VPNme certificate expired?

35 views
Skip to first unread message

Eli

unread,
May 22, 2019, 12:13:39 PM5/22/19
to tunnelblick-discuss
Had no trouble with VPNme for a few years, tried to trouble shoot by replacing certificate to no avail. Their FAQ says this may mean I have an issue with my clock, but I don't see it. Should I just get my configuration somewhere else, or is there another way I can trouble shoot.





*Tunnelblick: macOS 10.14.3; Tunnelblick 3.7.8 (build 5180); prior version 3.7.7 (build 5150); Admin user
git commit 75a15f3fcb6de5a66bb6b7175b720645332ee778


Configuration VPNme us-east 2

"Sanitized" condensed configuration file for /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk:

client
proto udp
remote us-east.l.vpnme.com 1194
cipher aes-256-cbc
persist-key
tls-client
ns-cert-type server
pull
redirect-gateway def1
dev tun
nobind
mute-replay-warnings
<ca>
[Security-related line(s) omitted]
</ca>
<cert>
[Security-related line(s) omitted]
</cert>
<key>
[Security-related line(s) omitted]
</key>


================================================================================

Non-Apple kexts that are loaded:

Index Refs Address            Size       Wired      Name (Version) UUID <Linked Against>

================================================================================

Files in VPNme us-east 2.tblk:
      Contents/Resources/config.ovpn

================================================================================

Configuration preferences:

-skipWarningThatMayNotConnectInFutureBecauseOfOpenVPNOptions = 1
-lastConnectionSucceeded = 0

================================================================================

Wildcard preferences:


================================================================================

Program preferences:

placeIconInStandardPositionInStatusBar = 1
launchAtNextLogin = 1
notOKToCheckThatIPAddressDidNotChangeAfterConnection = 0
tunnelblickVersionHistory = (
    "3.7.8 (build 5180)",
    "3.7.7 (build 5150)",
    "3.7.6a (build 5080)",
    "3.7.6 (build 5060)",
    "3.7.5a (build 5011)",
    "3.7.5 (build 5010)",
    "3.7.4 (build 4900)",
    "3.7.4b (build 4921)",
    "3.7.4a (build 4920)",
    "3.7.4 (build 4900)"
)
lastLaunchTime = 580232963.6856869
lastLanguageAtLaunchWasRTL = 0
connectionWindowDisplayCriteria = showWhenConnecting
maxLogDisplaySize = 102400
lastConnectedDisplayName = VPNme us-east
keyboardShortcutIndex = 1
updateCheckAutomatically = 1
NSWindow Frame ConnectingWindow = 525 517 389 187 0 0 1440 877
NSWindow Frame SUStatusFrame = 520 561 400 129 0 0 1440 877
NSWindow Frame SUUpdateAlert = 410 363 620 392 0 0 1440 877
detailsWindowFrameVersion = 5180
detailsWindowFrame = {{434, 409}, {920, 468}}
detailsWindowLeftFrame = {{0, 0}, {165, 350}}
detailsWindowViewIndex = 0
detailsWindowConfigurationsTabIdentifier = log
leftNavSelectedDisplayName = VPNme us-east 2
AdvancedWindowTabIdentifier = sounds
haveDealtWithOldTunTapPreferences = 1
haveDealtWithOldLoginItem = 1
haveDealtWithAfterDisconnect = 1
SUEnableAutomaticChecks = 1
SUScheduledCheckInterval = 86400
SUSendProfileInfo = 1
SULastCheckTime = 2019-05-22 15:49:23 +0000
SULastProfileSubmissionDate = 2019-05-17 12:45:11 +0000
SUHasLaunchedBefore = 1
WebKitDefaultFontSize = 16
WebKitStandardFont = Times
userAgreementVersionAgreedTo = 1
askedUserIfOKToCheckThatIPAddressDidNotChangeAfterConnection = 1
haveDealtWithSparkle1dot5b6 = 1
updateSendProfileInfo = 1

================================================================================

Tunnelblick Log:

*Tunnelblick: macOS 10.14.3; Tunnelblick 3.7.8 (build 5180); prior version 3.7.7 (build 5150)
2019-05-22 11:49:49 *Tunnelblick: Attempting connection with VPNme us-east 2; Set nameserver = 769; monitoring connection
2019-05-22 11:49:49 *Tunnelblick: openvpnstart start VPNme\ us-east\ 2.tblk 55901 769 0 3 0 1065264 -ptADGNWradsgnw 2.4.6-openssl-1.0.2q
2019-05-22 11:49:50 *Tunnelblick: openvpnstart log:
     OpenVPN started successfully. Command used to start OpenVPN (one argument per displayed line):
    
