openpyn-nordvpn
openpyn-nordvpn copied to clipboard
Repeating SIGUSR1[soft,auth-failure] received, process restarting message
Sat Jul 11 01:24:07 2020 SIGUSR1[soft,auth-failure] received, process restarting This message restarts the whole process in 5-10 seconds and repeats. My email and password are perfect
Wed Sep 2 04:04:02 2020 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:7015
Wed Sep 2 04:04:02 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Wed Sep 2 04:04:02 2020 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed Sep 2 04:04:02 2020 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Wed Sep 2 04:04:02 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.204.163:1194
Wed Sep 2 04:04:02 2020 Socket Buffers: R=[786896->786896] S=[9216->9216]
Wed Sep 2 04:04:02 2020 UDP link local: (not bound)
Wed Sep 2 04:04:02 2020 UDP link remote: [AF_INET]37.120.204.163:1194
Wed Sep 2 04:04:02 2020 TLS: Initial packet from [AF_INET]37.120.204.163:1194, sid=a8a8733d e77d1bff
Wed Sep 2 04:04:02 2020 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Wed Sep 2 04:04:02 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Sep 2 04:04:02 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Sep 2 04:04:02 2020 VERIFY KU OK
Wed Sep 2 04:04:02 2020 Validating certificate extended key usage
Wed Sep 2 04:04:02 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 2 04:04:02 2020 VERIFY EKU OK
Wed Sep 2 04:04:02 2020 VERIFY OK: depth=0, CN=fr667.nordvpn.com
Wed Sep 2 04:04:04 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Sep 2 04:04:04 2020 [fr667.nordvpn.com] Peer Connection Initiated with [AF_INET]37.120.204.163:1194
Wed Sep 2 04:04:05 2020 SENT CONTROL [fr667.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Wed Sep 2 04:04:05 2020 AUTH: Received control message: AUTH_FAILED
Wed Sep 2 04:04:05 2020 SIGUSR1[soft,auth-failure] received, process restarting
Wed Sep 2 04:04:05 2020 **Restart pause, 10 second(s)**
Wed Sep 2 04:04:15 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
Wed Sep 2 04:04:15 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]37.120.204.163:1194
Wed Sep 2 04:04:15 2020 Socket Buffers: R=[786896->786896] S=[9216->9216]
Wed Sep 2 04:04:15 2020 UDP link local: (not bound)
Wed Sep 2 04:04:15 2020 UDP link remote: [AF_INET]37.120.204.163:1194
Wed Sep 2 04:04:15 2020 TLS: Initial packet from [AF_INET]37.120.204.163:1194, sid=c6c18445 01ec9e16
Wed Sep 2 04:04:15 2020 VERIFY OK: depth=2, C=PA, O=NordVPN, CN=NordVPN Root CA
Wed Sep 2 04:04:15 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
Wed Sep 2 04:04:15 2020 VERIFY KU OK
Wed Sep 2 04:04:15 2020 Validating certificate extended key usage
Wed Sep 2 04:04:15 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Wed Sep 2 04:04:15 2020 VERIFY EKU OK
Wed Sep 2 04:04:15 2020 VERIFY OK: depth=0, CN=fr667.nordvpn.com
Wed Sep 2 04:04:17 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
Wed Sep 2 04:04:17 2020 [fr667.nordvpn.com] Peer Connection Initiated with [AF_INET]37.120.204.163:1194
Wed Sep 2 04:04:18 2020 SENT CONTROL [fr667.nordvpn.com]: 'PUSH_REQUEST' (status=1)
Wed Sep 2 04:04:18 2020 AUTH: Received control message: AUTH_FAILED
Wed Sep 2 04:04:18 2020 SIGUSR1[soft,auth-failure] received, process restarting
Wed Sep 2 04:04:18 2020 **Restart pause, 10 second(s)**```
It's the same on mine, any advice please?
Same for me.