-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Container receives SIGTERM and exits #2130
Comments
Well, |
had the same issue here, it's on a synology running the latest DSM 7, something changed with the last 2 DSM security patches as it started acting up after that. current test config: |
Hi team, I'm facing the exact same issue on a Synology DS1019+. The biggest issue for me is that once the container restart, Transmission automatically rescan ALL my torrent and it takes days (a couple of TB here)!!! I guess maybe the container is stopped abruptly causing some I/O errors in some files... Is there a way to correct it so Transmission doesn't rescan all my torrent please? Am I missing something? Here are my logs:
Thank you for your support! |
@Hebusing are you using two of the same container using the same transmission-home? |
@pkishino, Thank you for your reply. |
I am also experiencing this issue since the latest Synology DSM update. Something seems to have broken in compatibility with Synology completely. This is not an auto-restart problem, if you turn that off it just stops, period. There is something that is causing the container to exit improperly because something won't execute when it goes to execute some code and it crashes out. Even running the container with the highest privileges does not correct this issue. Synology broke something here. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. |
Feel free to re-open this issue if you think it deserves another look. |
I've been having this issue for a while and I can't track down the cause.
From what I can tell, it's when I download at full speed (12 MB/s). It's almost like something is getting overwhelmed. This might also be because the only time I notice the issue is when I'm using it. It does also fail my docker healthcheck.
I'm not sure how else I can troubleshoot it. |
I've been having the same issue for a while now as well. It just keeps dieing. |
I have the same issue. Seeding works just fine, but once I turn on any download whole docker engine just stops almost immediately. I am on macOS. |
I have this issue as well. I am using HIDEME, and I have been trying to troubleshoot this. Docker version 4.15.0 (93002) |
This issue is still relevant on Synology NAS:
|
I have the same issue as well (Synology Nas). I'd suggest reopening the issue. Thanks 👍 |
Any news or hints/suggestions to fix or help fixing this? |
possible causes: https://www.sparklabs.com/support/kb/article/error-inactivity-timeout-ping-restart/ what to do: contact your vpn provider. |
I found that whenever internet connection is lost, the transmission container stops. It doesn’t matter if it’s a brief interruption caused by modem, router or cable in/out. |
Please collect logs then from v4 and v5 to compare |
All fixed: changed restart: 5 to always. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. |
Same for me, set up kubernetes pod, after removing pod, but keeping PVC, transmission shows 0 torrents, thus there are plenty in download dirl. |
Also found that downgrading to v4 stops it from happening Unfortunately I can't see much different in the logs other than it doesn't get a SIGTERM and it doesn't restart, so nothing that would be useful for diagnosing issues. I'm using NordVPN, for reference. |
Same for me all of a sudden,
|
expected behaviour of the container when openvpn has lat connection, transmission is stopped, and so is the container. |
image v4 has transmission v3, image v5 has transmission v4, 3 years between the two transmission versions, many things may have been changed. as stated in docs: https://github.com/transmission/transmission/blob/main/docs/Blocklists.md What blocklist does Transmission use? Transmission supports the P2P plaintext format, an issue already opened for that subject: #1162 |
Same for me, runs few seconds gets slower and then stops. Container crashes, starts up after a few and the same thing. |
How do we move forward from here? How do we fix this? Its clear its a Synology Nas update casuing the issue. Do we start login tickets with Synology? |
I'm also having the same issue and I'm not using a Synology NAS. It's a custom x86 setup running Debian. Here's my log snippet: STARTING TRANSMISSION
Transmission startup script complete.
2023-12-29 18:45:41 Initialization Sequence Completed
2023-12-29 18:48:38 event_wait : Interrupted system call (code=4)
2023-12-29 18:48:38 /etc/openvpn/tunnelDown.sh tun0 1500 1659 10.7.2.12 255.255.255.0 init
resolv.conf was restored
Sending kill signal to transmission-daemon
Waiting 5s for transmission-daemon to die
Sending kill signal (SIGKILL) to transmission-daemon
2023-12-29 18:48:43 net_route_v4_del: 185.153.179.128/32 via 172.18.0.1 dev [NULL] table 0 metric -1
2023-12-29 18:48:43 net_route_v4_del: 0.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
2023-12-29 18:48:43 net_route_v4_del: 128.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
2023-12-29 18:48:43 Closing TUN/TAP interface
2023-12-29 18:48:43 net_addr_v4_del: 10.7.2.12 dev tun0
2023-12-29 18:48:43 SIGTERM[hard,] received, process exiting It's always just shy of 3 minutes. I even disabled AutoHeal, because I noticed that the container becomes unhealthy for a moment before it exits. So my question is does anyone have any idea how to determine what systemcall is failing? I tried the debug flag and it didn't help. I've also ensure that my VPN credentials are good (NordVPN) and even sanity checked by entering the wrong password and the container failed right away. I also I'm out of ideas and thinking of having a separate VPN container and using the regular Transmission instance. |
I’d suggest trying with a different provider (just get a trial amount or
such) for a bit and see if that makes a difference. Otherwise I suspect
some underlying fault in the openvpn library or such used..
