找回密码
 立即注册

QQ登录

只需一步,快速开始

搜索
广告投放联系QQ68610888
查看: 2111|回复: 0

openvirtual**自动断开问题

[复制链接]
发表于 2019-3-19 23:21 | 显示全部楼层 |阅读模式
openvirtual**过一段时间就断开,换了几个vps都一样
这个是日志,希望大哥们点解点解
Tue Mar 19 23:03:13 2019 Openvirtual** 2.4.7 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Feb 21 2019
Tue Mar 19 23:03:13 2019 Windows version 6.1 (Windows 7) 64bit
Tue Mar 19 23:03:13 2019 library versions: OpenSSL 1.1.0j  20 Nov 2018, LZO 2.10
Enter Management Password:
Tue Mar 19 23:03:13 2019 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25341
Tue Mar 19 23:03:13 2019 Need hold release from management interface, waiting...
Tue Mar 19 23:03:13 2019 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25341
Tue Mar 19 23:03:13 2019 MANAGEMENT: CMD 'state on'
Tue Mar 19 23:03:13 2019 MANAGEMENT: CMD 'log all on'
Tue Mar 19 23:03:13 2019 MANAGEMENT: CMD 'echo all on'
Tue Mar 19 23:03:13 2019 MANAGEMENT: CMD 'bytecount 5'
Tue Mar 19 23:03:14 2019 MANAGEMENT: CMD 'hold off'
Tue Mar 19 23:03:14 2019 MANAGEMENT: CMD 'hold release'
Tue Mar 19 23:03:14 2019 Outgoing Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Mar 19 23:03:14 2019 Incoming Control Channel Authentication: Using 512 bit message hash 'SHA512' for HMAC authentication
Tue Mar 19 23:03:14 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]47.106.178.38:8080
Tue Mar 19 23:03:14 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Mar 19 23:03:14 2019 Attempting to establish TCP connection with [AF_INET]47.106.178.38:8080 [nonblock]
Tue Mar 19 23:03:14 2019 MANAGEMENT: >STATE:1553007794,TCP_CONNECT,,,,,,
Tue Mar 19 23:03:15 2019 TCP connection established with [AF_INET]47.106.178.38:8080
Tue Mar 19 23:03:15 2019 Send to HTTP proxy: 'CONNECT XXXXXXX HTTP/1.0'
Tue Mar 19 23:03:15 2019 Send to HTTP proxy: 'virtual**: 127.0.0.1:443'
Tue Mar 19 23:03:15 2019 Send to HTTP proxy: 'POST http://XXXXXXX / HTTP/1.1'
Tue Mar 19 23:03:15 2019 Send to HTTP proxy: 'Host:xxxxxx'
Tue Mar 19 23:03:15 2019 HTTP proxy returned: 'HTTP/1.1 200 Connection Established'
Tue Mar 19 23:03:17 2019 TCP_CLIENT link local: (not bound)
Tue Mar 19 23:03:17 2019 TCP_CLIENT link remote: [AF_INET]47.106.178.38:8080
Tue Mar 19 23:03:17 2019 MANAGEMENT: >STATE:1553007797,WAIT,,,,,,
Tue Mar 19 23:03:17 2019 MANAGEMENT: >STATE:1553007797,AUTH,,,,,,
Tue Mar 19 23:03:17 2019 TLS: Initial packet from [AF_INET]47.106.178.38:8080, sid=d7afb45a 437fdaf9
Tue Mar 19 23:03:17 2019 VERIFY OK: depth=1, CN=ChangeMe
Tue Mar 19 23:03:17 2019 VERIFY KU OK
Tue Mar 19 23:03:17 2019 Validating certificate extended key usage
Tue Mar 19 23:03:17 2019 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Tue Mar 19 23:03:17 2019 VERIFY EKU OK
Tue Mar 19 23:03:17 2019 VERIFY OK: depth=0, CN=server
Tue Mar 19 23:03:17 2019 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Tue Mar 19 23:03:17 2019 [server] Peer Connection Initiated with [AF_INET]47.106.178.38:8080
Tue Mar 19 23:03:18 2019 MANAGEMENT: >STATE:1553007798,GET_CONFIG,,,,,,
Tue Mar 19 23:03:18 2019 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Tue Mar 19 23:03:19 2019 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 100.100.2.136,dhcp-option DNS 100.100.2.138,route-gateway 10.8.0.1,topology subnet,ping 1200,ping-restart 14400,ifconfig 10.8.0.2 255.255.255.0,peer-id 0,cipher AES-256-GCM'
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: timers and/or timeouts modified
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: --ifconfig/up options modified
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: route options modified
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: route-related options modified
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: peer-id set
