haugene / docker-transmission-openvpn

Docker container running Transmission torrent client with WebUI over an OpenVPN tunnel
GNU General Public License v3.0
4.15k stars 1.21k forks source link

NordVPN, DNS issues, trackers not announcing #1383

Closed Aekaz closed 4 years ago

Aekaz commented 4 years ago

First off, thank you for this awesome project & thank you for keeping it up to date! After running this for a few days, it seems I am running into problems which affect my downloads. As a non-IT guy, I've tried my best to solve my issues but I am coming to a standstill. Help would be greatly appreciated. Seeing as this is my first hand at any coding in docker, powershell or bash, a little bit more explanation how to get to certain commands/files/configs would be very much appreciated!

Describe the problem It seems that my docker container was working fine for a couple of days but after a couple of days, I seemed to be getting a lot of idle torrents with: "Announce error: could not connect to tracker"

Pinpointing this to DNS is because:

Timeline of these errors coincide more or less with when I started playing with hosting a reverse proxy through Caddy (native, not in a container) & duckdns (monday 28/9 & tuesday 29/9). Perhaps there is something interfering here.

With my limited knowledge, I find it odd that there could be an interference because I am running this docker, with both caddy & duckdns updater tool running on windows 10, however I would not be surprised.

PS: Timezone command for Amsterdam is 2 hours off vs actual time (2 hours earlier). Is this normal behaviour?

Add your docker run command NOTE: Ran in Powershell on Win10

docker run --cap-add=NET_ADMIN -d 
-v /E/Torrent/:/data 
-e tz=europe/amsterdam 
-e "CREATE_TUN_DEVICE=true" 
-e "OPENVPN_OPTS=--inactive 3600 --ping 10 --ping-exit 60" --restart="always" 
-e "OPENVPN_PROVIDER=NORDVPN" 
-e "NORDVPN_COUNTRY=NL" 
-e "NORDVPN_CATEGORY=P2P" 
-e "NORDVPN_PROTOCOL=tcp" 
-e "OPENVPN_USERNAME=username" 
-e "OPENVPN_PASSWORD=password" 
-e "WEBPROXY_ENABLED=false" 
-e "TRANSMISSION_MAX_PEERS_GLOBAL=20000" 
-e "TRANSMISSION_PEER_LIMIT_GLOBAL=20000" 
-e "TRANSMISSION_PEER_LIMIT_PER_TORRENT=5000" 
-e "TRANSMISSION_RPC_AUTHENTICATION_REQUIRED=true" 
-e "TRANSMISSION_RPC_HOST_WHITELIST=127.0.0.1,192.168.1.*" 
-e "TRANSMISSION_RPC_PASSWORD=Transmission PW" 
-e "TRANSMISSION_RPC_USERNAME=Transmssion UN" 
-e "TRANSMISSION_DOWNLOAD_QUEUE_SIZE=10" 
-e "TRANSMISSION_RATIO_LIMIT=0" 
-e "TRANSMISSION_RATIO_LIMIT_ENABLED=true" 
-e "LOCAL_NETWORK=192.168.1.0/24" 
--log-driver json-file 
--log-opt max-size=10m 
-p 9091:9091 
haugene/transmission-openvpn

Logs

Because this is my desktop and not a dedicated server I am stopping & stopping this service when I shut down the PC, hence the length of the log. apologies in advance if this is too much information.

Transmission

[2020-10-01 14:10:36.732] ***TORRENT_NAME*** Scrape error: Could not connect to tracker (announcer.c:1392)
[2020-10-01 14:10:36.732] ***TORRENT_NAME*** Retrying scrape in 3623 seconds. (announcer.c:1401)
[2020-10-01 14:10:42.736] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 376 nodes): Success (tr-dht.c:737)
[2020-10-01 14:10:45.740] Couldn't connect socket 41 to 2804:14c:5982:8f7e:48fd:edff:fe41:6239, port 54947 (errno 99 - Cannot assign requested address) (net.c:339)
[2020-10-01 14:10:48.740] Couldn't connect socket 46 to 2606:6080:1001:12:257a:8b87:f80d:7579, port 34772 (errno 99 - Cannot assign requested address) (net.c:339)
[2020-10-01 14:10:48.740] Couldn't connect socket 46 to 2a0d:5600:2:4:557:907e:7abb:8b73, port 46725 (errno 99 - Cannot assign requested address) (net.c:339)
[2020-10-01 14:10:51.742] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 376 nodes): Resource temporarily unavailable (tr-dht.c:737)
[2020-10-01 14:11:00.744] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 376 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:07.751] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 376 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:16.737] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 376 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:25.729] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:33.732] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:42.749] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:49.734] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:11:56.732] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:12:01.737] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:12:08.743] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:12:16.744] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:12:21.733] ***TORRENT_NAME*** IPv4 DHT announce failed (firewalled, 375 nodes): Success (tr-dht.c:737)
[2020-10-01 14:12:25.752] ***TORRENT_NAME*** Scrape error: Could not connect to tracker (announcer.c:1392)
[2020-10-01 14:12:25.752] ***TORRENT_NAME*** Retrying scrape in 3601 seconds. (announcer.c:1401)

[2020-10-01 18:37:40.699] Transmission 3.00 (bb6b5a062e) started (session.c:769)
[2020-10-01 18:37:40.699] RPC Server Adding address to whitelist: 127.0.0.1 (rpc-server.c:956)
[2020-10-01 18:37:40.699] RPC Server Adding address to whitelist: 192.168.1.* (rpc-server.c:956)
[2020-10-01 18:37:40.699] RPC Server Adding address to whitelist: 127.0.0.1 (rpc-server.c:956)
[2020-10-01 18:37:40.699] RPC Server Serving RPC and Web requests on 0.0.0.0:9091/transmission/ (rpc-server.c:1243)
[2020-10-01 18:37:40.700] RPC Server Password required (rpc-server.c:1254)
[2020-10-01 18:37:40.700] Port Forwarding Stopped (port-forwarding.c:196)
[2020-10-01 18:37:40.700] DHT Reusing old id (tr-dht.c:383)
[2020-10-01 18:37:40.700] DHT Bootstrapping from 216 IPv4 nodes (tr-dht.c:172)
[2020-10-01 18:37:40.700] Using settings from "/data/transmission-home" (daemon.c:646)
[2020-10-01 18:37:40.700] Saved "/data/transmission-home/settings.json" (variant.c:1221)
[2020-10-01 18:37:40.700] transmission-daemon requiring authentication (daemon.c:674)
[2020-10-01 18:37:40.700] Watching "/data/watch" for new .torrent files (daemon.c:698)
[2020-10-01 18:37:40.700] Loaded 1 torrents (session.c:2170)
[2020-10-01 18:37:40.701] web will verify tracker certs using envvar CURL_CA_BUNDLE: none (web.c:455)
[2020-10-01 18:37:40.701] web NB: this only works if you built against libcurl with openssl or gnutls, NOT nss (web.c:457)
[2020-10-01 18:37:40.701] web NB: invalid certs will show up as 'Could not connect to tracker' like many other errors (web.c:458)
[2020-10-01 18:37:48.689] Searching for web interface file "/root/.local/share/transmission/web/index.html" (platform.c:472)
[2020-10-01 18:37:48.690] Searching for web interface file "/usr/share/transmission/web/index.html" (platform.c:472)
[2020-10-01 18:37:51.700] checkMyTorrentIp.png Could not connect to tracker (announcer.c:1085)
[2020-10-01 18:37:51.700] checkMyTorrentIp.png Retrying announce in 20 seconds. (announcer.c:1094)
[2020-10-01 18:37:55.705] checkMyTorrentIp.png Pausing (torrent.c:2022)
[2020-10-01 18:37:55.705] Saved "/data/transmission-home/resume/2fa71a2dbb7d53a39373a9c4e2c9d89aaa7a6db1.resume" (variant.c:1221)
[2020-10-01 18:38:05.688] checkMyTorrentIp.png Could not connect to tracker (announcer.c:1085)
[2020-10-01 18:38:05.688] checkMyTorrentIp.png Retrying announce in 321 seconds. (announcer.c:1094)
[2020-10-01 18:39:41.695] checkMyTorrentIp.png Scrape error: Could not connect to tracker (announcer.c:1392)
[2020-10-01 18:39:41.695] checkMyTorrentIp.png Retrying scrape in 905 seconds. (announcer.c:1401)
[2020-10-01 18:43:37.702] checkMyTorrentIp.png Could not connect to tracker (announcer.c:1085)
[2020-10-01 18:43:37.702] checkMyTorrentIp.png Retrying announce in 1807 seconds. (announcer.c:1094)
[2020-10-01 18:43:39.692] Saved "/data/transmission-home/resume/2fa71a2dbb7d53a39373a9c4e2c9d89aaa7a6db1.resume" (variant.c:1221)
[2020-10-01 18:55:01.702] checkMyTorrentIp.png Scrape error: Could not connect to tracker (announcer.c:1392)
[2020-10-01 18:55:01.703] checkMyTorrentIp.png Retrying scrape in 3616 seconds. (announcer.c:1401)
[2020-10-01 19:02:10.703] checkMyTorrentIp.png Pausing (torrent.c:2022)
[2020-10-01 19:02:10.703] Saved "/data/transmission-home/resume/2fa71a2dbb7d53a39373a9c4e2c9d89aaa7a6db1.resume" (variant.c:1221)
[2020-10-01 19:02:13.698] checkMyTorrentIp.png Pausing (torrent.c:2022)
[2020-10-01 19:02:13.698] Saved "/data/transmission-home/resume/2fa71a2dbb7d53a39373a9c4e2c9d89aaa7a6db1.resume" (variant.c:1221)
[2020-10-01 19:02:21.695] checkMyTorrentIp.png Could not connect to tracker (announcer.c:1085)
[2020-10-01 19:02:21.696] checkMyTorrentIp.png Retrying announce in 7248 seconds. (announcer.c:1094)
[2020-10-01 19:02:34.693] checkMyTorrentIp.png Could not connect to tracker (announcer.c:1085)
[2020-10-01 19:02:34.694] checkMyTorrentIp.png Retrying announce in 7201 seconds. (announcer.c:1094)
[2020-10-01 19:07:39.690] Saved "/data/transmission-home/resume/2fa71a2dbb7d53a39373a9c4e2c9d89aaa7a6db1.resume" (variant.c:1221)                                            

