Had no trouble with VPNme for a few years, tried to trouble shoot
by replacing certificate to no avail. Their FAQ says this may mean I
have an issue with my clock, but I don't see it. Should I just get my
configuration somewhere else, or is there another way I can trouble
shoot.
*Tunnelblick: macOS 10.14.3; Tunnelblick 3.7.8 (build 5180); prior version 3.7.7 (build 5150); Admin user
git commit 75a15f3fcb6de5a66bb6b7175b720645332ee778
Configuration VPNme us-east 2
"Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk:
client
proto udp
remote
us-east.l.vpnme.com 1194
cipher aes-256-cbc
persist-key
tls-client
ns-cert-type server
pull
redirect-gateway def1
dev tun
nobind
mute-replay-warnings
<ca>
[Security-related line(s) omitted]
</ca>
<cert>
[Security-related line(s) omitted]
</cert>
<key>
[Security-related line(s) omitted]
</key>
================================================================================
Non-Apple kexts that are loaded:
Index Refs Address Size Wired Name (Version) UUID <Linked Against>
================================================================================
Files in VPNme us-east 2.tblk:
Contents/Resources/config.ovpn
================================================================================
Configuration preferences:
-skipWarningThatMayNotConnectInFutureBecauseOfOpenVPNOptions = 1
-lastConnectionSucceeded = 0
================================================================================
Wildcard preferences:
================================================================================
Program preferences:
placeIconInStandardPositionInStatusBar = 1
launchAtNextLogin = 1
notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0
tunnelblickVersionHistory = (
"3.7.8 (build 5180)",
"3.7.7 (build 5150)",
"3.7.6a (build 5080)",
"3.7.6 (build 5060)",
"3.7.5a (build 5011)",
"3.7.5 (build 5010)",
"3.7.4 (build 4900)",
"3.7.4b (build 4921)",
"3.7.4a (build 4920)",
"3.7.4 (build 4900)"
)
lastLaunchTime = 580232963.6856869
lastLanguageAtLaunchWasRTL = 0
connectionWindowDisplayCriteria = showWhenConnecting
maxLogDisplaySize = 102400
lastConnectedDisplayName = VPNme us-east
keyboardShortcutIndex = 1
updateCheckAutomatically = 1
NSWindow Frame ConnectingWindow = 525 517 389 187 0 0 1440 877
NSWindow Frame SUStatusFrame = 520 561 400 129 0 0 1440 877
NSWindow Frame SUUpdateAlert = 410 363 620 392 0 0 1440 877
detailsWindowFrameVersion = 5180
detailsWindowFrame = {{434, 409}, {920, 468}}
detailsWindowLeftFrame = {{0, 0}, {165, 350}}
detailsWindowViewIndex = 0
detailsWindowConfigurationsTabIdentifier = log
leftNavSelectedDisplayName = VPNme us-east 2
AdvancedWindowTabIdentifier = sounds
haveDealtWithOldTunTapPreferences = 1
haveDealtWithOldLoginItem = 1
haveDealtWithAfterDisconnect = 1
SUEnableAutomaticChecks = 1
SUScheduledCheckInterval = 86400
SUSendProfileInfo = 1
SULastCheckTime = 2019-05-22 15:49:23 +0000
SULastProfileSubmissionDate = 2019-05-17 12:45:11 +0000
SUHasLaunchedBefore = 1
WebKitDefaultFontSize = 16
WebKitStandardFont = Times
userAgreementVersionAgreedTo = 1
askedUserIfOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
haveDealtWithSparkle1dot5b6 = 1
updateSendProfileInfo = 1
================================================================================
Tunnelblick Log:
*Tunnelblick: macOS 10.14.3; Tunnelblick 3.7.8 (build 5180); prior version 3.7.7 (build 5150)
2019-05-22 11:49:49 *Tunnelblick: Attempting connection with VPNme us-east 2; Set nameserver = 769; monitoring connection
2019-05-22
11:49:49 *Tunnelblick: openvpnstart start VPNme\ us-east\ 2.tblk 55901
769 0 3 0 1065264 -ptADGNWradsgnw 2.4.6-openssl-1.0.2q
2019-05-22 11:49:50 *Tunnelblick: openvpnstart log:
OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
/Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.6-openssl-1.0.2q/openvpn
--daemon
--log /Library/Application
Support/Tunnelblick/Logs/-SLibrary-SApplication
Support-STunnelblick-SShared-SVPNme us--east
2.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_1065264.55901.openvpn.log
--cd /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources
--setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5180 3.7.8 (build 5180)"
--verb 3
--config /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources/config.ovpn
--setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application
Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources
--verb 3
--cd /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources
--management 127.0.0.1 55901 /Library/Application Support/Tunnelblick/jkpcjllaaajkbebkhchncpgemjelffgfjcenpmhh.mip
--management-query-passwords
--management-hold
--script-security 2
--up /Applications/Tunnelblick.app/Contents/Resources/
client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
--down /Applications/Tunnelblick.app/Contents/Resources/
client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
2019-05-22
11:49:49 OpenVPN 2.4.6 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4]
[PKCS11] [MH/RECVDA] [AEAD] built on Nov 29 2018
2019-05-22 11:49:49 library versions: OpenSSL 1.0.2q 20 Nov 2018, LZO 2.10
2019-05-22 11:49:49 MANAGEMENT: TCP Socket listening on [AF_INET]
127.0.0.1:559012019-05-22 11:49:49 Need hold release from management interface, waiting...