          /Applications/Tunnelblick.app/Contents/Resources/openvpn/openvpn-2.4.6-openssl-1.0.2q/openvpn
          --daemon
          --log /Library/Application Support/Tunnelblick/Logs/-SLibrary-SApplication Support-STunnelblick-SShared-SVPNme us--east 2.tblk-SContents-SResources-Sconfig.ovpn.769_0_3_0_1065264.55901.openvpn.log
          --cd /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources
          --setenv IV_GUI_VER "net.tunnelblick.tunnelblick 5180 3.7.8 (build 5180)"
          --verb 3
          --config /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources/config.ovpn
          --setenv TUNNELBLICK_CONFIG_FOLDER /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources
          --verb 3
          --cd /Library/Application Support/Tunnelblick/Shared/VPNme us-east 2.tblk/Contents/Resources
          --management 127.0.0.1 55901 /Library/Application Support/Tunnelblick/jkpcjllaaajkbebkhchncpgemjelffgfjcenpmhh.mip
          --management-query-passwords
          --management-hold
          --script-security 2
          --up /Applications/Tunnelblick.app/Contents/Resources/client.up.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw
          --down /Applications/Tunnelblick.app/Contents/Resources/client.down.tunnelblick.sh -9 -d -f -m -w -ptADGNWradsgnw

