Giter VIP home page Giter VIP logo

Comments (3)

morpheusthewhite avatar morpheusthewhite commented on June 14, 2024

Try to execute nordpy from command line, connect and disconnect and paste here the logs on the terminal

from nordpy.

PL7963 avatar PL7963 commented on June 14, 2024

Connect

captured grep
# Warning: iptables-legacy tables present, use iptables-legacy-save to see them
Turning on killswitch
Default interface: wlxf4285317a477
IP and port of the VPN server: 167.88.10.163 443
Network address on wlxf4285317a477: 169.254.0.0/16
Launching tcp connection with 167.88.10.163:443 on wlxf4285317a477 (on network 169.254.0.0/16)
[OPENVPN]: Wed Jan 27 16:59:19 2021 OpenVPN 2.4.4 x86_64-unknown-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [MH/PKTINFO] [AEAD] built on Jan 27 2021
[OPENVPN]: Wed Jan 27 16:59:19 2021 library versions: OpenSSL 1.1.1f  31 Mar 2020, LZO 2.10
[OPENVPN]: Wed Jan 27 16:59:19 2021 NOTE: the current --script-security setting may allow this configuration to call user-defined scripts
[OPENVPN]: Wed Jan 27 16:59:19 2021 NOTE: --fast-io is disabled since we are not using UDP
[OPENVPN]: Wed Jan 27 16:59:19 2021 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
[OPENVPN]: Wed Jan 27 16:59:19 2021 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
[OPENVPN]: Wed Jan 27 16:59:19 2021 TCP/UDP: Preserving recently used remote address: [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:19 2021 Socket Buffers: R=[131072->131072] S=[16384->16384]
[OPENVPN]: Wed Jan 27 16:59:19 2021 Attempting to establish TCP connection with [AF_INET]167.88.10.163:443 [nonblock]
[OPENVPN]: Wed Jan 27 16:59:20 2021 TCP connection established with [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:20 2021 TCP_CLIENT link local: (not bound)
[OPENVPN]: Wed Jan 27 16:59:20 2021 TCP_CLIENT link remote: [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:21 2021 TLS: Initial packet from [AF_INET]167.88.10.163:443, sid=3b8c0351 d2b187be
[OPENVPN]: Wed Jan 27 16:59:21 2021 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY KU OK
[OPENVPN]: Wed Jan 27 16:59:21 2021 Validating certificate extended key usage
[OPENVPN]: Wed Jan 27 16:59:21 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY EKU OK
[OPENVPN]: Wed Jan 27 16:59:21 2021 VERIFY OK: depth=0, CN=us2947.nordvpn.com
[OPENVPN]: Wed Jan 27 16:59:22 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
[OPENVPN]: Wed Jan 27 16:59:22 2021 [us2947.nordvpn.com] Peer Connection Initiated with [AF_INET]167.88.10.163:443
[OPENVPN]: Wed Jan 27 16:59:23 2021 SENT CONTROL [us2947.nordvpn.com]: 'PUSH_REQUEST' (status=1)
[OPENVPN]: Wed Jan 27 16:59:23 2021 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 103.86.96.100,dhcp-option DNS 103.86.99.100,sndbuf 524288,rcvbuf 524288,explicit-exit-notify,comp-lzo no,route-gateway 10.7.0.1,topology subnet,ping 60,ping-restart 180,ifconfig 10.7.0.3 255.255.0.0,peer-id 0,cipher AES-256-GCM'
[OPENVPN]: Wed Jan 27 16:59:23 2021 Option 'explicit-exit-notify' in [PUSH-OPTIONS]:6 is ignored by previous <connection> blocks
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: timers and/or timeouts modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --explicit-exit-notify can only be used with --proto udp
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: compression parms modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --sndbuf/--rcvbuf options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 Socket Buffers: R=[131072->425984] S=[87040->425984]
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --ifconfig/up options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: route options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: route-related options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: peer-id set
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: adjusting link_mtu to 1659
[OPENVPN]: Wed Jan 27 16:59:23 2021 OPTIONS IMPORT: data channel crypto options modified
[OPENVPN]: Wed Jan 27 16:59:23 2021 Data Channel: using negotiated cipher 'AES-256-GCM'
[OPENVPN]: Wed Jan 27 16:59:23 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
[OPENVPN]: Wed Jan 27 16:59:23 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
[OPENVPN]: Wed Jan 27 16:59:23 2021 ROUTE_GATEWAY 192.168.50.1/255.255.255.0 IFACE=wlxf4285317a477 HWADDR=f4:28:53:17:a4:77
[OPENVPN]: Wed Jan 27 16:59:23 2021 TUN/TAP device tun0 opened
[OPENVPN]: Wed Jan 27 16:59:23 2021 TUN/TAP TX queue length set to 100
[OPENVPN]: Wed Jan 27 16:59:23 2021 do_ifconfig, tt->did_ifconfig_ipv6_setup=0
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/ifconfig tun0 10.7.0.3 netmask 255.255.0.0 mtu 1500 broadcast 10.7.255.255
[OPENVPN]: Wed Jan 27 16:59:23 2021 /home/peter/App/NordVPN/nordpy-master/scripts/nordpy_up.sh tun0 1500 1587 10.7.0.3 255.255.0.0 init
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/route add -net 167.88.10.163 netmask 255.255.255.255 gw 192.168.50.1
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/route add -net 0.0.0.0 netmask 128.0.0.0 gw 10.7.0.1
[OPENVPN]: Wed Jan 27 16:59:23 2021 /usr/sbin/route add -net 128.0.0.0 netmask 128.0.0.0 gw 10.7.0.1
[OPENVPN]: Wed Jan 27 16:59:23 2021 Initialization Sequence Completed

Disconnect

Turning off killswitch
looking for iptables in /home/peter/App/NordVPN/nordpy-master/stored_iptables

from nordpy.

morpheusthewhite avatar morpheusthewhite commented on June 14, 2024

It was most likely caused by iptables. Now nordpy fallbacks to use iptables-legacy, when present. It may need to be updated to use the new iptables, but for the moment it works

from nordpy.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.