mrahmadt / smartgw Goto Github PK
View Code? Open in Web Editor NEWDomain based VPN Gateway/Proxy for all devices
Domain based VPN Gateway/Proxy for all devices
Hi, I just see this project, jotyGill from openpyn-nordvpn inform me about this.
I've only some question.
Many thanks and have a nice day
Hey!
Don't know if it is on my side or if it is a normal behaviour because of docker, but all my domains are not stored so I would have to add them every time the server restarts or the docker service is reloaded. Is there any way to store the domains?
Thanks for your great app!
I read in a closed issue if were not using a vpn we just want DNS proxying we can ignore the VPN parts but it does not seem to work. Any ideas?
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn exited with code 1
sniproxyvpn exited with code 1
sniproxyvpn exited with code 1
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn exited with code 1
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn exited with code 1
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn | nordvpn username is empty
sniproxyvpn exited with code 1
```
Trying to run this on Raspberry Pi (Raspberry Pi OS) but no mater what I do, I end up with this error:
---> Running in 1b00e511b786
fetch https://dl-cdn.alpinelinux.org/alpine/edge/main/armv7/APKINDEX.tar.gz
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/main: temporary error (try again later)
WARNING: Ignoring APKINDEX.e37b76c2.tar.gz: No such file or directory
fetch https://dl-cdn.alpinelinux.org/alpine/edge/community/armv7/APKINDEX.tar.gz
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1995576224:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1913:
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/community: Permission denied
WARNING: Ignoring APKINDEX.d022dfc8.tar.gz: No such file or directory
OK: 4 MiB in 14 packages
fetch https://dl-cdn.alpinelinux.org/alpine/edge/main/armv7/APKINDEX.tar.gz
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/main: temporary error (try again later)
WARNING: Ignoring APKINDEX.e37b76c2.tar.gz: No such file or directory
fetch https://dl-cdn.alpinelinux.org/alpine/edge/community/armv7/APKINDEX.tar.gz
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:0D0D90AD:asn1 encoding routines:ASN1_TIME_adj:error getting time:crypto/asn1/a_time.c:330:
1996477344:error:1416F086:SSL routines:tls_process_server_certificate:certificate verify failed:ssl/statem/statem_clnt.c:1913:
ERROR: https://dl-cdn.alpinelinux.org/alpine/edge/community: Permission denied
WARNING: Ignoring APKINDEX.d022dfc8.tar.gz: No such file or directory
ERROR: unsatisfiable constraints:
runit (missing):
required by: world[runit]
Any suggestions?
Hey, there!
First, I've been looking for a solution like this for weeks!
This is EXACTLY what I need - except that I don't use NordVPN.
Please provide instructions on how I can modify this to work with other VPNs (custom .ovpn file)
This would really open this solution up to more people!
hello please help me i am facing vpn auth error . i also give the accurate username and password of nord vpn but same error.
sniproxyvpn | Mon Nov 9 17:30:31 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:30:31 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:31 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:30:31 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:30:31 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:31 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=3098b842 52d3123a
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:30:31 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:30:31 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:30:31 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:30:33 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:30:33 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:34 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:30:34 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:30:34 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:30:34 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:30:44 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:30:44 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:44 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:30:44 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:30:44 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:44 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=00963317 e2f389a4
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:30:44 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:30:44 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:30:44 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:30:46 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:30:46 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:48 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:30:48 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:30:48 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:30:48 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:30:58 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:30:58 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:58 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:30:58 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:30:58 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:30:58 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d03f9126 ae2beeac
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:30:58 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:30:58 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:30:58 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:00 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:00 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:01 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:01 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:01 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:01 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:11 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:11 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:11 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:11 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:11 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:11 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=59902c7a 01d1944d
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:11 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:11 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:11 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:13 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:13 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:15 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:15 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:15 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:15 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:25 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:25 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:25 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:25 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:25 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:25 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=bd79d468 0e93f1a5
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:25 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:25 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:25 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:27 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:27 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:28 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:28 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:28 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:28 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:38 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:38 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:38 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:38 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:38 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:38 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=329df2c6 d6676ec1
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:38 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:38 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:38 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:40 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:40 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:41 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:41 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:41 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:41 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:31:51 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:31:51 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:51 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:31:51 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:31:51 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:51 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d9248b89 11b59a05
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:31:52 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:31:52 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:31:52 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:31:54 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:31:54 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:31:55 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:31:55 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:31:55 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:31:55 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:05 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:05 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:05 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:05 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:05 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:05 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=0cd805e8 c452a2d5