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: adjusting link_mtu to 1626
Tue Mar 19 23:03:19 2019 OPTIONS IMPORT: data channel crypto options modified
Tue Mar 19 23:03:19 2019 Data Channel: using negotiated cipher 'AES-256-GCM'
Tue Mar 19 23:03:19 2019 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Mar 19 23:03:19 2019 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Tue Mar 19 23:03:19 2019 interactive service msg_channel=0
Tue Mar 19 23:03:19 2019 ROUTE_GATEWAY 192.168.42.129/255.255.255.0 I=25 HWADDR=be:53:fa:43:59:84
Tue Mar 19 23:03:19 2019 open_tun
Tue Mar 19 23:03:19 2019 TAP-WIN32 device [本地连接 7] opened: \\.\Global\{963ACAD1-3DF9-42CE-A78D-36CC151BDAE9}.tap
Tue Mar 19 23:03:19 2019 TAP-Windows Driver Version 9.21
Tue Mar 19 23:03:19 2019 Set TAP-Windows TUN subnet mode network/local/netmask = 10.8.0.0/10.8.0.2/255.255.255.0 [SUCCEEDED]
Tue Mar 19 23:03:19 2019 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.8.0.2/255.255.255.0 on interface {963ACAD1-3DF9-42CE-A78D-36CC151BDAE9} [DHCP-serv: 10.8.0.254, lease-time: 31536000]
Tue Mar 19 23:03:19 2019 Successful ARP Flush on interface [29] {963ACAD1-3DF9-42CE-A78D-36CC151BDAE9}
Tue Mar 19 23:03:19 2019 MANAGEMENT: >STATE:1553007799,ASSIGN_IP,,10.8.0.2,,,,
Tue Mar 19 23:03:19 2019 Block_DNS: WFP engine opened
Tue Mar 19 23:03:19 2019 Block_DNS: Using existing sublayer
Tue Mar 19 23:03:19 2019 Block_DNS: Added permit filters for exe_path
Tue Mar 19 23:03:19 2019 Block_DNS: Added block filters for all interfaces
Tue Mar 19 23:03:19 2019 Block_DNS: Added permit filters for TAP interface
Tue Mar 19 23:03:24 2019 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Tue Mar 19 23:03:24 2019 C:\Windows\system32\route.exe ADD 47.106.178.38 MASK 255.255.255.255 192.168.42.129
Tue Mar 19 23:03:24 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Tue Mar 19 23:03:24 2019 Route addition via IPAPI succeeded [adaptive]
Tue Mar 19 23:03:24 2019 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.8.0.1
Tue Mar 19 23:03:24 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
Tue Mar 19 23:03:24 2019 Route addition via IPAPI succeeded [adaptive]
Tue Mar 19 23:03:24 2019 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.8.0.1
Tue Mar 19 23:03:24 2019 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=3 and dwForwardType=4
Tue Mar 19 23:03:24 2019 Route addition via IPAPI succeeded [adaptive]
Tue Mar 19 23:03:24 2019 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Tue Mar 19 23:03:24 2019 Initialization Sequence Completed
Tue Mar 19 23:03:24 2019 MANAGEMENT: >STATE:1553007804,CONNECTED,SUCCESS,10.8.0.2,47.106.178.38,8080,192.168.42.172,64146
Tue Mar 19 23:16:25 2019 write TCP_CLIENT: Unknown error (code=10053)
Tue Mar 19 23:16:25 2019 Connection reset, restarting [-1]
Tue Mar 19 23:16:25 2019 SIGUSR1[soft,connection-reset] received, process restarting
Tue Mar 19 23:16:25 2019 MANAGEMENT: >STATE:1553008585,RECONNECTING,connection-reset,,,,,
Tue Mar 19 23:16:25 2019 Restart pause, 5 second(s)
Tue Mar 19 23:16:30 2019 TCP/UDP: Preserving recently used remote address: [AF_INET]47.106.178.38:8080
Tue Mar 19 23:16:30 2019 Socket Buffers: R=[8192->8192] S=[8192->8192]
Tue Mar 19 23:16:30 2019 Attempting to establish TCP connection with [AF_INET]47.106.178.38:8080 [nonblock]
Tue Mar 19 23:16:30 2019 MANAGEMENT: >STATE:1553008590,TCP_CONNECT,,,,,,
Tue Mar 19 23:16:31 2019 TCP connection established with [AF_INET]47.106.178.38:8080

相关帖子

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

有疑问请添加管理员QQ86788181|手机版|小黑屋|Archiver|恩山无线论坛(常州市恩山计算机开发有限公司版权所有) ( 苏ICP备05084872号 )

GMT+8, 2024-6-7 03:49

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

| 江苏省互联网有害信息举报中心 举报信箱:js12377 | @jischina.com.cn 举报电话:025-88802724 本站不良内容举报信箱:68610888@qq.com

快速回复 返回顶部 返回列表