 17:33:45 2020 us=401647 gremlin = 0 Sat Jun 27 17:33:45 2020 us=401655 status_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401667 status_file_version = 1 Sat Jun 27 17:33:45 2020 us=401676 status_file_update_freq = 60 Sat Jun 27 17:33:45 2020 us=401687 occ = ENABLED Sat Jun 27 17:33:45 2020 us=401696 rcvbuf = 0 Sat Jun 27 17:33:45 2020 us=401706 sndbuf = 0 Sat Jun 27 17:33:45 2020 us=401715 mark = 0 Sat Jun 27 17:33:45 2020 us=401749 sockflags = 0 Sat Jun 27 17:33:45 2020 us=401759 fast_io = DISABLED Sat Jun 27 17:33:45 2020 us=401769 comp.alg = 0 Sat Jun 27 17:33:45 2020 us=401778 comp.flags = 0 Sat Jun 27 17:33:45 2020 us=401789 route_script = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401798 route_default_gateway = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401808 route_default_metric = 0 Sat Jun 27 17:33:45 2020 us=401817 route_noexec = DISABLED Sat Jun 27 17:33:45 2020 us=401828 route_delay = 5 Sat Jun 27 17:33:45 2020 us=401837 route_delay_window = 30 Sat Jun 27 17:33:45 2020 us=401847 route_delay_defined = ENABLED Sat Jun 27 17:33:45 2020 us=401856 route_nopull = DISABLED Sat Jun 27 17:33:45 2020 us=401866 route_gateway_via_dhcp = DISABLED Sat Jun 27 17:33:45 2020 us=401875 allow_pull_fqdn = DISABLED Sat Jun 27 17:33:45 2020 us=401886 [redirect_default_gateway local=0] Sat Jun 27 17:33:45 2020 us=401895 management_addr = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401906 management_port = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401915 management_user_pass = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401924 management_log_history_cache = 250 Sat Jun 27 17:33:45 2020 us=401935 management_echo_buffer_size = 100 Sat Jun 27 17:33:45 2020 us=401944 management_write_peer_info_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401953 management_client_user = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401962 management_client_group = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401971 management_flags = 0 Sat Jun 27 17:33:45 2020 us=401982 shared_secret_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=401991 key_direction = 0 Sat Jun 27 17:33:45 2020 us=402002 ciphername = 'AES-256-CBC' Sat Jun 27 17:33:45 2020 us=402011 ncp_enabled = DISABLED Sat Jun 27 17:33:45 2020 us=402021 ncp_ciphers = 'AES-256-GCM:AES-128-GCM' Sat Jun 27 17:33:45 2020 us=402030 authname = 'SHA256' Sat Jun 27 17:33:45 2020 us=402040 prng_hash = 'SHA1' Sat Jun 27 17:33:45 2020 us=402049 prng_nonce_secret_len = 16 Sat Jun 27 17:33:45 2020 us=402058 keysize = 0 Sat Jun 27 17:33:45 2020 us=402068 engine = DISABLED Sat Jun 27 17:33:45 2020 us=402078 replay = ENABLED Sat Jun 27 17:33:45 2020 us=402110 mute_replay_warnings = DISABLED Sat Jun 27 17:33:45 2020 us=402124 replay_window = 64 Sat Jun 27 17:33:45 2020 us=402133 replay_time = 15 Sat Jun 27 17:33:45 2020 us=402144 packet_id_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402153 use_iv = ENABLED Sat Jun 27 17:33:45 2020 us=402162 test_crypto = DISABLED Sat Jun 27 17:33:45 2020 us=402173 tls_server = DISABLED Sat Jun 27 17:33:45 2020 us=402182 tls_client = ENABLED Sat Jun 27 17:33:45 2020 us=402191 key_method = 2 Sat Jun 27 17:33:45 2020 us=402200 ca_file = '/etc/openvpn/cyberghost/ca.crt' Sat Jun 27 17:33:45 2020 us=402211 ca_path = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402220 dh_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402230 cert_file = '/etc/openvpn/cyberghost/client.crt' Sat Jun 27 17:33:45 2020 us=402241 extra_certs_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402250 priv_key_file = '/etc/openvpn/cyberghost/client.key' Sat Jun 27 17:33:45 2020 us=402260 pkcs12_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402269 cipher_list = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402307 tls_verify = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402320 tls_export_cert = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402329 verify_x509_type = 0 Sat Jun 27 17:33:45 2020 us=402340 verify_x509_name = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402348 crl_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402357 ns_cert_type = 0 Sat Jun 27 17:33:45 2020 us=402369 remote_cert_ku[i] = 65535 Sat Jun 27 17:33:45 2020 us=402378 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402389 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402398 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402408 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402417 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402427 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402436 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402445 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402479 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402512 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402524 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402534 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402543 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402576 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402588 remote_cert_ku[i] = 0 Sat Jun 27 17:33:45 2020 us=402598 remote_cert_eku = 'TLS Web Server Authentication' Sat Jun 27 17:33:45 2020 us=402608 ssl_flags = 0 Sat Jun 27 17:33:45 2020 us=402617 tls_timeout = 2 Sat Jun 27 17:33:45 2020 us=402627 renegotiate_bytes = -1 Sat Jun 27 17:33:45 2020 us=402636 renegotiate_packets = 0 Sat Jun 27 17:33:45 2020 us=402645 renegotiate_seconds = 3600 Sat Jun 27 17:33:45 2020 us=402675 handshake_window = 60 Sat Jun 27 17:33:45 2020 us=402702 transition_window = 3600 Sat Jun 27 17:33:45 2020 us=402733 single_session = DISABLED Sat Jun 27 17:33:45 2020 us=402766 push_peer_info = DISABLED Sat Jun 27 17:33:45 2020 us=402779 tls_exit = DISABLED Sat Jun 27 17:33:45 2020 us=402788 tls_auth_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402800 tls_crypt_file = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=402812 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402824 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402835 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402846 