2019-05-22 11:49:49 OpenVPN 2.4.6 x86_64-apple-darwin [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [MH/RECVDA] [AEAD] built on Nov 29 2018
2019-05-22 11:49:49 library versions: OpenSSL 1.0.2q  20 Nov 2018, LZO 2.10
2019-05-22 11:49:49 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:55901
2019-05-22 11:49:49 Need hold release from management interface, waiting...
2019-05-22 11:49:49 *Tunnelblick: openvpnstart starting OpenVPN
2019-05-22 11:49:50 *Tunnelblick: Established communication with OpenVPN
2019-05-22 11:49:50 >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
2019-05-22 11:49:50 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:55901
2019-05-22 11:49:50 MANAGEMENT: CMD 'pid'
2019-05-22 11:49:50 MANAGEMENT: CMD 'auth-retry interact'
2019-05-22 11:49:50 MANAGEMENT: CMD 'state on'
2019-05-22 11:49:50 MANAGEMENT: CMD 'state'
2019-05-22 11:49:50 MANAGEMENT: CMD 'bytecount 1'
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=2326c32a 4e925509
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=a9502d87 9d53e550
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=420cdea4 330cbe06
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=8741efaf bebb41f7
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=95979773 898d2ef8
2019-05-22 11:49:50 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:50 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:50 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:50 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:50 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:50 TLS Error: TLS handshake failed
2019-05-22 11:49:50 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:50 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,RESOLVE,,,,,,
2019-05-22 11:49:50 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:50 UDP link local: (not bound)
2019-05-22 11:49:50 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,WAIT,,,,,,
2019-05-22 11:49:50 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:50 MANAGEMENT: >STATE:1558540190,AUTH,,,,,,
2019-05-22 11:49:50 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=044e390c 8dbb0654
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=745d0892 e6aaa231
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=86b7c9a3 2e9fca49
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=2d1712c8 fee4811e
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=c67da815 cab7632a
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=d0d7c5e2 ff539627
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=c4605655 cc278152
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,AUTH,,,,,,
2019-05-22 11:49:51 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=2cad723b f37a6691
2019-05-22 11:49:51 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:51 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:51 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:51 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:51 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:51 TLS Error: TLS handshake failed
2019-05-22 11:49:51 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:51 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:51 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,RESOLVE,,,,,,
2019-05-22 11:49:51 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:51 UDP link local: (not bound)
2019-05-22 11:49:51 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:51 MANAGEMENT: >STATE:1558540191,WAIT,,,,,,
2019-05-22 11:49:51 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=fdd652f0 c40d61bd
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=eb95aa97 7bd4bbf7
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=f03b1886 3b78e7c0
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=700e0e53 6e027355
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=a82c413e 79e51157
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=8c7660fd f8098ea3
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=9ce1d535 96872628
2019-05-22 11:49:52 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:52 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:52 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:52 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:52 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:52 TLS Error: TLS handshake failed
2019-05-22 11:49:52 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:52 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,RESOLVE,,,,,,
2019-05-22 11:49:52 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:52 UDP link local: (not bound)
2019-05-22 11:49:52 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,WAIT,,,,,,
2019-05-22 11:49:52 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:52 MANAGEMENT: >STATE:1558540192,AUTH,,,,,,
2019-05-22 11:49:52 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=748a7870 21028478
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=e435c7b5 a50949d3
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=156d0566 a72eba98
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=19c5f9d7 40322979
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=4d07a16a 12e3462b
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=00b4609e 176c6c1d
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=d15f2969 e383350e
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:53 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:53 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:53 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:53 TLS Error: TLS handshake failed
2019-05-22 11:49:53 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:53 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,RESOLVE,,,,,,
2019-05-22 11:49:53 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:53 UDP link local: (not bound)
2019-05-22 11:49:53 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,WAIT,,,,,,
2019-05-22 11:49:53 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:53 MANAGEMENT: >STATE:1558540193,AUTH,,,,,,
2019-05-22 11:49:53 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=ed5e4ecf 0fd83804
2019-05-22 11:49:53 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:53 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=ecae7292 15f1ff41
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=d551b597 cc3c14f0
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=ba45834d 4ae21365
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=45c70665 f6a53a20
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=e7ff73f7 d854c3b7
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=bff14437 d003bf3a
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,AUTH,,,,,,
2019-05-22 11:49:54 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=8a9f1f76 671d0153
2019-05-22 11:49:54 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:54 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:54 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:54 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:54 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:54 TLS Error: TLS handshake failed
2019-05-22 11:49:54 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:54 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:54 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,RESOLVE,,,,,,
2019-05-22 11:49:54 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:54 UDP link local: (not bound)
2019-05-22 11:49:54 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:54 MANAGEMENT: >STATE:1558540194,WAIT,,,,,,
2019-05-22 11:49:54 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=bad8eeb8 82754563
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=83d5c0d8 8ccb74b5
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=7025a0d9 1ab7b696
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=6e6665ff aa4eb3c5
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=8afc088d a166adf5
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=b7483d7d ef0522bb
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=42e36145 f927bae7
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:55 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,WAIT,,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,AUTH,,,,,,
2019-05-22 11:49:55 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=e65ad55e 9584e24d
2019-05-22 11:49:55 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:55 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:55 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:55 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:55 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:55 TLS Error: TLS handshake failed
2019-05-22 11:49:55 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:55 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:55 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:55 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:55 MANAGEMENT: >STATE:1558540195,RESOLVE,,,,,,
2019-05-22 11:49:55 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:55 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:55 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=d4bbeb04 bbb80ce8
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=fe1c1442 5ca08d4c
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=9225d5dd 83b2c14c
2019-05-22 11:49:56 *Tunnelblick: Disconnecting; notification window disconnect button pressed
2019-05-22 11:49:56 *Tunnelblick: No 'pre-disconnect.sh' script to execute
2019-05-22 11:49:56 *Tunnelblick: Disconnecting using 'kill'
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=94fecd71 50599457
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=4588ba04 68e53f55
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 WARNING: --ns-cert-type is DEPRECATED.  Use --remote-cert-tls instead.
2019-05-22 11:49:56 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RESOLVE,,,,,,
2019-05-22 11:49:56 TCP/UDP: Preserving recently used remote address: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 Socket Buffers: R=[786896->786896] S=[9216->9216]
2019-05-22 11:49:56 UDP link local: (not bound)
2019-05-22 11:49:56 UDP link remote: [AF_INET]64.156.30.82:1194
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,WAIT,,,,,,
2019-05-22 11:49:56 MANAGEMENT: CMD 'hold release'
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,AUTH,,,,,,
2019-05-22 11:49:56 TLS: Initial packet from [AF_INET]64.156.30.82:1194, sid=54bd59a4 1a4bec22
2019-05-22 11:49:56 VERIFY OK: depth=1, C=US, ST=Delaware, L=Wilmington, O=VPNme, CN=VPNme CA, emailAddress=in...@vpnme.com
2019-05-22 11:49:56 VERIFY ERROR: depth=0, error=certificate has expired: CN=us-east.l.vpnme.com
2019-05-22 11:49:56 OpenSSL: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
2019-05-22 11:49:56 TLS_ERROR: BIO read tls_read_plaintext error
2019-05-22 11:49:56 TLS Error: TLS object -> incoming plaintext read error
2019-05-22 11:49:56 TLS Error: TLS handshake failed
2019-05-22 11:49:56 SIGUSR1[soft,tls-error] received, process restarting
2019-05-22 11:49:56 MANAGEMENT: >STATE:1558540196,RECONNECTING,tls-error,,,,,
2019-05-22 11:49:57 SIGTERM[hard,init_instance] received, process exiting
2019-05-22 11:49:57 MANAGEMENT: >STATE:1558540197,EXITING,init_instance,,,,,
2019-05-22 11:49:58 *Tunnelblick: No 'post-disconnect.sh' script to execute
2019-05-22 11:49:58 *Tunnelblick: Expected disconnection occurred.