Docker

Using OpenVPN provider: NORDVPN
2020-09-26 17:29:09 Checking curl installation
2020-09-26 17:29:09 Removing existing configs
2020-09-26 17:29:09 Selecting the best server...
2020-09-26 17:29:09 Searching for group: legacy_p2p
2020-09-26 17:29:09 Searching for technology: openvpn_tcp
2020-09-26 17:29:09 Best server : nl741.nordvpn.com
2020-09-26 17:29:09 Downloading config: default.ovpn
2020-09-26 17:29:09 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl741.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2807  100  2807    0     0   4924      0 --:--:-- --:--:-- --:--:--  4915
2020-09-26 17:29:09 Selecting the best server...
2020-09-26 17:29:09 Searching for country : NL (153)
2020-09-26 17:29:09 Searching for group: legacy_p2p
2020-09-26 17:29:09 Searching for technology: openvpn_tcp
2020-09-26 17:29:09 Best server : nl741.nordvpn.com
2020-09-26 17:29:09 Downloading config: nl741.nordvpn.com.ovpn
2020-09-26 17:29:09 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl741.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2807  100  2807    0     0  90548      0 --:--:-- --:--:-- --:--:-- 90548
2020-09-26 17:29:09 Checking line endings
2020-09-26 17:29:09 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl741.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Sat Sep 26 17:29:11 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Sat Sep 26 17:29:11 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sat Sep 26 17:29:11 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sat Sep 26 17:29:11 2020 NOTE: --fast-io is disabled since we are not using UDP
Sat Sep 26 17:29:11 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sat Sep 26 17:29:11 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sat Sep 26 17:29:11 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.189.51:443
Sat Sep 26 17:29:11 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Sat Sep 26 17:29:11 2020 Attempting to establish TCP connection with [AF_INET]134.19.189.51:443 [nonblock]
Sat Sep 26 17:29:12 2020 TCP connection established with [AF_INET]134.19.189.51:443
Sat Sep 26 17:29:12 2020 TCP_CLIENT link local: (not bound)
Sat Sep 26 17:29:12 2020 TCP_CLIENT link remote: [AF_INET]134.19.189.51:443
Sat Sep 26 17:29:12 2020 TLS: Initial packet from [AF_INET]134.19.189.51:443, sid=63fcf8a2 74c3ae7f
Sat Sep 26 17:29:12 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Sep 26 17:29:12 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sat Sep 26 17:29:12 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sat Sep 26 17:29:12 2020 VERIFY KU OK
Sat Sep 26 17:29:12 2020 Validating certificate extended key usage
Sat Sep 26 17:29:12 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 26 17:29:12 2020 VERIFY EKU OK
Sat Sep 26 17:29:12 2020 VERIFY OK: depth=0, CN=nl741.nordvpn.com
Sat Sep 26 17:29:12 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sat Sep 26 17:29:12 2020 [nl741.nordvpn.com] Peer Connection Initiated with [AF_INET]134.19.189.51:443
Sat Sep 26 17:29:13 2020 SENT CONTROL [nl741.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Sat Sep 26 17:29:13 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: compression parms modified
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sat Sep 26 17:29:13 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: route options modified
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: route-related options modified
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: peer-id set
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Sat Sep 26 17:29:13 2020 OPTIONS IMPORT: data channel crypto options modified
Sat Sep 26 17:29:13 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Sat Sep 26 17:29:13 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 26 17:29:13 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 26 17:29:13 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Sat Sep 26 17:29:13 2020 TUN/TAP device tun0 opened
Sat Sep 26 17:29:13 2020 TUN/TAP TX queue length set to 100
Sat Sep 26 17:29:13 2020 /sbin/ip link set dev tun0 up mtu 1500
Sat Sep 26 17:29:13 2020 /sbin/ip addr add dev tun0 10.7.3.6/24 broadcast 10.7.3.255
Sat Sep 26 17:29:13 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.3.6 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.3.6 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.3.6
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Sat Sep 26 17:29:13 2020 /sbin/ip route add 134.19.189.51/32 via 172.17.0.1
Sat Sep 26 17:29:13 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.3.1
Sat Sep 26 17:29:13 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.3.1
Sat Sep 26 17:29:13 2020 Initialization Sequence Completed
Sat Sep 26 18:29:11 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sat Sep 26 18:29:11 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sat Sep 26 18:29:11 2020 VERIFY KU OK
Sat Sep 26 18:29:11 2020 Validating certificate extended key usage
Sat Sep 26 18:29:11 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sat Sep 26 18:29:11 2020 VERIFY EKU OK
Sat Sep 26 18:29:11 2020 VERIFY OK: depth=0, CN=nl741.nordvpn.com
Sat Sep 26 18:29:11 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 26 18:29:11 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sat Sep 26 18:29:11 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Using OpenVPN provider: NORDVPN
2020-09-27 15:06:44 Checking curl installation
2020-09-27 15:06:44 Removing existing configs
2020-09-27 15:06:44 Selecting the best server...
2020-09-27 15:06:44 Searching for group: legacy_p2p
2020-09-27 15:06:44 Searching for technology: openvpn_tcp
2020-09-27 15:06:44 Best server : nl853.nordvpn.com
2020-09-27 15:06:44 Downloading config: default.ovpn
2020-09-27 15:06:44 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl853.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2809  100  2809    0     0   4945      0 --:--:-- --:--:-- --:--:--  4936
2020-09-27 15:06:44 Selecting the best server...
2020-09-27 15:06:44 Searching for country : NL (153)
2020-09-27 15:06:44 Searching for group: legacy_p2p
2020-09-27 15:06:44 Searching for technology: openvpn_tcp
2020-09-27 15:06:44 Best server : nl853.nordvpn.com
2020-09-27 15:06:44 Downloading config: nl853.nordvpn.com.ovpn
2020-09-27 15:06:44 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl853.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2809  100  2809    0     0  54019      0 --:--:-- --:--:-- --:--:-- 54019
2020-09-27 15:06:44 Checking line endings
2020-09-27 15:06:44 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl853.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Sun Sep 27 15:06:46 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Sun Sep 27 15:06:46 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Sun Sep 27 15:06:46 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 27 15:06:46 2020 NOTE: --fast-io is disabled since we are not using UDP
Sun Sep 27 15:06:46 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Sep 27 15:06:46 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Sun Sep 27 15:06:46 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]194.127.172.106:443
Sun Sep 27 15:06:46 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Sun Sep 27 15:06:46 2020 Attempting to establish TCP connection with [AF_INET]194.127.172.106:443 [nonblock]
Sun Sep 27 15:06:47 2020 TCP connection established with [AF_INET]194.127.172.106:443
Sun Sep 27 15:06:47 2020 TCP_CLIENT link local: (not bound)
Sun Sep 27 15:06:47 2020 TCP_CLIENT link remote: [AF_INET]194.127.172.106:443
Sun Sep 27 15:06:47 2020 TLS: Initial packet from [AF_INET]194.127.172.106:443, sid=212c46f9 b01db009
Sun Sep 27 15:06:47 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sun Sep 27 15:06:47 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Sep 27 15:06:47 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sun Sep 27 15:06:47 2020 VERIFY KU OK
Sun Sep 27 15:06:47 2020 Validating certificate extended key usage
Sun Sep 27 15:06:47 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 27 15:06:47 2020 VERIFY EKU OK
Sun Sep 27 15:06:47 2020 VERIFY OK: depth=0, CN=nl853.nordvpn.com
Sun Sep 27 15:06:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Sep 27 15:06:47 2020 [nl853.nordvpn.com] Peer Connection Initiated with [AF_INET]194.127.172.106:443
Sun Sep 27 15:06:49 2020 SENT CONTROL [nl853.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Sun Sep 27 15:06:49 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.2.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.2.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: timers and/or timeouts modified
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: compression parms modified
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Sun Sep 27 15:06:49 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: --ifconfig/up options modified
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: route options modified
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: route-related options modified
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: peer-id set
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Sun Sep 27 15:06:49 2020 OPTIONS IMPORT: data channel crypto options modified
Sun Sep 27 15:06:49 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Sun Sep 27 15:06:49 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 15:06:49 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 15:06:49 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Sun Sep 27 15:06:49 2020 TUN/TAP device tun0 opened
Sun Sep 27 15:06:49 2020 TUN/TAP TX queue length set to 100
Sun Sep 27 15:06:49 2020 /sbin/ip link set dev tun0 up mtu 1500
Sun Sep 27 15:06:49 2020 /sbin/ip addr add dev tun0 10.7.2.2/24 broadcast 10.7.2.255
Sun Sep 27 15:06:49 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.2.2 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.2.2 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.2.2
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Sun Sep 27 15:06:49 2020 /sbin/ip route add 194.127.172.106/32 via 172.17.0.1
Sun Sep 27 15:06:49 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.2.1
Sun Sep 27 15:06:49 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.2.1
Sun Sep 27 15:06:49 2020 Initialization Sequence Completed
Sun Sep 27 16:06:47 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Sep 27 16:06:47 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sun Sep 27 16:06:47 2020 VERIFY KU OK
Sun Sep 27 16:06:47 2020 Validating certificate extended key usage
Sun Sep 27 16:06:47 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 27 16:06:47 2020 VERIFY EKU OK
Sun Sep 27 16:06:47 2020 VERIFY OK: depth=0, CN=nl853.nordvpn.com
Sun Sep 27 16:06:47 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 16:06:47 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 16:06:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Sep 27 17:06:47 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Sep 27 17:06:47 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sun Sep 27 17:06:47 2020 VERIFY KU OK
Sun Sep 27 17:06:47 2020 Validating certificate extended key usage
Sun Sep 27 17:06:47 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 27 17:06:47 2020 VERIFY EKU OK
Sun Sep 27 17:06:47 2020 VERIFY OK: depth=0, CN=nl853.nordvpn.com
Sun Sep 27 17:06:47 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 17:06:47 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 17:06:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Sep 27 18:06:47 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Sep 27 18:06:47 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sun Sep 27 18:06:47 2020 VERIFY KU OK
Sun Sep 27 18:06:47 2020 Validating certificate extended key usage
Sun Sep 27 18:06:47 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 27 18:06:47 2020 VERIFY EKU OK
Sun Sep 27 18:06:47 2020 VERIFY OK: depth=0, CN=nl853.nordvpn.com
Sun Sep 27 18:06:47 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 18:06:47 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 18:06:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Sep 27 19:06:47 2020 TLS: tls_process: killed expiring key