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:05 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:05 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:05 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:07 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:07 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:08 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:08 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:08 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:08 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:18 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:18 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:18 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:18 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:18 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:18 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=8613145d 75db7c16
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:18 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:18 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:18 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:20 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:20 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:21 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:21 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:21 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:21 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:31 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:31 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:31 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:31 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:31 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:32 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=95675d9d 88d6523c
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:32 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:32 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:32 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:34 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:34 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:35 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:35 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:35 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:35 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:45 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:45 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:45 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:45 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:45 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:45 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=32289e25 93dcb7e2
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:45 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:45 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:45 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:32:47 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:32:47 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:48 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:32:49 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:32:49 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:32:49 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:32:59 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:32:59 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:59 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:32:59 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:32:59 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:32:59 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=70e68587 01a9c52d
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:32:59 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:32:59 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:32:59 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:01 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:01 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:02 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:02 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:02 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:02 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:12 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:12 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:12 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:12 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:12 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:12 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d2983803 0c809e55
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:12 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:12 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:12 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:14 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:14 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:15 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:15 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:15 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:15 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:25 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:25 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:25 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:25 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:25 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:25 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=17c5c6f6 e0b1e756
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:26 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:26 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:26 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:28 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:28 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:29 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:29 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:29 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:29 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:39 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:39 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:39 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:39 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:39 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:39 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=d0831d67 dbc26cf2
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:39 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:39 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:39 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
sniproxyvpn | Mon Nov 9 17:33:41 2020 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
sniproxyvpn | Mon Nov 9 17:33:41 2020 [us8028.nordvpn.com] Peer Connection Initiated with [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:42 2020 SENT CONTROL [us8028.nordvpn.com]: 'PUSH_REQUEST' (status=1)
sniproxyvpn | Mon Nov 9 17:33:42 2020 AUTH: Received control message: AUTH_FAILED
sniproxyvpn | Mon Nov 9 17:33:42 2020 SIGUSR1[soft,auth-failure] received, process restarting
sniproxyvpn | Mon Nov 9 17:33:42 2020 Restart pause, 10 second(s)
sniproxyvpn | Mon Nov 9 17:33:52 2020 WARNING: --ping should normally be used with --ping-restart or --ping-exit
sniproxyvpn | Mon Nov 9 17:33:52 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:52 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]
sniproxyvpn | Mon Nov 9 17:33:52 2020 UDP link local: (not bound)
sniproxyvpn | Mon Nov 9 17:33:52 2020 UDP link remote: [AF_INET]92.119.17.3:1194
sniproxyvpn | Mon Nov 9 17:33:52 2020 TLS: Initial packet from [AF_INET]92.119.17.3:1194, sid=5abc9a74 ca67a17f
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY OK: depth=1, C=PA, O=NordVPN, CN=NordVPN CA5
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY KU OK
sniproxyvpn | Mon Nov 9 17:33:52 2020 Validating certificate extended key usage
sniproxyvpn | Mon Nov 9 17:33:52 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY EKU OK
sniproxyvpn | Mon Nov 9 17:33:52 2020 VERIFY OK: depth=0, CN=us8028.nordvpn.com
Great work !
Now can you build/add a DIY SmartDNS Proxy in addition to the smartVPN with a Linux server/ OpenWrt router?
The main problem with VPNs is encryption kills speed in many cases, and what if you only want geo unlocking or other proxy services by setting up your own server to eliminate 3rd party payments/snooping ?
A declarative, efficient, and flexible JavaScript library for building user interfaces.
๐ Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
An Open Source Machine Learning Framework for Everyone
The Web framework for perfectionists with deadlines.
A PHP framework for web artisans
Bring data to life with SVG, Canvas and HTML. ๐๐๐
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
Some thing interesting about web. New door for the world.
A server is a program made to process requests and deliver data to clients.
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
Some thing interesting about visualization, use data art
Some thing interesting about game, make everyone happy.
We are working to build community through open source technology. NB: members must have two-factor auth.
Open source projects and samples from Microsoft.
Google โค๏ธ Open Source for everyone.
Alibaba Open Source for everyone
Data-Driven Documents codes.
China tencent open source team.