Ubaid
Master
- Joined
- Jan 30, 2014
- Messages
- 1,096
- Reaction score
- 211
My nmd vpn is showing this error
Tue Feb 04 12:43:46 2014 NMDVPN 2.1.4 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Apr 25 2011
Tue Feb 04 12:43:46 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Feb 04 12:43:46 2014 NOTE: NMDVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Tue Feb 04 12:43:46 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Feb 04 12:43:46 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Feb 04 12:43:46 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Feb 04 12:43:46 2014 LZO compression initialized
Tue Feb 04 12:43:46 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Feb 04 12:43:46 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Feb 04 12:43:46 2014 Local Options hash (VER=V4): 'ee93268d'
Tue Feb 04 12:43:46 2014 Expected Remote Options hash (VER=V4): 'bd577cd1'
Tue Feb 04 12:43:46 2014 Attempting to establish TCP connection with 91.109.17.199:3128
Tue Feb 04 12:43:52 2014 TCP: connect to 91.109.17.199:3128 failed, will try again in 30 seconds: Connection refused (WSAECONNREFUSED)
Tue Feb 04 12:43:52 2014 SIGUSR1[soft,init_instance] received, process restarting
Tue Feb 04 12:43:46 2014 NMDVPN 2.1.4 i686-pc-mingw32 [SSL] [LZO2] [PKCS11] built on Apr 25 2011
Tue Feb 04 12:43:46 2014 WARNING: No server certificate verification method has been enabled. See http://openvpn.net/howto.html#mitm for more info.
Tue Feb 04 12:43:46 2014 NOTE: NMDVPN 2.1 requires '--script-security 2' or higher to call user-defined scripts or executables
Tue Feb 04 12:43:46 2014 Control Channel Authentication: tls-auth using INLINE static key file
Tue Feb 04 12:43:46 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Feb 04 12:43:46 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Tue Feb 04 12:43:46 2014 LZO compression initialized
Tue Feb 04 12:43:46 2014 Control Channel MTU parms [ L:1544 D:168 EF:68 EB:0 ET:0 EL:0 ]
Tue Feb 04 12:43:46 2014 Data Channel MTU parms [ L:1544 D:1450 EF:44 EB:135 ET:0 EL:0 AF:3/1 ]
Tue Feb 04 12:43:46 2014 Local Options hash (VER=V4): 'ee93268d'
Tue Feb 04 12:43:46 2014 Expected Remote Options hash (VER=V4): 'bd577cd1'
Tue Feb 04 12:43:46 2014 Attempting to establish TCP connection with 91.109.17.199:3128
Tue Feb 04 12:43:52 2014 TCP: connect to 91.109.17.199:3128 failed, will try again in 30 seconds: Connection refused (WSAECONNREFUSED)
Tue Feb 04 12:43:52 2014 SIGUSR1[soft,init_instance] received, process restarting