Sun Sep 27 19:06:47 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Sep 27 19:06:47 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sun Sep 27 19:06:47 2020 VERIFY KU OK
Sun Sep 27 19:06:47 2020 Validating certificate extended key usage
Sun Sep 27 19:06:47 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 27 19:06:47 2020 VERIFY EKU OK
Sun Sep 27 19:06:47 2020 VERIFY OK: depth=0, CN=nl853.nordvpn.com
Sun Sep 27 19:06:47 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 19:06:47 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 19:06:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Sep 27 20:06:47 2020 TLS: tls_process: killed expiring key
Sun Sep 27 20:06:47 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Sun Sep 27 20:06:47 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Sun Sep 27 20:06:47 2020 VERIFY KU OK
Sun Sep 27 20:06:47 2020 Validating certificate extended key usage
Sun Sep 27 20:06:47 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Sep 27 20:06:47 2020 VERIFY EKU OK
Sun Sep 27 20:06:47 2020 VERIFY OK: depth=0, CN=nl853.nordvpn.com
Sun Sep 27 20:06:47 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 20:06:47 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Sun Sep 27 20:06:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Sun Sep 27 20:36:33 2020 Connection reset, restarting [0]
Sun Sep 27 20:36:33 2020 SIGUSR1[soft,connection-reset] received, process restarting
Sun Sep 27 20:36:33 2020 Restart pause, 5 second(s)
Sun Sep 27 20:36:38 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Sun Sep 27 20:36:38 2020 NOTE: --fast-io is disabled since we are not using UDP
Sun Sep 27 20:36:38 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]194.127.172.106:443
Sun Sep 27 20:36:38 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Sun Sep 27 20:36:38 2020 Attempting to establish TCP connection with [AF_INET]194.127.172.106:443 [nonblock]
Using OpenVPN provider: NORDVPN
2020-09-28 09:57:59 Checking curl installation
2020-09-28 09:57:59 Removing existing configs
2020-09-28 09:57:59 Selecting the best server...
2020-09-28 09:57:59 Searching for group: legacy_p2p
2020-09-28 09:57:59 Searching for technology: openvpn_tcp
2020-09-28 09:57:59 Best server : nl884.nordvpn.com
2020-09-28 09:57:59 Downloading config: default.ovpn
2020-09-28 09:57:59 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl884.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2807  100  2807    0     0   5021      0 --:--:-- --:--:-- --:--:--  5021
2020-09-28 09:57:59 Selecting the best server...
2020-09-28 09:57:59 Searching for country : NL (153)
2020-09-28 09:57:59 Searching for group: legacy_p2p
2020-09-28 09:57:59 Searching for technology: openvpn_tcp
2020-09-28 09:57:59 Best server : nl884.nordvpn.com
2020-09-28 09:57:59 Downloading config: nl884.nordvpn.com.ovpn
2020-09-28 09:57:59 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl884.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2807  100  2807    0     0  59723      0 --:--:-- --:--:-- --:--:-- 59723
2020-09-28 09:57:59 Checking line endings
2020-09-28 09:57:59 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl884.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Mon Sep 28 09:58:01 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Mon Sep 28 09:58:01 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Mon Sep 28 09:58:01 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 09:58:01 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 09:58:01 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Sep 28 09:58:01 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Mon Sep 28 09:58:01 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 09:58:01 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Mon Sep 28 09:58:01 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 09:58:02 2020 TCP connection established with [AF_INET]213.232.87.99:443
Mon Sep 28 09:58:02 2020 TCP_CLIENT link local: (not bound)
Mon Sep 28 09:58:02 2020 TCP_CLIENT link remote: [AF_INET]213.232.87.99:443
Mon Sep 28 09:58:02 2020 TLS: Initial packet from [AF_INET]213.232.87.99:443, sid=cb2bb1e0 cb98e097
Mon Sep 28 09:58:02 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Mon Sep 28 09:58:02 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 09:58:02 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 09:58:02 2020 VERIFY KU OK
Mon Sep 28 09:58:02 2020 Validating certificate extended key usage
Mon Sep 28 09:58:02 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 09:58:02 2020 VERIFY EKU OK
Mon Sep 28 09:58:02 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 09:58:02 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 09:58:02 2020 [nl884.nordvpn.com] Peer Connection Initiated with [AF_INET]213.232.87.99:443
Mon Sep 28 09:58:03 2020 SENT CONTROL [nl884.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Mon Sep 28 09:58:04 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: compression parms modified
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Sep 28 09:58:04 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: route options modified
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: route-related options modified
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: peer-id set
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Mon Sep 28 09:58:04 2020 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 28 09:58:04 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 28 09:58:04 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 09:58:04 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 09:58:04 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Mon Sep 28 09:58:04 2020 TUN/TAP device tun0 opened
Mon Sep 28 09:58:04 2020 TUN/TAP TX queue length set to 100
Mon Sep 28 09:58:04 2020 /sbin/ip link set dev tun0 up mtu 1500
Mon Sep 28 09:58:04 2020 /sbin/ip addr add dev tun0 10.7.3.2/24 broadcast 10.7.3.255
Mon Sep 28 09:58:04 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.3.2 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.3.2 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.3.2
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Mon Sep 28 09:58:04 2020 /sbin/ip route add 213.232.87.99/32 via 172.17.0.1
Mon Sep 28 09:58:04 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.3.1
Mon Sep 28 09:58:04 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.3.1
Mon Sep 28 09:58:04 2020 Initialization Sequence Completed
Mon Sep 28 10:58:02 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 10:58:02 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 10:58:02 2020 VERIFY KU OK
Mon Sep 28 10:58:02 2020 Validating certificate extended key usage
Mon Sep 28 10:58:02 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 10:58:02 2020 VERIFY EKU OK
Mon Sep 28 10:58:02 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 10:58:02 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 10:58:02 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 10:58:02 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 11:37:50 2020 Connection reset, restarting [0]
Mon Sep 28 11:37:50 2020 SIGUSR1[soft,connection-reset] received, process restarting
Mon Sep 28 11:37:50 2020 Restart pause, 5 second(s)
Mon Sep 28 11:37:55 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:37:55 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:37:55 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:37:55 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:37:55 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:38:17 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:38:17 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:38:17 2020 Restart pause, 5 second(s)
Mon Sep 28 11:38:22 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:38:22 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:38:22 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:38:22 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:38:22 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:38:44 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:38:44 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:38:44 2020 Restart pause, 5 second(s)
Mon Sep 28 11:38:49 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:38:49 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:38:49 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:38:49 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:38:49 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:39:11 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:39:11 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:39:11 2020 Restart pause, 5 second(s)
Mon Sep 28 11:39:16 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:39:16 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:39:16 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:39:16 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:39:16 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:39:38 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:39:38 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:39:38 2020 Restart pause, 5 second(s)
Mon Sep 28 11:39:43 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:39:43 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:39:43 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:39:43 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:39:43 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:40:05 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:40:05 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:40:05 2020 Restart pause, 5 second(s)
Mon Sep 28 11:40:10 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:40:10 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:40:10 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:40:10 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:40:10 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:40:32 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:40:32 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:40:32 2020 Restart pause, 10 second(s)
Mon Sep 28 11:40:42 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:40:42 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:40:42 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:40:42 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:40:42 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:41:04 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:41:04 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:41:04 2020 Restart pause, 20 second(s)
Mon Sep 28 11:41:24 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:41:24 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:41:24 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:41:24 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:41:24 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:41:46 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:41:46 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:41:46 2020 Restart pause, 40 second(s)
Mon Sep 28 11:42:26 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:42:26 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:42:26 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:42:26 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:42:26 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:42:48 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:42:48 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:42:48 2020 Restart pause, 80 second(s)
Mon Sep 28 11:44:08 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:44:08 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:44:08 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:44:08 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:44:08 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:44:09 2020 TCP connection established with [AF_INET]213.232.87.99:443
Mon Sep 28 11:44:09 2020 TCP_CLIENT link local: (not bound)
Mon Sep 28 11:44:09 2020 TCP_CLIENT link remote: [AF_INET]213.232.87.99:443
Mon Sep 28 11:44:09 2020 TLS: Initial packet from [AF_INET]213.232.87.99:443, sid=8fedcfd6 487230ad