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402857 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402868 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402879 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402888 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402912 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402936 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402960 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402986 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=402999 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=403008 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=403019 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=403028 pkcs11_protected_authentication = DISABLED Sat Jun 27 17:33:45 2020 us=403039 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403048 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403074 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403087 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403097 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403107 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403120 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403131 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403140 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403178 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403208 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403232 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403256 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403269 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403278 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403288 pkcs11_private_mode = 00000000 Sat Jun 27 17:33:45 2020 us=403300 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403308 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403320 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403330 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403341 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403353 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403364 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403375 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403385 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403394 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403404 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403413 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403422 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403431 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403441 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403452 pkcs11_cert_private = DISABLED Sat Jun 27 17:33:45 2020 us=403462 pkcs11_pin_cache_period = -1 Sat Jun 27 17:33:45 2020 us=403471 pkcs11_id = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403483 pkcs11_id_management = DISABLED Sat Jun 27 17:33:45 2020 us=403493 server_network = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403503 server_netmask = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403519 server_network_ipv6 = :: Sat Jun 27 17:33:45 2020 us=403529 server_netbits_ipv6 = 0 Sat Jun 27 17:33:45 2020 us=403538 server_bridge_ip = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403550 server_bridge_netmask = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403561 server_bridge_pool_start = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403570 server_bridge_pool_end = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403581 ifconfig_pool_defined = DISABLED Sat Jun 27 17:33:45 2020 us=403591 ifconfig_pool_start = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403602 ifconfig_pool_end = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403614 ifconfig_pool_netmask = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403623 ifconfig_pool_persist_filename = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403635 ifconfig_pool_persist_refresh_freq = 600 Sat Jun 27 17:33:45 2020 us=403643 ifconfig_ipv6_pool_defined = DISABLED Sat Jun 27 17:33:45 2020 us=403672 ifconfig_ipv6_pool_base = :: Sat Jun 27 17:33:45 2020 us=403689 ifconfig_ipv6_pool_netbits = 0 Sat Jun 27 17:33:45 2020 us=403701 n_bcast_buf = 256 Sat Jun 27 17:33:45 2020 us=403713 tcp_queue_limit = 64 Sat Jun 27 17:33:45 2020 us=403725 real_hash_size = 256 Sat Jun 27 17:33:45 2020 us=403734 virtual_hash_size = 256 Sat Jun 27 17:33:45 2020 us=403744 client_connect_script = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403755 learn_address_script = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403767 client_disconnect_script = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403778 client_config_dir = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403789 ccd_exclusive = DISABLED Sat Jun 27 17:33:45 2020 us=403798 tmp_dir = '/tmp' Sat Jun 27 17:33:45 2020 us=403806 push_ifconfig_defined = DISABLED Sat Jun 27 17:33:45 2020 us=403818 push_ifconfig_local = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403828 push_ifconfig_remote_netmask = 0.0.0.0 Sat Jun 27 17:33:45 2020 us=403838 push_ifconfig_ipv6_defined = DISABLED Sat Jun 27 17:33:45 2020 us=403851 push_ifconfig_ipv6_local = ::/0 Sat Jun 27 17:33:45 2020 us=403860 push_ifconfig_ipv6_remote = :: Sat Jun 27 17:33:45 2020 us=403871 enable_c2c = DISABLED Sat Jun 27 17:33:45 2020 us=403880 duplicate_cn = DISABLED Sat Jun 27 17:33:45 2020 us=403892 cf_max = 0 Sat Jun 27 17:33:45 2020 us=403901 cf_per = 0 Sat Jun 27 17:33:45 2020 us=403931 max_clients = 1024 Sat Jun 27 17:33:45 2020 us=403944 max_routes_per_client = 256 Sat Jun 27 17:33:45 2020 us=403953 auth_user_pass_verify_script = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=403964 auth_user_pass_verify_script_via_file = DISABLED Sat Jun 27 17:33:45 2020 us=403976 auth_token_generate = DISABLED Sat Jun 27 17:33:45 2020 us=403987 auth_token_lifetime = 0 Sat Jun 27 17:33:45 2020 us=403996 port_share_host = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=404007 port_share_port = '[UNDEF]' Sat Jun 27 17:33:45 2020 us=404019 client = ENABLED