GEGEMON
BANNED | Редактировать | Профиль | Сообщение | Цитировать | Сообщить модератору [Aug 1, 2023, 13:47:06] OpenVPN core 3.8connect1 win x86_64 64-bit OVPN-DCO built on Jun 26 2023 16:08:41 ⏎[Aug 1, 2023, 13:47:06] Frame=512/2112/512 mssfix-ctrl=1250 ⏎[Aug 1, 2023, 13:47:06] EVENT: RESOLVE ⏎[Aug 1, 2023, 13:47:06] Contacting 51.68.172.4:8080 via HTTP Proxy ⏎[Aug 1, 2023, 13:47:06] EVENT: WAIT_PROXY ⏎[Aug 1, 2023, 13:47:06] WinCommandAgent: transmitting bypass route to 51.68.172.4 { "host" : "51.68.172.4", "ipv6" : false } ⏎[Aug 1, 2023, 13:47:07] EVENT: WAIT ⏎[Aug 1, 2023, 13:47:07] TO PROXY: CONNECT 51.68.172.4:1194 HTTP/1.0 Host: 51.68.172.4 ⏎[Aug 1, 2023, 13:47:07] FROM PROXY: HTTP/1.1 200 Connection established ⏎[Aug 1, 2023, 13:47:07] Connecting to [51.68.172.4]:1194 (51.68.172.4) via TCPv4-via-HTTP ⏎[Aug 1, 2023, 13:47:07] EVENT: CONNECTING ⏎[Aug 1, 2023, 13:47:07] Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,cipher AES-256-CBC,auth SHA1,keysize 256,key-method 2,tls-client ⏎[Aug 1, 2023, 13:47:07] Creds: Username/Password ⏎[Aug 1, 2023, 13:47:07] Peer Info: IV_VER=3.8connect1 IV_PLAT=win IV_NCP=2 IV_TCPNL=1 IV_PROTO=990 IV_MTU=1600 IV_CIPHERS=AES-128-CBC:AES-192-CBC:AES-256-CBC:AES-128-GCM:AES-192-GCM:AES-256-GCM:CHACHA20-POLY1305 IV_LZO=1 IV_GUI_VER=OCWindows_3.4.0-3121 IV_SSO=webauth,openurl,crtext |