Mon Sep 28 11:44:09 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 11:44:09 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 11:44:09 2020 VERIFY KU OK
Mon Sep 28 11:44:09 2020 Validating certificate extended key usage
Mon Sep 28 11:44:09 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 11:44:09 2020 VERIFY EKU OK
Mon Sep 28 11:44:09 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 11:44:09 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 11:44:09 2020 [nl884.nordvpn.com] Peer Connection Initiated with [AF_INET]213.232.87.99:443
Mon Sep 28 11:44:11 2020 SENT CONTROL [nl884.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Mon Sep 28 11:44:11 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: compression parms modified
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Sep 28 11:44:11 2020 Socket Buffers: R=[425984->425984] S=[425984->425984]
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: route options modified
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: route-related options modified
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: peer-id set
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Mon Sep 28 11:44:11 2020 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 28 11:44:11 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 28 11:44:11 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 11:44:11 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 11:44:11 2020 Preserving previous TUN/TAP instance: tun0
Mon Sep 28 11:44:11 2020 Initialization Sequence Completed
Mon Sep 28 11:47:53 2020 Connection reset, restarting [0]
Mon Sep 28 11:47:53 2020 SIGUSR1[soft,connection-reset] received, process restarting
Mon Sep 28 11:47:53 2020 Restart pause, 5 second(s)
Mon Sep 28 11:47:58 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:47:58 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:47:58 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:47:58 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:47:58 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:48:20 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:48:20 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:48:20 2020 Restart pause, 5 second(s)
Mon Sep 28 11:48:25 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:48:25 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:48:25 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:48:25 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:48:25 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:48:47 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:48:47 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:48:47 2020 Restart pause, 5 second(s)
Mon Sep 28 11:48:52 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:48:52 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:48:52 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:48:52 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:48:52 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:49:14 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:49:14 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:49:14 2020 Restart pause, 5 second(s)
Mon Sep 28 11:49:19 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:49:19 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:49:19 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:49:19 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:49:19 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:49:41 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:49:41 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:49:41 2020 Restart pause, 5 second(s)
Mon Sep 28 11:49:46 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:49:46 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:49:46 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:49:46 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:49:46 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:50:08 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:50:08 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:50:08 2020 Restart pause, 5 second(s)
Mon Sep 28 11:50:13 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:50:13 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:50:13 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:50:13 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:50:13 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:50:35 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:50:35 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:50:35 2020 Restart pause, 10 second(s)
Mon Sep 28 11:50:45 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:50:45 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:50:45 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:50:45 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:50:45 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:51:07 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:51:07 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:51:07 2020 Restart pause, 20 second(s)
Mon Sep 28 11:51:27 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:51:27 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:51:27 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:51:27 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:51:27 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:51:48 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:51:48 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:51:48 2020 Restart pause, 40 second(s)
Mon Sep 28 11:52:28 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:52:28 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:52:28 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:52:28 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:52:28 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:52:50 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 11:52:50 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 11:52:50 2020 Restart pause, 80 second(s)
Mon Sep 28 11:54:10 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 11:54:10 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 11:54:10 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 11:54:10 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 11:54:10 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 11:54:11 2020 TCP connection established with [AF_INET]213.232.87.99:443
Mon Sep 28 11:54:11 2020 TCP_CLIENT link local: (not bound)
Mon Sep 28 11:54:11 2020 TCP_CLIENT link remote: [AF_INET]213.232.87.99:443
Mon Sep 28 11:54:11 2020 TLS: Initial packet from [AF_INET]213.232.87.99:443, sid=78dd2fb3 5272b93e
Mon Sep 28 11:54:11 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 11:54:11 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 11:54:11 2020 VERIFY KU OK
Mon Sep 28 11:54:11 2020 Validating certificate extended key usage
Mon Sep 28 11:54:11 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 11:54:11 2020 VERIFY EKU OK
Mon Sep 28 11:54:11 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 11:54:11 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 11:54:11 2020 [nl884.nordvpn.com] Peer Connection Initiated with [AF_INET]213.232.87.99:443
Mon Sep 28 11:54:12 2020 SENT CONTROL [nl884.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Mon Sep 28 11:54:12 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.0.4 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: compression parms modified
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Sep 28 11:54:12 2020 Socket Buffers: R=[425984->425984] S=[425984->425984]
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: route options modified
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: route-related options modified
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: peer-id set
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Mon Sep 28 11:54:12 2020 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 28 11:54:12 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 28 11:54:12 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 11:54:12 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 11:54:12 2020 Preserving previous TUN/TAP instance: tun0
Mon Sep 28 11:54:12 2020 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Mon Sep 28 11:54:12 2020 /sbin/ip route del 213.232.87.99/32
Mon Sep 28 11:54:12 2020 /sbin/ip route del 0.0.0.0/1
Mon Sep 28 11:54:12 2020 /sbin/ip route del 128.0.0.0/1
Mon Sep 28 11:54:12 2020 Closing TUN/TAP interface
Mon Sep 28 11:54:12 2020 /sbin/ip addr del dev tun0 10.7.3.2/24
Mon Sep 28 11:54:12 2020 /etc/openvpn/tunnelDown.sh tun0 1500 1587 10.7.3.2 255.255.255.0 init
Mon Sep 28 11:54:13 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Mon Sep 28 11:54:13 2020 TUN/TAP device tun0 opened
Mon Sep 28 11:54:13 2020 TUN/TAP TX queue length set to 100
Mon Sep 28 11:54:13 2020 /sbin/ip link set dev tun0 up mtu 1500
Mon Sep 28 11:54:13 2020 /sbin/ip addr add dev tun0 10.7.0.4/24 broadcast 10.7.0.255
Mon Sep 28 11:54:13 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.0.4 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.0.4 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.0.4
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Mon Sep 28 11:54:13 2020 /sbin/ip route add 213.232.87.99/32 via 172.17.0.1
Mon Sep 28 11:54:13 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.0.1
Mon Sep 28 11:54:13 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.0.1
Mon Sep 28 11:54:13 2020 Initialization Sequence Completed
Mon Sep 28 12:54:10 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 12:54:10 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 12:54:10 2020 VERIFY KU OK
Mon Sep 28 12:54:10 2020 Validating certificate extended key usage
Mon Sep 28 12:54:10 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 12:54:10 2020 VERIFY EKU OK
Mon Sep 28 12:54:10 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 12:54:10 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 12:54:10 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 12:54:10 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 12:56:40 2020 Connection reset, restarting [0]
Mon Sep 28 12:56:40 2020 SIGUSR1[soft,connection-reset] received, process restarting
Mon Sep 28 12:56:40 2020 Restart pause, 5 second(s)
Mon Sep 28 12:56:45 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 12:56:45 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 12:56:45 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 12:56:45 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 12:56:45 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 12:57:07 2020 TCP: connect to [AF_INET]213.232.87.99:443 failed: Connection refused
Mon Sep 28 12:57:07 2020 SIGUSR1[connection failed(soft),init_instance] received, process restarting
Mon Sep 28 12:57:07 2020 Restart pause, 5 second(s)
Mon Sep 28 12:57:12 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Mon Sep 28 12:57:12 2020 NOTE: --fast-io is disabled since we are not using UDP
Mon Sep 28 12:57:12 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.99:443
Mon Sep 28 12:57:12 2020 Socket Buffers: R=[131072->425984] S=[16384->425984]
Mon Sep 28 12:57:12 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.99:443 [nonblock]
Mon Sep 28 12:57:13 2020 TCP connection established with [AF_INET]213.232.87.99:443
Mon Sep 28 12:57:13 2020 TCP_CLIENT link local: (not bound)
Mon Sep 28 12:57:13 2020 TCP_CLIENT link remote: [AF_INET]213.232.87.99:443
Mon Sep 28 12:57:13 2020 TLS: Initial packet from [AF_INET]213.232.87.99:443, sid=50228b9d b2d555d4
Mon Sep 28 12:57:13 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 12:57:13 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 12:57:13 2020 VERIFY KU OK
Mon Sep 28 12:57:13 2020 Validating certificate extended key usage
Mon Sep 28 12:57:13 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 12:57:13 2020 VERIFY EKU OK
Mon Sep 28 12:57:13 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 12:57:13 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 12:57:13 2020 [nl884.nordvpn.com] Peer Connection Initiated with [AF_INET]213.232.87.99:443