Sat Jun 27 17:33:45 2020 us=404030 pull = ENABLED Sat Jun 27 17:33:45 2020 us=404042 auth_user_pass_file = '/config/openvpn-credentials.txt' Sat Jun 27 17:33:45 2020 us=404054 OpenVPN 2.4.4 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 14 2019 Sat Jun 27 17:33:45 2020 us=404070 library versions: OpenSSL 1.1.1 11 Sep 2018, LZO 2.08 Sat Jun 27 17:33:45 2020 us=404247 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts Sat Jun 27 17:33:45 2020 us=404886 Control Channel MTU parms [ L:1621 D:1212 EF:38 EB:0 ET:0 EL:3 ] Sat Jun 27 17:33:45 2020 us=435275 Data Channel MTU parms [ L:1621 D:1450 EF:121 EB:406 ET:0 EL:3 ] Sat Jun 27 17:33:45 2020 us=435328 Local Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-client' Sat Jun 27 17:33:45 2020 us=435341 Expected Remote Options String (VER=V4): 'V4,dev-type tun,link-mtu 1569,tun-mtu 1500,proto UDPv4,cipher AES-256-CBC,auth SHA256,keysize 256,key-method 2,tls-server' Sat Jun 27 17:33:45 2020 us=435355 TCP/UDP: Preserving recently used remote address: [AF_INET]190.*..:443 Sat Jun 27 17:33:45 2020 us=435383 Socket Buffers: R=[212992->212992] S=[212992->212992] Sat Jun 27 17:33:45 2020 us=435397 UDP link local: (not bound) Sat Jun 27 17:33:45 2020 us=435408 UDP link remote: [AF_INET]190...:443 Sat Jun 27 17:33:45 2020 us=470134 TLS: Initial packet from [AF_INET]190...:443, sid=8879fdf6 2672aae7 Sat Jun 27 17:33:45 2020 us=470257 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this Sat Jun 27 17:33:45 2020 us=513023 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 17:33:45 2020 us=513384 VERIFY KU OK Sat Jun 27 17:33:45 2020 us=513404 Validating certificate extended key usage Sat Jun 27 17:33:45 2020 us=513415 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 17:33:45 2020 us=513428 VERIFY EKU OK Sat Jun 27 17:33:45 2020 us=513437 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 17:33:45 2020 us=681657 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 17:33:45 2020 us=681706 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 17:33:45 2020 us=681719 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 17:33:45 2020 us=681731 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 17:33:45 2020 us=681800 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 17:33:45 2020 us=681827 [amsterdam-rack404.nodes.gen4.ninja] Peer Connection Initiated with [AF_INET]190..*.:443 Sat Jun 27 17:33:46 2020 us=764997 SENT CONTROL [amsterdam-rack404.nodes.gen4.ninja]: 'PUSH_REQUEST' (status=1) Sat Jun 27 17:33:46 2020 us=799491 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,route-ipv6 2000::/3,dhcp-option DNS 10.101.0.243,route-gateway 10.203.3.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.203.3.245 255.255.255.0,peer-id 7' Sat Jun 27 17:33:46 2020 us=799630 OPTIONS IMPORT: timers and/or timeouts modified Sat Jun 27 17:33:46 2020 us=799658 OPTIONS IMPORT: --ifconfig/up options modified Sat Jun 27 17:33:46 2020 us=799673 OPTIONS IMPORT: route options modified Sat Jun 27 17:33:46 2020 us=799686 OPTIONS IMPORT: route-related options modified Sat Jun 27 17:33:46 2020 us=800051 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified Sat Jun 27 17:33:46 2020 us=800067 OPTIONS IMPORT: peer-id set Sat Jun 27 17:33:46 2020 us=800081 OPTIONS IMPORT: adjusting link_mtu to 1624 Sat Jun 27 17:33:46 2020 us=800108 Data Channel MTU parms [ L:1572 D:1450 EF:72 EB:406 ET:0 EL:3 ] Sat Jun 27 17:33:46 2020 us=800231 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 17:33:46 2020 us=800256 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 17:33:46 2020 us=800273 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 17:33:46 2020 us=800292 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 17:33:46 2020 us=800477 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:03 Sat Jun 27 17:33:46 2020 us=800509 GDG6: remote_host_ipv6=n/a Sat Jun 27 17:33:46 2020 us=800564 ROUTE6: default_gateway=UNDEF Sat Jun 27 17:33:46 2020 us=800585 OpenVPN ROUTE6: OpenVPN needs a gateway parameter for a --route-ipv6 option and no default was specified by either --route-ipv6-gateway or --ifconfig-ipv6 options Sat Jun 27 17:33:46 2020 us=800599 OpenVPN ROUTE: failed to parse/resolve route for host/network: 2000::/3 Sat Jun 27 17:33:46 2020 us=800881 TUN/TAP device tun0 opened Sat Jun 27 17:33:46 2020 us=800933 TUN/TAP TX queue length set to 100 Sat Jun 27 17:33:46 2020 us=800969 do_ifconfig, tt->did_ifconfig_ipv6_setup=0 Sat Jun 27 17:33:46 2020 us=800995 /sbin/ip link set dev tun0 up mtu 1500 Sat Jun 27 17:33:46 2020 us=803050 /sbin/ip addr add dev tun0 10.203.3.245/24 broadcast 10.203.3.255 Sat Jun 27 17:33:46 2020 us=804906 /etc/openvpn/tunnelUp.sh tun0 1500 1572 10.203.3.245 255.255.255.0 init Up script executed with tun0 1500 1572 10.203.3.245 255.255.255.0 init Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.203.3.245 Generating transmission settings.json from env variables sed'ing True to true Enforcing ownership on transmission config directories Applying permissions to transmission config directories Setting owner for transmission paths to 1000:100 Setting permission for files (644) and directories (755) Setting permission for watch directory (775) and its files (664)


Transmission will run as

User name: abc User uid: 1000 User gid: 100