2019-05-22 11:49:49 *Tunnelblick: openvpnstart starting OpenVPN
2019-05-22 11:49:50 *Tunnelblick: Established communication with OpenVPN
2019-05-22 11:49:50 >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
2019-05-22 11:49:50 MANAGEMENT: Client connected from [AF_INET]
127.0.0.1:559012019-05-22 11:49:50 MANAGEMENT: CMD 'pid'
2019-05-22 11:49:50 MANAGEMENT: CMD 'auth-retry interact'
2019-05-22 11:49:50 MANAGEMENT: CMD 'state on'
2019-05-22 11:49:50 MANAGEMENT: CMD 'state'
2019-05-22 11:49:50 MANAGEMENT: CMD 'bytecount 1'
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=2326c32a 4e925509
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=a9502d87 9d53e550
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=420cdea4 330cbe06
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=8741efaf bebb41f7
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=95979773 898d2ef8
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=044e390c 8dbb0654
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=745d0892 e6aaa231
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=86b7c9a3 2e9fca49
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=2d1712c8 fee4811e
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=c67da815 cab7632a
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=d0d7c5e2 ff539627
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=c4605655 cc278152
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=2cad723b f37a6691
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=fdd652f0 c40d61bd
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=eb95aa97 7bd4bbf7
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=f03b1886 3b78e7c0
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=700e0e53 6e027355
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=a82c413e 79e51157
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=8c7660fd f8098ea3
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=9ce1d535 96872628
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=748a7870 21028478
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=e435c7b5 a50949d3
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=156d0566 a72eba98
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=19c5f9d7 40322979
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=4d07a16a 12e3462b
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=00b4609e 176c6c1d
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=d15f2969 e383350e
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=ed5e4ecf 0fd83804
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=ecae7292 15f1ff41
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=d551b597 cc3c14f0
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=ba45834d 4ae21365
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=45c70665 f6a53a20
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=e7ff73f7 d854c3b7
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=bff14437 d003bf3a
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=8a9f1f76 671d0153
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=bad8eeb8 82754563
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=83d5c0d8 8ccb74b5
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=7025a0d9 1ab7b696
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=6e6665ff aa4eb3c5
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=8afc088d a166adf5
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=b7483d7d ef0522bb
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=42e36145 f927bae7
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=e65ad55e 9584e24d
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=d4bbeb04 bbb80ce8
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=fe1c1442 5ca08d4c
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=9225d5dd 83b2c14c
2019-05-22 11:49:56 *Tunnelblick: Disconnecting; notification window disconnect button pressed
2019-05-22 11:49:56 *Tunnelblick: No 'pre-disconnect.sh' script to execute
2019-05-22 11:49:56 *Tunnelblick: Disconnecting using 'kill'
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=94fecd71 50599457
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=4588ba04 68e53f55
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED. Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]
64.156.30.82:11942019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]
64.156.30.82:1194, sid=54bd59a4 1a4bec22
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=
in...@vpnme.com2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=
us-east.l.vpnme.com2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:57 SIGTERM[hard,init_instance] received, process exiting
2019-05-22 11:49:57 MANAGEMENT: >STATE:1558540197,EXITING,init_instance,,,,,
2019-05-22 11:49:58 *Tunnelblick: No 'post-disconnect.sh' script to execute
2019-05-22 11:49:58 *Tunnelblick: Expected disconnection occurred.