Mon Sep 28 12:57:14 2020 SENT CONTROL [nl884.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Mon Sep 28 12:57:14 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.0.5 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: timers and/or timeouts modified
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: compression parms modified
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Mon Sep 28 12:57:14 2020 Socket Buffers: R=[425984->425984] S=[425984->425984]
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: --ifconfig/up options modified
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: route options modified
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: route-related options modified
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: peer-id set
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Mon Sep 28 12:57:14 2020 OPTIONS IMPORT: data channel crypto options modified
Mon Sep 28 12:57:14 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Mon Sep 28 12:57:14 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 12:57:14 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 12:57:14 2020 Preserving previous TUN/TAP instance: tun0
Mon Sep 28 12:57:14 2020 NOTE: Pulled options changed on restart, will need to close and reopen TUN/TAP device.
Mon Sep 28 12:57:14 2020 /sbin/ip route del 213.232.87.99/32
Mon Sep 28 12:57:14 2020 /sbin/ip route del 0.0.0.0/1
Mon Sep 28 12:57:14 2020 /sbin/ip route del 128.0.0.0/1
Mon Sep 28 12:57:14 2020 Closing TUN/TAP interface
Mon Sep 28 12:57:14 2020 /sbin/ip addr del dev tun0 10.7.0.4/24
Mon Sep 28 12:57:14 2020 /etc/openvpn/tunnelDown.sh tun0 1500 1587 10.7.0.4 255.255.255.0 init
Mon Sep 28 12:57:15 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Mon Sep 28 12:57:15 2020 TUN/TAP device tun0 opened
Mon Sep 28 12:57:15 2020 TUN/TAP TX queue length set to 100
Mon Sep 28 12:57:15 2020 /sbin/ip link set dev tun0 up mtu 1500
Mon Sep 28 12:57:15 2020 /sbin/ip addr add dev tun0 10.7.0.5/24 broadcast 10.7.0.255
Mon Sep 28 12:57:15 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.0.5 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.0.5 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.0.5
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Mon Sep 28 12:57:15 2020 /sbin/ip route add 213.232.87.99/32 via 172.17.0.1
Mon Sep 28 12:57:15 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.0.1
Mon Sep 28 12:57:15 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.0.1
Mon Sep 28 12:57:15 2020 Initialization Sequence Completed
Mon Sep 28 13:57:13 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 13:57:13 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 13:57:13 2020 VERIFY KU OK
Mon Sep 28 13:57:13 2020 Validating certificate extended key usage
Mon Sep 28 13:57:13 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 13:57:13 2020 VERIFY EKU OK
Mon Sep 28 13:57:13 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 13:57:13 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 13:57:13 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 13:57:13 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Mon Sep 28 14:57:13 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Mon Sep 28 14:57:13 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Mon Sep 28 14:57:13 2020 VERIFY KU OK
Mon Sep 28 14:57:13 2020 Validating certificate extended key usage
Mon Sep 28 14:57:13 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Sep 28 14:57:13 2020 VERIFY EKU OK
Mon Sep 28 14:57:13 2020 VERIFY OK: depth=0, CN=nl884.nordvpn.com
Mon Sep 28 14:57:13 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 14:57:13 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Mon Sep 28 14:57:13 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Using OpenVPN provider: NORDVPN
2020-09-29 08:15:34 Checking curl installation
2020-09-29 08:15:34 Removing existing configs
2020-09-29 08:15:34 Selecting the best server...
2020-09-29 08:15:34 Searching for group: legacy_p2p
2020-09-29 08:15:34 Searching for technology: openvpn_tcp
2020-09-29 08:15:34 Best server : nl841.nordvpn.com
2020-09-29 08:15:34 Downloading config: default.ovpn
2020-09-29 08:15:34 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl841.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2808  100  2808    0     0   4565      0 --:--:-- --:--:-- --:--:--  4565
2020-09-29 08:15:34 Selecting the best server...
2020-09-29 08:15:34 Searching for country : NL (153)
2020-09-29 08:15:34 Searching for group: legacy_p2p
2020-09-29 08:15:34 Searching for technology: openvpn_tcp
2020-09-29 08:15:34 Best server : nl841.nordvpn.com
2020-09-29 08:15:34 Downloading config: nl841.nordvpn.com.ovpn
2020-09-29 08:15:34 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl841.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2808  100  2808    0     0  80228      0 --:--:-- --:--:-- --:--:-- 80228
2020-09-29 08:15:34 Checking line endings
2020-09-29 08:15:34 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl841.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Tue Sep 29 08:15:36 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Tue Sep 29 08:15:36 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Tue Sep 29 08:15:36 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Sep 29 08:15:36 2020 NOTE: --fast-io is disabled since we are not using UDP
Tue Sep 29 08:15:36 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Sep 29 08:15:36 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Sep 29 08:15:36 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]194.127.172.70:443
Tue Sep 29 08:15:36 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Tue Sep 29 08:15:36 2020 Attempting to establish TCP connection with [AF_INET]194.127.172.70:443 [nonblock]
Tue Sep 29 08:15:37 2020 TCP connection established with [AF_INET]194.127.172.70:443
Tue Sep 29 08:15:37 2020 TCP_CLIENT link local: (not bound)
Tue Sep 29 08:15:37 2020 TCP_CLIENT link remote: [AF_INET]194.127.172.70:443
Tue Sep 29 08:15:37 2020 TLS: Initial packet from [AF_INET]194.127.172.70:443, sid=7faa23f4 f6d77cd3
Tue Sep 29 08:15:37 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Sep 29 08:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 08:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 08:15:37 2020 VERIFY KU OK
Tue Sep 29 08:15:37 2020 Validating certificate extended key usage
Tue Sep 29 08:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 08:15:37 2020 VERIFY EKU OK
Tue Sep 29 08:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 08:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 08:15:37 2020 [nl841.nordvpn.com] Peer Connection Initiated with [AF_INET]194.127.172.70:443
Tue Sep 29 08:15:38 2020 SENT CONTROL [nl841.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Tue Sep 29 08:15:38 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: timers and/or timeouts modified
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: compression parms modified
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Tue Sep 29 08:15:38 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: route options modified
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: route-related options modified
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: peer-id set
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Tue Sep 29 08:15:38 2020 OPTIONS IMPORT: data channel crypto options modified
Tue Sep 29 08:15:38 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Sep 29 08:15:38 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 08:15:38 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 08:15:38 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Tue Sep 29 08:15:38 2020 TUN/TAP device tun0 opened
Tue Sep 29 08:15:38 2020 TUN/TAP TX queue length set to 100
Tue Sep 29 08:15:38 2020 /sbin/ip link set dev tun0 up mtu 1500
Tue Sep 29 08:15:38 2020 /sbin/ip addr add dev tun0 10.7.3.3/24 broadcast 10.7.3.255
Tue Sep 29 08:15:38 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.3.3 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.3.3 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.3.3
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Tue Sep 29 08:15:38 2020 /sbin/ip route add 194.127.172.70/32 via 172.17.0.1
Tue Sep 29 08:15:38 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.3.1
Tue Sep 29 08:15:38 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.3.1
Tue Sep 29 08:15:38 2020 Initialization Sequence Completed
Tue Sep 29 09:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 09:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 09:15:37 2020 VERIFY KU OK
Tue Sep 29 09:15:37 2020 Validating certificate extended key usage
Tue Sep 29 09:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 09:15:37 2020 VERIFY EKU OK
Tue Sep 29 09:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 09:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 09:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 09:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 10:15:37 2020 TLS: tls_process: killed expiring key
Tue Sep 29 10:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 10:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 10:15:37 2020 VERIFY KU OK
Tue Sep 29 10:15:37 2020 Validating certificate extended key usage
Tue Sep 29 10:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 10:15:37 2020 VERIFY EKU OK
Tue Sep 29 10:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 10:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 10:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 10:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 11:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 11:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 11:15:37 2020 VERIFY KU OK
Tue Sep 29 11:15:37 2020 Validating certificate extended key usage
Tue Sep 29 11:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 11:15:37 2020 VERIFY EKU OK
Tue Sep 29 11:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 11:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 11:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 11:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 12:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 12:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 12:15:37 2020 VERIFY KU OK
Tue Sep 29 12:15:37 2020 Validating certificate extended key usage
Tue Sep 29 12:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 12:15:37 2020 VERIFY EKU OK
Tue Sep 29 12:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 12:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 12:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 12:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 13:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 13:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 13:15:37 2020 VERIFY KU OK
Tue Sep 29 13:15:37 2020 Validating certificate extended key usage
Tue Sep 29 13:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 13:15:37 2020 VERIFY EKU OK
Tue Sep 29 13:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 13:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 13:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 13:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 14:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 14:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 14:15:37 2020 VERIFY KU OK
Tue Sep 29 14:15:37 2020 Validating certificate extended key usage
Tue Sep 29 14:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 14:15:37 2020 VERIFY EKU OK
Tue Sep 29 14:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 14:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 14:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 14:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 15:15:37 2020 TLS: tls_process: killed expiring key
Tue Sep 29 15:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 15:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 15:15:37 2020 VERIFY KU OK
Tue Sep 29 15:15:37 2020 Validating certificate extended key usage
Tue Sep 29 15:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 15:15:37 2020 VERIFY EKU OK