STARTING TRANSMISSION NO PORT UPDATER FOR THIS PROVIDER Transmission startup script complete. STARTING TINYPROXY Found config file /etc/tinyproxy/tinyproxy.conf, updating settings. Setting tinyproxy port to 8888 Starting Tinyproxy lightweight HTTP proxy daemon: tinyproxy. Tinyproxy startup script complete. Sat Jun 27 17:33:51 2020 us=983297 /sbin/ip route add 190.*.*.32 via 172.17.0.1 Sat Jun 27 17:33:51 2020 us=985465 /sbin/ip route add 0.0.0.0/1 via 10.203.3.1 Sat Jun 27 17:33:51 2020 us=987291 /sbin/ip route add 128.0.0.0/1 via 10.203.3.1 Sat Jun 27 17:33:51 2020 us=989058 WARNING: OpenVPN was configured to add an IPv6 route over tun0. However, no IPv6 has been configured for this interface, therefore the route installation may fail or may not work as expected. Sat Jun 27 17:33:51 2020 us=989129 Initialization Sequence Completed Sat Jun 27 17:34:30 2020 us=657382 PID_ERR replay-window backtrack occurred [1] [SSL-0] [0_00000000000000000000000000000000000000011111111111111111111111] 0:354 0:353 t=1593275670[0] r=[-3,64,15,1,1] sl=[30,64,64,528] Sat Jun 27 17:34:56 2020 us=448089 PID_ERR replay-window backtrack occurred [2] [SSL-0] [00_0000000000000000000000000000000000000000000000000000000000000] 0:4870 0:4868 t=1593275696[0] r=[-4,64,15,2,1] sl=[58,64,64,528] Sat Jun 27 17:34:56 2020 us=451328 PID_ERR replay-window backtrack occurred [3] [SSL-0] [000_000000000000000000000000000000000000000000000000000000000000] 0:4878 0:4875 t=1593275696[0] r=[-4,64,15,3,1] sl=[50,64,64,528] Sat Jun 27 17:34:57 2020 us=541234 PID_ERR replay-window backtrack occurred [4] [SSL-0] [0000_00000000000000000000000000000000000000000000000000000000000] 0:5486 0:5482 t=1593275697[0] r=[0,64,15,4,1] sl=[18,64,64,528] Sat Jun 27 17:34:59 2020 us=478437 PID_ERR replay-window backtrack occurred [5] [SSL-0] [00000_0000000000000000000000000000000000000000000000000000000000] 0:7790 0:7785 t=1593275699[0] r=[-2,64,15,5,1] sl=[18,64,64,528] Sat Jun 27 17:35:00 2020 us=102111 PID_ERR replay-window backtrack occurred [7] [SSL-0] [0000000_00000000000000000000000000000000000000000000000000000000] 0:8858 0:8851 t=1593275700[0] r=[-3,64,15,7,1] sl=[38,64,64,528] Sat Jun 27 18:33:45 2020 us=14103 TLS: soft reset sec=0 bytes=621431904/-1 pkts=600112/0 Sat Jun 27 18:33:45 2020 us=246442 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 18:33:45 2020 us=246770 VERIFY KU OK Sat Jun 27 18:33:45 2020 us=246792 Validating certificate extended key usage Sat Jun 27 18:33:45 2020 us=246803 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 18:33:45 2020 us=246811 VERIFY EKU OK Sat Jun 27 18:33:45 2020 us=246820 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 18:33:45 2020 us=494583 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 18:33:45 2020 us=494650 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 18:33:45 2020 us=494662 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 18:33:45 2020 us=494672 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 18:33:45 2020 us=494794 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 18:33:45 2020 us=494819 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 18:33:45 2020 us=494830 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 18:33:45 2020 us=494842 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 18:33:45 2020 us=494920 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 18:34:45 2020 us=990547 PID_ERR replay-window backtrack occurred [1] [SSL-1] [0_0000000000000000000000000000000000011] 0:39 0:38 t=1593279285[0] r=[-1,64,15,1,1] sl=[25,39,64,528] Sat Jun 27 18:35:40 2020 us=878669 PID_ERR replay-window backtrack occurred [2] [SSL-1] [00__0000_0_0__0000000000000000000000000000000111111111] 0:2730 0:2728 t=1593279340[0] r=[-1,64,15,2,1] sl=[22,64,64,528] Sat Jun 27 18:37:36 2020 us=490092 PID_ERR replay-window backtrack occurred [3] [SSL-1] [00000000_000000000000000000000000000001111111111111111111111] 0:6605 0:6602 t=1593279456[0] r=[-2,64,15,3,1] sl=[51,64,64,528] Sat Jun 27 19:33:45 2020 us=138879 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 19:33:45 2020 us=139496 VERIFY KU OK Sat Jun 27 19:33:45 2020 us=139529 Validating certificate extended key usage Sat Jun 27 19:33:45 2020 us=139554 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 19:33:45 2020 us=139564 VERIFY EKU OK Sat Jun 27 19:33:45 2020 us=139575 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 19:33:45 2020 us=269096 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 19:33:45 2020 us=269164 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 19:33:45 2020 us=269187 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 19:33:45 2020 us=269207 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 19:33:45 2020 us=269363 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 19:33:45 2020 us=269390 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 19:33:45 2020 us=269408 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 19:33:45 2020 us=269428 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 19:33:45 2020 us=269502 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 20:33:45 2020 us=517941 TLS: soft reset sec=0 bytes=1352576/-1 pkts=4552/0 Sat Jun 27 20:33:45 2020 us=769232 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 20:33:45 2020 us=769733 VERIFY KU OK Sat Jun 27 20:33:45 2020 us=769765 Validating certificate extended key usage Sat Jun 27 20:33:45 2020 us=769782 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 20:33:45 2020 us=769796 VERIFY EKU OK Sat Jun 27 20:33:45 2020 us=769837 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 20:33:51 2020 us=256909 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 20:33:51 2020 us=256981 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 20:33:51 2020 us=257004 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 20:33:51 2020 us=257024 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 20:33:51 2020 us=257186 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 20:33:51 2020 us=257213 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 20:33:51 2020 us=257231 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 20:33:51 2020 us=257269 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 20:33:51 2020 us=257346 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 21:06:55 2020 us=594642 PID_ERR replay-window backtrack occurred [1] [SSL-3] [0_00000000000000000000000000000000000000000000000000000000000000] 0:5348 0:5347 t=1593288415[0] r=[-4,64,15,1,1] sl=[28,64,64,528] Sat Jun 27 21:07:36 2020 us=665808 PID_ERR replay-window backtrack occurred [2] [SSL-3] [00_0000000000000000000000000000000000000000000000000000000000000] 0:16023 0:16021 t=1593288456[0] r=[0,64,15,2,1] sl=[41,64,64,528] Sat Jun 27 21:33:45 2020 us=519395 TLS: tls_process: killed expiring key Sat Jun 27 21:33:52 2020 us=60107 TLS: soft reset sec=-1 bytes=175469648/-1 pkts=171844/0 Sat Jun 27 21:33:52 2020 us=196647 