================================================================================

"Sanitized" full configuration file

# VPNme config
client
proto udp
remote us-east.l.vpnme.com 1194
cipher aes-256-cbc
persist-key
tls-client
ns-cert-type server
pull
redirect-gateway def1
dev tun
nobind
mute-replay-warnings
<ca>
 [Security-related line(s) omitted]
</ca>
<cert>
 [Security-related line(s) omitted]
</cert>
<key>
 [Security-related line(s) omitted]
</key>



================================================================================

Network services:

An asterisk (*) denotes that a network service is disabled.
SAMSUNG Modem
Wi-Fi
iPhone USB
Bluetooth PAN
Thunderbolt Bridge

Wi-Fi Power (en0): On

================================================================================

ifconfig output:

lo0: flags=8049<UP,LOOPBACK,RUNNING,MULTICAST> mtu 16384
    options=1203<RXCSUM,TXCSUM,TXSTATUS,SW_TIMESTAMP>
    inet 127.0.0.1 netmask 0xff000000
    inet6 ::1 prefixlen 128
    inet6 fe80::1%lo0 prefixlen 64 scopeid 0x1
    nd6 options=201<PERFORMNUD,DAD>
gif0: flags=8010<POINTOPOINT,MULTICAST> mtu 1280
stf0: flags=0<> mtu 1280
XHC20: flags=0<> mtu 0
en0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    ether 60:f8:1d:b3:b8:28
    inet 192.168.1.118 netmask 0xffffff00 broadcast 192.168.1.255
    media: autoselect
    status: active
p2p0: flags=8843<UP,BROADCAST,RUNNING,SIMPLEX,MULTICAST> mtu 2304
    ether 02:f8:1d:b3:b8:28
    media: autoselect
    status: inactive
awdl0: flags=8943<UP,BROADCAST,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1484
    ether ea:62:50:06:0e:09
    inet6 fe80::e862:50ff:fe06:e09%awdl0 prefixlen 64 scopeid 0x7
    nd6 options=201<PERFORMNUD,DAD>
    media: autoselect
    status: active
en1: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
    options=60<TSO4,TSO6>
    ether 72:00:04:5a:26:00
    media: autoselect <full-duplex>
    status: inactive
en2: flags=8963<UP,BROADCAST,SMART,RUNNING,PROMISC,SIMPLEX,MULTICAST> mtu 1500
    options=60<TSO4,TSO6>
    ether 72:00:04:5a:26:01
    media: autoselect <full-duplex>
    status: inactive
bridge0: flags=8863<UP,BROADCAST,SMART,RUNNING,SIMPLEX,MULTICAST> mtu 1500
    options=63<RXCSUM,TXCSUM,TSO4,TSO6>
    ether 72:00:04:5a:26:00
    Configuration:
        id 0:0:0:0:0:0 priority 0 hellotime 0 fwddelay 0
        maxage 0 holdcnt 0 proto stp maxaddr 100 timeout 1200
        root id 0:0:0:0:0:0 priority 0 ifcost 0 port 0
        ipfilter disabled flags 0x2
    member: en1 flags=3<LEARNING,DISCOVER>
            ifmaxaddr 0 port 8 priority 0 path cost 0
    member: en2 flags=3<LEARNING,DISCOVER>
            ifmaxaddr 0 port 9 priority 0 path cost 0
    nd6 options=201<PERFORMNUD,DAD>
    media: <unknown type>
    status: inactive
utun0: flags=8051<UP,POINTOPOINT,RUNNING,MULTICAST> mtu 2000
    inet6 fe80::7376:2e73:da8:994%utun0 prefixlen 64 scopeid 0xb
    nd6 options=201<PERFORMNUD,DAD>