Tue Sep 29 15:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 15:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 15:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 15:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 16:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 16:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 16:15:37 2020 VERIFY KU OK
Tue Sep 29 16:15:37 2020 Validating certificate extended key usage
Tue Sep 29 16:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 16:15:37 2020 VERIFY EKU OK
Tue Sep 29 16:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 16:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 16:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 16:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 17:15:37 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 17:15:37 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 17:15:37 2020 VERIFY KU OK
Tue Sep 29 17:15:37 2020 Validating certificate extended key usage
Tue Sep 29 17:15:37 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 17:15:37 2020 VERIFY EKU OK
Tue Sep 29 17:15:37 2020 VERIFY OK: depth=0, CN=nl841.nordvpn.com
Tue Sep 29 17:15:37 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 17:15:37 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 17:15:37 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 17:45:49 2020 event_wait : Interrupted system call (code=4)
Tue Sep 29 17:45:49 2020 /sbin/ip route del 194.127.172.70/32
Tue Sep 29 17:45:49 2020 /sbin/ip route del 0.0.0.0/1
Tue Sep 29 17:45:49 2020 /sbin/ip route del 128.0.0.0/1
Tue Sep 29 17:45:49 2020 Closing TUN/TAP interface
Tue Sep 29 17:45:49 2020 /sbin/ip addr del dev tun0 10.7.3.3/24
Tue Sep 29 17:45:49 2020 /etc/openvpn/tunnelDown.sh tun0 1500 1587 10.7.3.3 255.255.255.0 init
Tue Sep 29 17:45:49 2020 SIGTERM[hard,] received, process exiting
Using OpenVPN provider: NORDVPN
2020-09-29 17:45:49 Checking curl installation
2020-09-29 17:45:49 Removing existing configs
2020-09-29 17:45:49 Selecting the best server...
2020-09-29 17:45:49 Searching for group: legacy_p2p
2020-09-29 17:45:49 Searching for technology: openvpn_tcp
2020-09-29 17:45:49 Best server : nl822.nordvpn.com
2020-09-29 17:45:49 Downloading config: default.ovpn
2020-09-29 17:45:49 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl822.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2809  100  2809    0     0   5300      0 --:--:-- --:--:-- --:--:--  5290
2020-09-29 17:45:49 Selecting the best server...
2020-09-29 17:45:49 Searching for country : NL (153)
2020-09-29 17:45:49 Searching for group: legacy_p2p
2020-09-29 17:45:49 Searching for technology: openvpn_tcp
2020-09-29 17:45:49 Best server : nl822.nordvpn.com
2020-09-29 17:45:49 Downloading config: nl822.nordvpn.com.ovpn
2020-09-29 17:45:49 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl822.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2809  100  2809    0     0  72025      0 --:--:-- --:--:-- --:--:-- 72025
2020-09-29 17:45:49 Checking line endings
2020-09-29 17:45:49 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl822.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Tue Sep 29 17:45:51 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Tue Sep 29 17:45:51 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Tue Sep 29 17:45:51 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Tue Sep 29 17:45:51 2020 NOTE: --fast-io is disabled since we are not using UDP
Tue Sep 29 17:45:51 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Sep 29 17:45:51 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Sep 29 17:45:51 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]178.239.173.223:443
Tue Sep 29 17:45:51 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Tue Sep 29 17:45:51 2020 Attempting to establish TCP connection with [AF_INET]178.239.173.223:443 [nonblock]
Tue Sep 29 17:45:52 2020 TCP connection established with [AF_INET]178.239.173.223:443
Tue Sep 29 17:45:52 2020 TCP_CLIENT link local: (not bound)
Tue Sep 29 17:45:52 2020 TCP_CLIENT link remote: [AF_INET]178.239.173.223:443
Tue Sep 29 17:45:52 2020 TLS: Initial packet from [AF_INET]178.239.173.223:443, sid=1b4e1f22 50d15ddd
Tue Sep 29 17:45:52 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Sep 29 17:45:52 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Tue Sep 29 17:45:52 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Tue Sep 29 17:45:52 2020 VERIFY KU OK
Tue Sep 29 17:45:52 2020 Validating certificate extended key usage
Tue Sep 29 17:45:52 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Sep 29 17:45:52 2020 VERIFY EKU OK
Tue Sep 29 17:45:52 2020 VERIFY OK: depth=0, CN=nl822.nordvpn.com
Tue Sep 29 17:45:53 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Tue Sep 29 17:45:53 2020 [nl822.nordvpn.com] Peer Connection Initiated with [AF_INET]178.239.173.223:443
Tue Sep 29 17:45:54 2020 SENT CONTROL [nl822.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Tue Sep 29 17:45:54 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.0.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: timers and/or timeouts modified
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: compression parms modified
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Tue Sep 29 17:45:54 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: --ifconfig/up options modified
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: route options modified
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: route-related options modified
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: peer-id set
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Tue Sep 29 17:45:54 2020 OPTIONS IMPORT: data channel crypto options modified
Tue Sep 29 17:45:54 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Sep 29 17:45:54 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 17:45:54 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Sep 29 17:45:54 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Tue Sep 29 17:45:54 2020 TUN/TAP device tun0 opened
Tue Sep 29 17:45:54 2020 TUN/TAP TX queue length set to 100
Tue Sep 29 17:45:54 2020 /sbin/ip link set dev tun0 up mtu 1500
Tue Sep 29 17:45:54 2020 /sbin/ip addr add dev tun0 10.7.0.3/24 broadcast 10.7.0.255
Tue Sep 29 17:45:54 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.0.3 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.0.3 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.0.3
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Tue Sep 29 17:45:54 2020 /sbin/ip route add 178.239.173.223/32 via 172.17.0.1
Tue Sep 29 17:45:54 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.0.1
Tue Sep 29 17:45:54 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.0.1
Tue Sep 29 17:45:54 2020 Initialization Sequence Completed
Tue Sep 29 17:51:39 2020 event_wait : Interrupted system call (code=4)
Tue Sep 29 17:51:39 2020 /sbin/ip route del 178.239.173.223/32
Tue Sep 29 17:51:39 2020 /sbin/ip route del 0.0.0.0/1
Tue Sep 29 17:51:39 2020 /sbin/ip route del 128.0.0.0/1
Tue Sep 29 17:51:39 2020 Closing TUN/TAP interface
Tue Sep 29 17:51:39 2020 /sbin/ip addr del dev tun0 10.7.0.3/24
Tue Sep 29 17:51:39 2020 /etc/openvpn/tunnelDown.sh tun0 1500 1587 10.7.0.3 255.255.255.0 init
Tue Sep 29 17:51:39 2020 SIGTERM[hard,] received, process exiting
Using OpenVPN provider: NORDVPN
2020-09-30 08:22:12 Checking curl installation
2020-09-30 08:22:12 Removing existing configs
2020-09-30 08:22:12 Selecting the best server...
2020-09-30 08:22:12 Searching for group: legacy_p2p
2020-09-30 08:22:12 Searching for technology: openvpn_tcp
2020-09-30 08:22:12 Best server : nl808.nordvpn.com
2020-09-30 08:22:12 Downloading config: default.ovpn
2020-09-30 08:22:12 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl808.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2808  100  2808    0     0   4909      0 --:--:-- --:--:-- --:--:--  4900
2020-09-30 08:22:12 Selecting the best server...
2020-09-30 08:22:12 Searching for country : NL (153)
2020-09-30 08:22:12 Searching for group: legacy_p2p
2020-09-30 08:22:12 Searching for technology: openvpn_tcp
2020-09-30 08:22:12 Best server : nl808.nordvpn.com
2020-09-30 08:22:12 Downloading config: nl808.nordvpn.com.ovpn
2020-09-30 08:22:12 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl808.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2808  100  2808    0     0  63818      0 --:--:-- --:--:-- --:--:-- 63818
2020-09-30 08:22:12 Checking line endings
2020-09-30 08:22:12 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl808.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Wed Sep 30 08:22:14 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Wed Sep 30 08:22:14 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Wed Sep 30 08:22:14 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Sep 30 08:22:14 2020 NOTE: --fast-io is disabled since we are not using UDP
Wed Sep 30 08:22:14 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed Sep 30 08:22:14 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed Sep 30 08:22:14 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]134.19.189.235:443
Wed Sep 30 08:22:14 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Wed Sep 30 08:22:14 2020 Attempting to establish TCP connection with [AF_INET]134.19.189.235:443 [nonblock]
Wed Sep 30 08:22:15 2020 TCP connection established with [AF_INET]134.19.189.235:443
Wed Sep 30 08:22:15 2020 TCP_CLIENT link local: (not bound)
Wed Sep 30 08:22:15 2020 TCP_CLIENT link remote: [AF_INET]134.19.189.235:443
Wed Sep 30 08:22:15 2020 TLS: Initial packet from [AF_INET]134.19.189.235:443, sid=7f5a8844 74f29be9
Wed Sep 30 08:22:15 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Sep 30 08:22:15 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Sep 30 08:22:15 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Sep 30 08:22:15 2020 VERIFY KU OK
Wed Sep 30 08:22:15 2020 Validating certificate extended key usage
Wed Sep 30 08:22:15 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 30 08:22:15 2020 VERIFY EKU OK
Wed Sep 30 08:22:15 2020 VERIFY OK: depth=0, CN=nl808.nordvpn.com
Wed Sep 30 08:22:15 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Sep 30 08:22:15 2020 [nl808.nordvpn.com] Peer Connection Initiated with [AF_INET]134.19.189.235:443
Wed Sep 30 08:22:16 2020 SENT CONTROL [nl808.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Wed Sep 30 08:22:16 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.0.6 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: timers and/or timeouts modified
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: compression parms modified
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Wed Sep 30 08:22:16 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: --ifconfig/up options modified
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: route options modified
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: route-related options modified
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: peer-id set
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Wed Sep 30 08:22:16 2020 OPTIONS IMPORT: data channel crypto options modified
Wed Sep 30 08:22:16 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Sep 30 08:22:16 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 08:22:16 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 08:22:16 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Wed Sep 30 08:22:16 2020 TUN/TAP device tun0 opened
Wed Sep 30 08:22:16 2020 TUN/TAP TX queue length set to 100
Wed Sep 30 08:22:16 2020 /sbin/ip link set dev tun0 up mtu 1500
Wed Sep 30 08:22:16 2020 /sbin/ip addr add dev tun0 10.7.0.6/24 broadcast 10.7.0.255
Wed Sep 30 08:22:16 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.0.6 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.0.6 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.0.6
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Wed Sep 30 08:22:16 2020 /sbin/ip route add 134.19.189.235/32 via 172.17.0.1
Wed Sep 30 08:22:16 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.0.1
Wed Sep 30 08:22:16 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.0.1
Wed Sep 30 08:22:16 2020 Initialization Sequence Completed