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 21:33:52 2020 us=197145 VERIFY KU OK Sat Jun 27 21:33:52 2020 us=197176 Validating certificate extended key usage Sat Jun 27 21:33:52 2020 us=197193 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 21:33:52 2020 us=197208 VERIFY EKU OK Sat Jun 27 21:33:52 2020 us=197222 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 21:33:52 2020 us=356163 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 21:33:52 2020 us=356219 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 21:33:52 2020 us=356242 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 21:33:52 2020 us=356261 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 21:33:52 2020 us=356414 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 21:33:52 2020 us=356442 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 21:33:52 2020 us=356459 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 21:33:52 2020 us=356479 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 21:33:52 2020 us=356583 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 22:26:07 2020 us=465023 PID_ERR replay-window backtrack occurred [2] [SSL-4] [0000000001112222999999>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:8455 0:8453 t=1593293167[0] r=[-2,64,15,2,1] sl=[57,64,64,528] Sat Jun 27 22:33:52 2020 us=937301 TLS: soft reset sec=0 bytes=11092156/-1 pkts=18384/0 Sat Jun 27 22:33:53 2020 us=14734 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 22:33:53 2020 us=15256 VERIFY KU OK Sat Jun 27 22:33:53 2020 us=15289 Validating certificate extended key usage Sat Jun 27 22:33:53 2020 us=15307 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 22:33:53 2020 us=15321 VERIFY EKU OK Sat Jun 27 22:33:53 2020 us=15342 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 22:33:53 2020 us=145720 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 22:33:53 2020 us=145776 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 22:33:53 2020 us=145799 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 22:33:53 2020 us=145819 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 22:33:53 2020 us=145972 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 22:33:53 2020 us=146002 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 22:33:53 2020 us=146020 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 22:33:53 2020 us=146039 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 22:33:53 2020 us=146109 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 22:37:33 2020 us=825336 PID_ERR replay-window backtrack occurred [2] [SSL-5] [00_0000001112>>>>>>>>>>>>>>>>>EEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEEE] 0:160 0:158 t=1593293853[0] r=[-2,64,15,2,1] sl=[32,64,64,528] Sat Jun 27 23:18:17 2020 us=986774 PIDERR replay-window backtrack occurred [3] [SSL-5] [0000000000000000000000000000000000000000000000000000000000000] 0:7913 0:7910 t=1593296297[0] r=[-4,64,15,3,1] sl=[23,64,64,528] Sat Jun 27 23:18:19 2020 us=601717 PID_ERR replay-window backtrack occurred [8] [SSL-5] [000000_0000000000000000000000000000000000000000000000000000000] 0:8401 0:8393 t=1593296299[0] r=[-1,64,15,8,1] sl=[47,64,64,528] Sat Jun 27 23:19:59 2020 us=351654 PID_ERR replay-window backtrack occurred [15] [SSL-5] [0000000000000000000000000000000000000000000000000000000000] 0:99237 0:99222 t=1593296399[0] r=[-1,64,15,15,1] sl=[27,64,64,528] Sat Jun 27 23:33:52 2020 us=3428 TLS: tls_process: killed expiring key Sat Jun 27 23:33:53 2020 us=4147 TLS: soft reset sec=0 bytes=923135848/-1 pkts=946347/0 Sat Jun 27 23:33:53 2020 us=233766 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sat Jun 27 23:33:53 2020 us=234266 VERIFY KU OK Sat Jun 27 23:33:53 2020 us=234296 Validating certificate extended key usage Sat Jun 27 23:33:53 2020 us=234315 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sat Jun 27 23:33:53 2020 us=234329 VERIFY EKU OK Sat Jun 27 23:33:53 2020 us=234343 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sat Jun 27 23:33:53 2020 us=370876 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sat Jun 27 23:33:53 2020 us=370937 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sat Jun 27 23:33:53 2020 us=370960 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sat Jun 27 23:33:53 2020 us=370980 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sat Jun 27 23:33:53 2020 us=371148 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 23:33:53 2020 us=371214 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 23:33:53 2020 us=371234 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sat Jun 27 23:33:53 2020 us=371256 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sat Jun 27 23:33:53 2020 us=371336 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sat Jun 27 23:39:29 2020 us=828353 PID_ERR replay-window backtrack occurred [1] [SSL-6] [0_00000000000000000000000000000000000000000000000000000000000000] 0:12101 0:12100 t=1593297569[0] r=[-1,64,15,1,1] sl=[59,64,64,528] Sat Jun 27 23:41:13 2020 us=507625 PID_ERR replay-window backtrack occurred [2] [SSL-6] [00_0000000000000000000000000000000000000000000011111111111111111] 0:19537 0:19535 t=1593297673[0] r=[0,64,15,2,1] sl=[47,64,64,528] Sun Jun 28 00:21:14 2020 us=9503 PID_ERR replay-window backtrack occurred [3] [SSL-6] [000_000001111111111111111111111111111111111111111111111111111111] 0:148861 0:148858 t=1593300074[0] r=[-1,64,15,3,1] sl=[3,64,64,528] Sun Jun 28 00:33:53 2020 us=59306 TLS: soft reset sec=0 bytes=182755684/-1 pkts=265285/0 Sun Jun 28 00:33:53 2020 us=141733 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 00:33:53 2020 us=142217 VERIFY KU OK Sun Jun 28 00:33:53 2020 us=142246 Validating certificate extended key usage Sun Jun 28 00:33:53 2020 us=142264 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 00:33:53 2020 us=142278 VERIFY EKU OK Sun Jun 28 00:33:53 2020 us=142292 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 00:33:53 2020 us=274082 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 00:33:53 2020 us=274142 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 00:33:53 2020 us=274166 