================================================================================

Console Log:

2019-05-22 11:47:11 Tunnelblick[5765] The OpenVPN log contains the following message:
                                      
                                       "error=certificate has expired:".
                                      
                                       One or more of the certificates used to secure this configuration have expired.
                                      
                                       See the VPN log in the "Log" tab of the "Configurations" panel of Tunnelblick's "VPN Details" window for details.
2019-05-22 11:48:42 Tunnelblick[5765] Set 'expect disconnect 1 -SLibrary-SApplication Support-STunnelblick-SShared-SVPNme us--east 2-Dtblk-SContents-SResources'
2019-05-22 11:48:55 Tunnelblick[5765] The OpenVPN log contains the following message:
                                      
                                       "error=certificate has expired:".
                                      
                                       One or more of the certificates used to secure this configuration have expired.
                                      
                                       See the VPN log in the "Log" tab of the "Configurations" panel of Tunnelblick's "VPN Details" window for details.
2019-05-22 11:49:17 Tunnelblick[5765] applicationShouldTerminate: termination because of Quit; delayed until 'shutdownTunnelblick' finishes
2019-05-22 11:49:17 Tunnelblick[5765] Set 'expect disconnect 0 ALL'
2019-05-22 11:49:17 Tunnelblick[5765] Finished shutting down Tunnelblick; allowing termination
2019-05-22 11:49:22 Tunnelblick[8715] Tunnelblick: macOS 10.14.3; Tunnelblick 3.7.8 (build 5180)
2019-05-22 11:49:23 Tunnelblick[8715] DEPRECATED USE in libdispatch client: dispatch source activated with no event handler set; set a breakpoint on _dispatch_bug_deprecated to debug
2019-05-22 11:49:23 Tunnelblick[8715] Sparkle: ===== Tunnelblick =====
2019-05-22 11:49:23 Tunnelblick[8715] Sparkle: Verified appcast signature
2019-05-22 11:49:49 Tunnelblick[8715] Cleared 'expect disconnect 0 -SLibrary-SApplication Support-STunnelblick-SShared-SVPNme us--east 2-Dtblk-SContents-SResources'
2019-05-22 11:49:51 Tunnelblick[8715] The OpenVPN log contains the following message:
                                      
                                       "error=certificate has expired:".
                                      
                                       One or more of the certificates used to secure this configuration have expired.
                                      
                                       See the VPN log in the "Log" tab of the "Configurations" panel of Tunnelblick's "VPN Details" window for details.
2019-05-22 11:49:57 Tunnelblick[8715] Set 'expect disconnect 1 -SLibrary-SApplication Support-STunnelblick-SShared-SVPNme us--east 2-Dtblk-SContents-SResources'


Tunnelblick developer

unread,
May 22, 2019, 12:33:06 PM5/22/19
to tunnelblick-discuss
Yes, a certificate has expired. Your clock is obviously OK (from the timestamps on the log entries).

You could do three things:
  1. Try other servers of theirs (assuming they have multiple servers). Maybe some of them won't have expired certificates.
  2. Try other versions of OpenVPN/SSL (in Tunnelblick on the "Settings" tab). Some versions of OpenSSL or LibreSSL may be more lenient about expirations than others.
  3. Set your computer's clock back a week or a month and see if you can connect. That would simply verify that the certificate has expired.
The following may seem obvious, but if/when you talk to their tech support, make sure that they are testing
  • Using the same configuration file, certificate file(s), etc. that you are using; and
  • With their computer's clock set at least 48 hours ahead of yours (to eliminate the possibility of time-zone problems); and
  • From outside of their own network. (That is, not from their internal LAN, but from, say, a cellular connection.)
If they can't supply you with a working setup you'll have to find another VPN service provider.

Eli

unread,
May 23, 2019, 11:58:11 AM5/23/19
to tunnelblick-discuss
Thank you, this is useful, if I end up changing providers is their a preferred provider for the Tunnelblick community, or a few that tend to keep certificates well up to date?

Tunnelblick developer

unread,
May 23, 2019, 3:00:10 PM5/23/19
to tunnelblick-discuss
Sorry, we don't make recommendations.

We do have a list of providers that have donated to Tunnelblick or are Mac and Tunnelblick friendly. Some have their own applications, but you can usually continue to use Tunnelblick with them.  See Getting VPN Service.
Reply all
Reply to author
Forward
0 new messages