Wed Sep 30 09:22:14 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Sep 30 09:22:14 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Sep 30 09:22:14 2020 VERIFY KU OK
Wed Sep 30 09:22:14 2020 Validating certificate extended key usage
Wed Sep 30 09:22:14 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 30 09:22:14 2020 VERIFY EKU OK
Wed Sep 30 09:22:14 2020 VERIFY OK: depth=0, CN=nl808.nordvpn.com
Wed Sep 30 09:22:15 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 09:22:15 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 09:22:15 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Sep 30 10:22:14 2020 TLS: tls_process: killed expiring key
Wed Sep 30 10:22:14 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Sep 30 10:22:14 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Sep 30 10:22:14 2020 VERIFY KU OK
Wed Sep 30 10:22:14 2020 Validating certificate extended key usage
Wed Sep 30 10:22:14 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 30 10:22:14 2020 VERIFY EKU OK
Wed Sep 30 10:22:14 2020 VERIFY OK: depth=0, CN=nl808.nordvpn.com
Wed Sep 30 10:22:15 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 10:22:15 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 10:22:15 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Sep 30 10:57:51 2020 event_wait : Interrupted system call (code=4)
Wed Sep 30 10:57:51 2020 /sbin/ip route del 134.19.189.235/32
Wed Sep 30 10:57:51 2020 /sbin/ip route del 0.0.0.0/1
Wed Sep 30 10:57:51 2020 /sbin/ip route del 128.0.0.0/1
Wed Sep 30 10:57:51 2020 Closing TUN/TAP interface
Wed Sep 30 10:57:51 2020 /sbin/ip addr del dev tun0 10.7.0.6/24
Wed Sep 30 10:57:51 2020 /etc/openvpn/tunnelDown.sh tun0 1500 1587 10.7.0.6 255.255.255.0 init
Wed Sep 30 10:57:51 2020 SIGTERM[hard,] received, process exiting
Using OpenVPN provider: NORDVPN
2020-09-30 11:29:04 Checking curl installation
2020-09-30 11:29:04 Removing existing configs
2020-09-30 11:29:04 Selecting the best server...
2020-09-30 11:29:04 Searching for group: legacy_p2p
2020-09-30 11:29:04 Searching for technology: openvpn_tcp
2020-09-30 11:29:04 Best server : nl876.nordvpn.com
2020-09-30 11:29:04 Downloading config: default.ovpn
2020-09-30 11:29:04 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl876.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2807  100  2807    0     0  73868      0 --:--:-- --:--:-- --:--:-- 73868
2020-09-30 11:29:04 Selecting the best server...
2020-09-30 11:29:04 Searching for country : NL (153)
2020-09-30 11:29:04 Searching for group: legacy_p2p
2020-09-30 11:29:04 Searching for technology: openvpn_tcp
2020-09-30 11:29:04 Best server : nl876.nordvpn.com
2020-09-30 11:29:04 Downloading config: nl876.nordvpn.com.ovpn
2020-09-30 11:29:04 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl876.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2807  100  2807    0     0  73868      0 --:--:-- --:--:-- --:--:-- 71974
2020-09-30 11:29:04 Checking line endings
2020-09-30 11:29:04 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl876.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Wed Sep 30 11:29:04 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Wed Sep 30 11:29:04 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Wed Sep 30 11:29:04 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Wed Sep 30 11:29:04 2020 NOTE: --fast-io is disabled since we are not using UDP
Wed Sep 30 11:29:04 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed Sep 30 11:29:04 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed Sep 30 11:29:04 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.83:443
Wed Sep 30 11:29:04 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Wed Sep 30 11:29:04 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.83:443 [nonblock]
Wed Sep 30 11:29:05 2020 TCP connection established with [AF_INET]213.232.87.83:443
Wed Sep 30 11:29:05 2020 TCP_CLIENT link local: (not bound)
Wed Sep 30 11:29:05 2020 TCP_CLIENT link remote: [AF_INET]213.232.87.83:443
Wed Sep 30 11:29:05 2020 TLS: Initial packet from [AF_INET]213.232.87.83:443, sid=9c40c085 662390ef
Wed Sep 30 11:29:05 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Sep 30 11:29:06 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Sep 30 11:29:06 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Sep 30 11:29:06 2020 VERIFY KU OK
Wed Sep 30 11:29:06 2020 Validating certificate extended key usage
Wed Sep 30 11:29:06 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 30 11:29:06 2020 VERIFY EKU OK
Wed Sep 30 11:29:06 2020 VERIFY OK: depth=0, CN=nl876.nordvpn.com
Wed Sep 30 11:29:06 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Sep 30 11:29:06 2020 [nl876.nordvpn.com] Peer Connection Initiated with [AF_INET]213.232.87.83:443
Wed Sep 30 11:29:07 2020 SENT CONTROL [nl876.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Wed Sep 30 11:29:07 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.3 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: timers and/or timeouts modified
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: compression parms modified
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Wed Sep 30 11:29:07 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: --ifconfig/up options modified
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: route options modified
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: route-related options modified
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: peer-id set
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Wed Sep 30 11:29:07 2020 OPTIONS IMPORT: data channel crypto options modified
Wed Sep 30 11:29:07 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Wed Sep 30 11:29:07 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 11:29:07 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Wed Sep 30 11:29:07 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Wed Sep 30 11:29:07 2020 TUN/TAP device tun0 opened
Wed Sep 30 11:29:07 2020 TUN/TAP TX queue length set to 100
Wed Sep 30 11:29:07 2020 /sbin/ip link set dev tun0 up mtu 1500
Wed Sep 30 11:29:07 2020 /sbin/ip addr add dev tun0 10.7.3.3/24 broadcast 10.7.3.255
Wed Sep 30 11:29:07 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.3.3 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.3.3 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.3.3
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Wed Sep 30 11:29:07 2020 /sbin/ip route add 213.232.87.83/32 via 172.17.0.1
Wed Sep 30 11:29:07 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.3.1
Wed Sep 30 11:29:07 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.3.1
Wed Sep 30 11:29:07 2020 Initialization Sequence Completed
Wed Sep 30 11:30:36 2020 event_wait : Interrupted system call (code=4)
Wed Sep 30 11:30:36 2020 /sbin/ip route del 213.232.87.83/32
Wed Sep 30 11:30:36 2020 /sbin/ip route del 0.0.0.0/1
Wed Sep 30 11:30:36 2020 /sbin/ip route del 128.0.0.0/1
Wed Sep 30 11:30:36 2020 Closing TUN/TAP interface
Wed Sep 30 11:30:36 2020 /sbin/ip addr del dev tun0 10.7.3.3/24
Wed Sep 30 11:30:36 2020 /etc/openvpn/tunnelDown.sh tun0 1500 1587 10.7.3.3 255.255.255.0 init
Wed Sep 30 11:30:36 2020 SIGTERM[hard,] received, process exiting
Using OpenVPN provider: NORDVPN
2020-10-01 18:37:35 Checking curl installation
2020-10-01 18:37:35 Removing existing configs
2020-10-01 18:37:35 Selecting the best server...
2020-10-01 18:37:35 Searching for group: legacy_p2p
2020-10-01 18:37:35 Searching for technology: openvpn_tcp
2020-10-01 18:37:35 Best server : nl889.nordvpn.com
2020-10-01 18:37:35 Downloading config: default.ovpn
2020-10-01 18:37:35 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl889.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2808  100  2808    0     0   3804      0 --:--:-- --:--:-- --:--:--  3799
2020-10-01 18:37:35 Selecting the best server...
2020-10-01 18:37:35 Searching for country : NL (153)
2020-10-01 18:37:35 Searching for group: legacy_p2p
2020-10-01 18:37:35 Searching for technology: openvpn_tcp
2020-10-01 18:37:35 Best server : nl889.nordvpn.com
2020-10-01 18:37:35 Downloading config: nl889.nordvpn.com.ovpn
2020-10-01 18:37:35 Downloading from: https://downloads.nordcdn.com/configs/files/ovpn_tcp/servers/nl889.nordvpn.com.tcp.ovpn
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  2808  100  2808    0     0  55058      0 --:--:-- --:--:-- --:--:-- 55058
2020-10-01 18:37:35 Checking line endings
2020-10-01 18:37:35 Updating configs for docker-transmission-openvpn
Starting OpenVPN using config nl889.nordvpn.com.ovpn
Setting OPENVPN credentials...
adding route to local network 192.168.1.0/24 via 172.17.0.1 dev eth0
Thu Oct  1 18:37:36 2020 OpenVPN 2.4.7 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on May 27 2020
Thu Oct  1 18:37:36 2020 library versions: OpenSSL 1.1.1c  28 May 2019, LZO 2.10
Thu Oct  1 18:37:36 2020 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
Thu Oct  1 18:37:36 2020 NOTE: --fast-io is disabled since we are not using UDP
Thu Oct  1 18:37:36 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Oct  1 18:37:36 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Thu Oct  1 18:37:36 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]213.232.87.109:443
Thu Oct  1 18:37:36 2020 Socket Buffers: R=[131072->131072] S=[16384->16384]
Thu Oct  1 18:37:36 2020 Attempting to establish TCP connection with [AF_INET]213.232.87.109:443 [nonblock]
Thu Oct  1 18:37:37 2020 TCP connection established with [AF_INET]213.232.87.109:443
Thu Oct  1 18:37:37 2020 TCP_CLIENT link local: (not bound)
Thu Oct  1 18:37:37 2020 TCP_CLIENT link remote: [AF_INET]213.232.87.109:443
Thu Oct  1 18:37:37 2020 TLS: Initial packet from [AF_INET]213.232.87.109:443, sid=47928ceb d79fe19a
Thu Oct  1 18:37:37 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Thu Oct  1 18:37:38 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Thu Oct  1 18:37:38 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Thu Oct  1 18:37:38 2020 VERIFY KU OK
Thu Oct  1 18:37:38 2020 Validating certificate extended key usage
Thu Oct  1 18:37:38 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Oct  1 18:37:38 2020 VERIFY OK: depth=0, CN=nl889.nordvpn.com
Thu Oct  1 18:37:38 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Thu Oct  1 18:37:38 2020 [nl889.nordvpn.com] Peer Connection Initiated with [AF_INET]213.232.87.109:443
Thu Oct  1 18:37:39 2020 SENT CONTROL [nl889.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Thu Oct  1 18:37:39 2020 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.3.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.3.9 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: timers and/or timeouts modified
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: compression parms modified
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
Thu Oct  1 18:37:39 2020 Socket Buffers: R=[131072->425984] S=[87040->425984]
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: --ifconfig/up options modified
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: route options modified
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: route-related options modified
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: peer-id set
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: adjusting link_mtu to 1659
Thu Oct  1 18:37:39 2020 OPTIONS IMPORT: data channel crypto options modified
Thu Oct  1 18:37:39 2020 Data Channel: using negotiated cipher 'AES-256-GCM'
Thu Oct  1 18:37:39 2020 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct  1 18:37:39 2020 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Oct  1 18:37:39 2020 ROUTE_GATEWAY 172.17.0.1/255.255.0.0 IFACE=eth0 HWADDR=02:42:ac:11:00:02
Thu Oct  1 18:37:39 2020 TUN/TAP device tun0 opened
Thu Oct  1 18:37:39 2020 TUN/TAP TX queue length set to 100
Thu Oct  1 18:37:39 2020 /sbin/ip link set dev tun0 up mtu 1500
Thu Oct  1 18:37:39 2020 /sbin/ip addr add dev tun0 10.7.3.9/24 broadcast 10.7.3.255
Thu Oct  1 18:37:39 2020 /etc/openvpn/tunnelUp.sh tun0 1500 1587 10.7.3.9 255.255.255.0 init
Up script executed with tun0 1500 1587 10.7.3.9 255.255.255.0 init
Updating TRANSMISSION_BIND_ADDRESS_IPV4 to the ip of tun0 : 10.7.3.9
Generating transmission settings.json from env variables
sed'ing True to true