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 00:33:53 2020 us=274195 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 00:33:53 2020 us=274348 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 00:33:53 2020 us=274375 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 00:33:53 2020 us=274393 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 00:33:53 2020 us=274413 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 00:33:53 2020 us=274487 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 00:37:59 2020 us=629602 PID_ERR replay-window backtrack occurred [1] [SSL-7] [0_01122233344555667778888899>>>>>>>>>>>>>>>>>>>EEEEEEEEEEEEEEEEE] 0:680 0:679 t=1593301079[0] r=[-1,64,15,1,1] sl=[24,64,64,528] Sun Jun 28 01:33:53 2020 us=78016 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 01:33:53 2020 us=78338 VERIFY KU OK Sun Jun 28 01:33:53 2020 us=78362 Validating certificate extended key usage Sun Jun 28 01:33:53 2020 us=78379 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 01:33:53 2020 us=78388 VERIFY EKU OK Sun Jun 28 01:33:53 2020 us=78396 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 01:33:53 2020 us=205146 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 01:33:53 2020 us=205192 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 01:33:53 2020 us=205206 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 01:33:53 2020 us=205217 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 01:33:53 2020 us=205323 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 01:33:53 2020 us=205342 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 01:33:53 2020 us=205353 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 01:33:53 2020 us=205369 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 01:33:53 2020 us=205417 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 01:44:34 2020 us=591697 PID_ERR replay-window backtrack occurred [1] [SSL-1] [0_0000000000000000000000001111111111111111233777888888>>>>>>>>>>] 0:235 0:234 t=1593305074[0] r=[-3,64,15,1,1] sl=[21,64,64,528] Sun Jun 28 01:44:41 2020 us=246244 PID_ERR replay-window backtrack occurred [2] [SSL-1] [00000000000000000000000000000000000000000000000000000000000000] 0:3925 0:3923 t=1593305081[0] r=[0,64,15,2,1] sl=[43,64,64,528] Sun Jun 28 01:45:23 2020 us=795572 PIDERR replay-window backtrack occurred [3] [SSL-1] [0000000000000000000000000000000000000000000000000000000000000] 0:41168 0:41165 t=1593305123[0] r=[-2,64,15,3,1] sl=[48,64,64,528] Sun Jun 28 01:48:46 2020 us=107436 PID_ERR replay-window backtrack occurred [7] [SSL-1] [000___00000000000000000000000000000000011111111111111111111111] 0:199115 0:199108 t=1593305326[0] r=[0,64,15,7,1] sl=[53,64,64,528] Sun Jun 28 01:53:03 2020 us=759726 PIDERR replay-window backtrack occurred [9] [SSL-1] [00000__000000000000000000000000000000000000000000000000000000] 0:413209 0:413200 t=1593305583[0] r=[-2,64,15,9,1] sl=[39,64,64,528] Sun Jun 28 02:33:52 2020 us=546844 TLS: tls_process: killed expiring key Sun Jun 28 02:33:53 2020 us=584820 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 02:33:53 2020 us=585635 VERIFY KU OK Sun Jun 28 02:33:53 2020 us=585672 Validating certificate extended key usage Sun Jun 28 02:33:53 2020 us=585690 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 02:33:53 2020 us=585705 VERIFY EKU OK Sun Jun 28 02:33:53 2020 us=585719 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 02:33:53 2020 us=722391 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 02:33:53 2020 us=722454 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 02:33:53 2020 us=722479 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 02:33:53 2020 us=722499 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 02:33:53 2020 us=722666 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 02:33:53 2020 us=722694 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 02:33:53 2020 us=722712 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 02:33:53 2020 us=722731 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 02:33:53 2020 us=722824 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 03:33:53 2020 us=879231 TLS: soft reset sec=0 bytes=2948236/-1 pkts=9634/0 Sun Jun 28 03:33:53 2020 us=956681 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 03:33:53 2020 us=957169 VERIFY KU OK Sun Jun 28 03:33:53 2020 us=957200 Validating certificate extended key usage Sun Jun 28 03:33:53 2020 us=957217 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 03:33:53 2020 us=957232 VERIFY EKU OK Sun Jun 28 03:33:53 2020 us=957246 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 03:33:54 2020 us=86817 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 03:33:54 2020 us=86880 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 03:33:54 2020 us=86903 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 03:33:54 2020 us=86922 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 03:33:54 2020 us=87090 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 03:33:54 2020 us=87115 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 03:33:54 2020 us=87145 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 03:33:54 2020 us=87188 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 03:33:54 2020 us=87270 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 04:33:53 2020 us=331337 TLS: tls_process: killed expiring key Sun Jun 28 04:33:54 2020 us=77801 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 04:33:54 2020 us=78302 VERIFY KU OK Sun Jun 28 04:33:54 2020 us=78332 Validating certificate extended key usage Sun Jun 28 04:33:54 2020 us=78350 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 04:33:54 2020 us=78364 VERIFY EKU OK Sun Jun 28 04:33:54 2020 us=78378 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 04:33:54 2020 us=204746 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 04:33:54 2020 us=204806 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 04:33:54 2020 us=204829 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 04:33:54 2020 us=204849 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 04:33:54 2020 us=205017 