================================================================================
"Sanitized" full configuration file
# VPNme config
client
proto udp
remote
us-east.l.vpnme.com 1194
cipher aes-256-cbc
persist-key
tls-client
ns-cert-type server
pull
redirect-gateway def1
dev tun
nobind
mute-replay-warnings
<ca>
[Security-related line(s) omitted]
</ca>
<cert>
[Security-related line(s) omitted]
</cert>
<key>
[Security-related line(s) omitted]
</key>
================================================================================
Network services:
An asterisk (*) denotes that a network service is disabled.
SAMSUNG Modem
Wi-Fi
iPhone USB
Bluetooth PAN
Thunderbolt Bridge
Wi-Fi Power (en0): On
================================================================================
ifconfig output:
lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
inet 127.0.0.1 netmask 0xff000000
inet6 ::1 prefixlen 128
inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
XHC20: flags=0<> mtu 0
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
ether 60:f8:1d:b3:b8:28
inet 192.168.1.118 netmask 0xffffff00 broadcast 192.168.1.255
media: autoselect
status: active
p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
ether 02:f8:1d:b3:b8:28
media: autoselect
status: inactive
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484
ether ea:62:50:06:0e:09
inet6 fe80::e862:50ff:fe06:e09%awdl0 prefixlen 64 scopeid 0x7
nd6 options=201<PERFORMNUD,DAD>
media: autoselect
status: active
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether 72:00:04:5a:26:00
media: autoselect <full-duplex>
status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
options=60<TSO4,TSO6>
ether 72:00:04:5a:26:01
media: autoselect <full-duplex>
status: inactive
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
options=63<RXCSUM,TXCSUM,TSO4,TSO6>
ether 72:00:04:5a:26:00
Configuration:
id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
ipfilter disabled flags 0x2
member: en1 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 8 priority 0 path cost 0
member: en2 flags=3<LEARNING,DISCOVER>
ifmaxaddr 0 port 9 priority 0 path cost 0
nd6 options=201<PERFORMNUD,DAD>
media: <unknown type>
status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
inet6 fe80::7376:2e73:da8:994%utun0 prefixlen 64 scopeid 0xb
nd6 options=201<PERFORMNUD,DAD>
================================================================================
Console Log:
2019-05-22 11:47:11 Tunnelblick[5765] The OpenVPN log contains the following message:
"error=certificate has expired:".
One or more of the certificates used to secure this configuration have expired.
See the VPN log in the "Log" tab of the "Configurations" panel of
Tunnelblick's "VPN Details" window for details.
2019-05-22 11:48:42
Tunnelblick[5765] Set 'expect disconnect 1 -SLibrary-SApplication
Support-STunnelblick-SShared-SVPNme us--east
2-Dtblk-SContents-SResources'
2019-05-22 11:48:55 Tunnelblick[5765] The OpenVPN log contains the following message:
"error=certificate has expired:".
One or more of the certificates used to secure this configuration have expired.
See the VPN log in the "Log" tab of the "Configurations" panel of
Tunnelblick's "VPN Details" window for details.
2019-05-22 11:49:17
Tunnelblick[5765] applicationShouldTerminate: termination because of
Quit; delayed until 'shutdownTunnelblick' finishes
2019-05-22 11:49:17 Tunnelblick[5765] Set 'expect disconnect 0 ALL'
2019-05-22 11:49:17 Tunnelblick[5765] Finished shutting down Tunnelblick; allowing termination
2019-05-22 11:49:22 Tunnelblick[8715] Tunnelblick: macOS 10.14.3; Tunnelblick 3.7.8 (build 5180)
2019-05-22
11:49:23 Tunnelblick[8715] DEPRECATED USE in libdispatch client:
dispatch source activated with no event handler set; set a breakpoint on
_dispatch_bug_deprecated to debug
2019-05-22 11:49:23 Tunnelblick[8715] Sparkle: ===== Tunnelblick =====
2019-05-22 11:49:23 Tunnelblick[8715] Sparkle: Verified appcast signature
2019-05-22
11:49:49 Tunnelblick[8715] Cleared 'expect disconnect 0
-SLibrary-SApplication Support-STunnelblick-SShared-SVPNme us--east
2-Dtblk-SContents-SResources'
2019-05-22 11:49:51 Tunnelblick[8715] The OpenVPN log contains the following message:
"error=certificate has expired:".
One or more of the certificates used to secure this configuration have expired.
See the VPN log in the "Log" tab of the "Configurations" panel of
Tunnelblick's "VPN Details" window for details.
2019-05-22 11:49:57
Tunnelblick[8715] Set 'expect disconnect 1 -SLibrary-SApplication
Support-STunnelblick-SShared-SVPNme us--east
2-Dtblk-SContents-SResources'