-------------------------------------
Transmission will run as
-------------------------------------
User name:   root
User uid:    0
User gid:    0
-------------------------------------

STARTING TRANSMISSION
NO PORT UPDATER FOR THIS PROVIDER
Transmission startup script complete.
Thu Oct  1 18:37:39 2020 /sbin/ip route add 213.232.87.109/32 via 172.17.0.1
Thu Oct  1 18:37:39 2020 /sbin/ip route add 0.0.0.0/1 via 10.7.3.1
Thu Oct  1 18:37:39 2020 /sbin/ip route add 128.0.0.0/1 via 10.7.3.1
Thu Oct  1 18:37:39 2020 Initialization Sequence Completed                                                    

Host system: Windows 10 - 19041.508 Docker Desktop for Windows - 2.4.0.0 (48506)

If it matters: Duckdns updater v1.0.5 Caddy v2.1.1 Windows install, cannot get the service to run in NSSM

Thank you for your efforts!

ilike2burnthing commented 4 years ago

Add: --dns 1.1.1.1 --dns 1.0.0.1 or --dns 8.8.8.8 --dns 8.8.4.4 or --dns 1.1.1.1 --dns 8.8.8.8 or any other DNS of your choosing to your Docker run command.

Aekaz commented 4 years ago

Add: --dns 1.1.1.1 --dns 1.0.0.1 or --dns 8.8.8.8 --dns 8.8.4.4 or --dns 1.1.1.1 --dns 8.8.8.8 or any other DNS of your choosing to your Docker run command.

I forgot to mention that before posting this, I already tried adding

--dns 8.8.8.8
--dns 8.8.4.4

Which kept my container for constantly restarting. Sadly I deleted it so I can't post logs anymore.

I just now tried adding 1.1.1.1 & 1.0.0.1 and now it seems to be working; I can ping google.com & see tracker announces. Maybe something else was wrong somewhere...

Thanks for your support!