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 04:33:54 2020 us=205044 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 04:33:54 2020 us=205062 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 04:33:54 2020 us=205081 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 04:33:54 2020 us=205152 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 05:33:54 2020 us=3316 TLS: tls_process: killed expiring key Sun Jun 28 05:33:55 2020 us=70840 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 05:33:55 2020 us=71351 VERIFY KU OK Sun Jun 28 05:33:55 2020 us=71382 Validating certificate extended key usage Sun Jun 28 05:33:55 2020 us=71400 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 05:33:55 2020 us=71414 VERIFY EKU OK Sun Jun 28 05:33:55 2020 us=71430 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 05:33:55 2020 us=199552 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 05:33:55 2020 us=199605 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 05:33:55 2020 us=199628 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 05:33:55 2020 us=199649 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 05:33:55 2020 us=199801 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 05:33:55 2020 us=199828 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 05:33:55 2020 us=199846 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 05:33:55 2020 us=199866 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 05:33:55 2020 us=199940 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 06:33:54 2020 us=345851 TLS: tls_process: killed expiring key Sun Jun 28 06:33:55 2020 us=10497 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 06:33:55 2020 us=11005 VERIFY KU OK Sun Jun 28 06:33:55 2020 us=11035 Validating certificate extended key usage Sun Jun 28 06:33:55 2020 us=11052 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 06:33:55 2020 us=11066 VERIFY EKU OK Sun Jun 28 06:33:55 2020 us=11081 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 06:33:55 2020 us=180640 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 06:33:55 2020 us=180694 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 06:33:55 2020 us=180717 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 06:33:55 2020 us=180737 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 06:33:55 2020 us=180888 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 06:33:55 2020 us=180915 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 06:33:55 2020 us=180932 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 06:33:55 2020 us=180952 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 06:33:55 2020 us=181039 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 07:33:55 2020 us=178363 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 07:33:55 2020 us=178859 VERIFY KU OK Sun Jun 28 07:33:55 2020 us=178890 Validating certificate extended key usage Sun Jun 28 07:33:55 2020 us=178908 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 07:33:55 2020 us=178923 VERIFY EKU OK Sun Jun 28 07:33:55 2020 us=178938 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 07:33:55 2020 us=348811 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 07:33:55 2020 us=348866 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 07:33:55 2020 us=348889 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 07:33:55 2020 us=348909 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 07:33:55 2020 us=349077 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 07:33:55 2020 us=349104 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 07:33:55 2020 us=349122 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 07:33:55 2020 us=349141 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 07:33:55 2020 us=349212 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 08:33:55 2020 us=823152 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 08:33:55 2020 us=823660 VERIFY KU OK Sun Jun 28 08:33:55 2020 us=823691 Validating certificate extended key usage Sun Jun 28 08:33:55 2020 us=823708 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 08:33:55 2020 us=823723 VERIFY EKU OK Sun Jun 28 08:33:55 2020 us=823737 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 08:33:56 2020 us=7637 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 08:33:56 2020 us=7699 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 08:33:56 2020 us=7722 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 08:33:56 2020 us=7742 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 08:33:56 2020 us=7899 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 08:33:56 2020 us=7932 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 08:33:56 2020 us=7950 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 08:33:56 2020 us=7969 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 08:33:56 2020 us=8058 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 09:33:55 2020 us=681642 TLS: tls_process: killed expiring key Sun Jun 28 09:33:56 2020 us=149169 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 09:33:56 2020 us=149666 VERIFY KU OK Sun Jun 28 09:33:56 2020 us=149697 Validating certificate extended key usage Sun Jun 28 09:33:56 2020 us=149715 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 09:33:56 2020 us=149729 VERIFY EKU OK Sun Jun 28 09:33:56 2020 us=149743 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 09:33:56 2020 us=379182 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 09:33:56 2020 us=379246 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 09:33:56 2020 us=379269 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 09:33:56 2020 us=379290 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 09:33:56 2020 us=379447 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 09:33:56 2020 us=379475 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 09:33:56 2020 us=379493 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 09:33:56 2020 us=379513 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 09:33:56 2020 us=379585 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 10:33:55 2020 us=173630 TLS: tls_process: killed expiring key Sun Jun 28 10:33:56 2020 us=282860 TLS: soft reset sec=0 bytes=1170848/-1 pkts=4361/0 Sun Jun 28 10:33:56 2020 us=371892 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 10:33:56 2020 us=372374 VERIFY KU OK Sun Jun 28 10:33:56 2020 us=372404 Validating certificate extended key usage Sun Jun 28 10:33:56 2020 us=372421 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 10:33:56 2020 us=372435 VERIFY EKU OK Sun Jun 28 10:33:56 2020 us=372449 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 10:33:56 2020 us=498831 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 10:33:56 2020 us=498890 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 10:33:56 2020 us=498914 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 10:33:56 2020 us=498933 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 10:33:56 2020 us=499086 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 10:33:56 2020 us=499113 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 10:33:56 2020 us=499130 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 10:33:56 2020 us=499153 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 10:33:56 2020 us=499262 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 11:33:56 2020 us=385058 TLS: soft reset sec=0 bytes=1358836/-1 pkts=4700/0 Sun Jun 28 11:33:56 2020 us=492916 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 11:33:56 2020 us=493406 VERIFY KU OK Sun Jun 28 11:33:56 2020 us=493435 Validating certificate extended key usage Sun Jun 28 11:33:56 2020 us=493452 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 11:33:56 2020 us=493466 VERIFY EKU OK Sun Jun 28 11:33:56 2020 us=493480 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 11:33:56 2020 us=683346 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 11:33:56 2020 us=683402 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 11:33:56 2020 us=683426 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 11:33:56 2020 us=683446 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 11:33:56 2020 us=683603 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 11:33:56 2020 us=683627 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 11:33:56 2020 us=683644 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 11:33:56 2020 us=683664 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 11:33:56 2020 us=683734 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 12:33:56 2020 us=90295 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 12:33:56 2020 us=90787 VERIFY KU OK Sun Jun 28 12:33:56 2020 us=90818 Validating certificate extended key usage Sun Jun 28 12:33:56 2020 us=90835 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 12:33:56 2020 us=90849 VERIFY EKU OK Sun Jun 28 12:33:56 2020 us=90863 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 12:33:56 2020 us=307259 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 12:33:56 2020 us=307312 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 12:33:56 2020 us=307336 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 12:33:56 2020 us=307356 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 12:33:56 2020 us=307523 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 12:33:56 2020 us=307551 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 12:33:56 2020 us=307569 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 12:33:56 2020 us=307588 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 12:33:56 2020 us=307658 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA Sun Jun 28 13:33:55 2020 us=371504 TLS: tls_process: killed expiring key Sun Jun 28 13:33:56 2020 us=148363 VERIFY OK: depth=1, C=RO, L=Bucharest, O=CyberGhost S.A., CN=CyberGhost Root CA, emailAddress=info@cyberghost.ro Sun Jun 28 13:33:56 2020 us=148866 VERIFY KU OK Sun Jun 28 13:33:56 2020 us=148897 Validating certificate extended key usage Sun Jun 28 13:33:56 2020 us=148915 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication Sun Jun 28 13:33:56 2020 us=1489292.149.30/ VERIFY EKU OK Sun Jun 28 13:33:56 2020 us=148943 VERIFY OK: depth=0, CN=amsterdam-rack404.nodes.gen4.ninja Sun Jun 28 13:33:56 2020 us=359254 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1569', remote='link-mtu 1549' Sun Jun 28 13:33:56 2020 us=359315 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-128-GCM' Sun Jun 28 13:33:56 2020 us=359338 WARNING: 'auth' is used inconsistently, local='auth SHA256', remote='auth [null-digest]' Sun Jun 28 13:33:56 2020 us=359357 WARNING: 'keysize' is used inconsistently, local='keysize 256', remote='keysize 128' Sun Jun 28 13:33:56 2020 us=359513 Outgoing Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 13:33:56 2020 us=359540 Outgoing Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 13:33:56 2020 us=359557 Incoming Data Channel: Cipher 'AES-256-CBC' initialized with 256 bit key Sun Jun 28 13:33:56 2020 us=359577 Incoming Data Channel: Using 256 bit message hash 'SHA256' for HMAC authentication Sun Jun 28 13:33:56 2020 us=359661 Control Channel: TLSv1.3, cipher TLSv1.3 TLS_AES_256_GCM_SHA384, 4096 bit RSA`

Host system: Openmediavault (based on debian) Running on an X86 Computer Which version of Docker are you using? --> Docker Version: 19.03.6

pkishino commented 4 years ago

How is this supposed to "mess" with another container ? Looks more like something wrong with your docker setup or such

haugene commented 4 years ago

I agree. As long as the vpn container is not started with host networking, it should not affect anything else.

Being that containers are flexible beings there are other ways to force it to share some resources and then that could cause issues. Possibly. But that is not default behavior.

Your docker run command does not specify host mode, so that is good. It could be configured at the daemon level as well, so you could check that. But this sounds like a host/docker problem and not this container.

stale[bot] commented 4 years ago

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

stale[bot] commented 4 years ago

Feel free to re-open this issue if you think it deserves another look.