…On Sat, 30 Dec 2023 at 10:55, Arsham Skrenes ***@***.***> wrote:
I'm also having the same issue and I'm not using a Synology NAS. It's a
custom x86 setup running Debian. Here's my log snippet:
STARTING TRANSMISSION
Transmission startup script complete.
2023-12-29 18:45:41 Initialization Sequence Completed
2023-12-29 18:48:38 event_wait : Interrupted system call (code=4)
2023-12-29 18:48:38 /etc/openvpn/tunnelDown.sh tun0 1500 1659 10.7.2.12 255.255.255.0 init
resolv.conf was restored
Sending kill signal to transmission-daemon
Waiting 5s for transmission-daemon to die
Sending kill signal (SIGKILL) to transmission-daemon
2023-12-29 18:48:43 net_route_v4_del: 185.153.179.128/32 via 172.18.0.1 dev [NULL] table 0 metric -1
2023-12-29 18:48:43 net_route_v4_del: 0.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
2023-12-29 18:48:43 net_route_v4_del: 128.0.0.0/1 via 10.7.2.1 dev [NULL] table 0 metric -1
2023-12-29 18:48:43 Closing TUN/TAP interface
2023-12-29 18:48:43 net_addr_v4_del: 10.7.2.12 dev tun0
2023-12-29 18:48:43 SIGTERM[hard,] received, process exiting
It's always just shy of 3 minutes. I even disabled AutoHeal, because I
noticed that the container becomes unhealthy for a moment before it exits.
So my question is does anyone have any idea how to determine what
systemcall is failing? I tried the debug flag and it didn't help.
I've also ensure that my VPN credentials are good (NordVPN) and even
sanity checked by entering the wrong password and the container failed
right away. I also bashed into the container and checked connectivity and
it's definitely going through the VPN since it has a different IP. For good
measure, I also manually assigned the DNS 1.1.1.1 and it made no
difference.
I'm out of ideas and thinking of having a separate VPN container and using
the regular Transmission instance.
—
Reply to this email directly, view it on GitHub
<#2130 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AA7OFYTM6UPHTTNZJ7RND73YL5YAFAVCNFSM5K466LN2U5DIOJSWCZC7NNSXTN2JONZXKZKDN5WW2ZLOOQ5TCOBXGI2DENBVG43A>
.
You are receiving this because you modified the open/close state.Message
ID: ***@***.***
com>
|
Thanks @pkishino. You lead me down the path of some more code sleuthing and after days of struggling with this on and off, I decided to define the So my suggestion for everyone is to read your logs carefully and define anything that the logs are complaining about. In my case this was |
Unfortunately @skrenes's suggestion of setting the additional NORDVPN variables didn't help me as they were already set. However, their previous comment mentioning Autoheal solved it for me - the health check was failing, so Autoheal was restarting the container - this is why there was nothing in the container logs before the SIGTERM, as it was Autoheal triggering it. Now the container is running and downloading, just as an unhealthy container. |
haugene/vpn-configs-contrib#258 (comment) Some others have found |
Looking good so far, thanks @ilike2burnthing. |
This is working for me on a Synology NAS, do note that I it’s not the latest release (because 5.1.0 just works). version: "3.9" |
Update: it hasn't helped, been restarting a lot today with both github.com and 1.1.1.1 for the health check endpoint and Auto heal running. |
What do the health check logs show? |
Typically, it's working at the moment, so nothing but healthy pings. Will update here next time I see it is unhealthy. |
Still failing for me to, with in 30 seconds or so. |
Working all of a sudden after the last Synology patch. |
I have to comment to this issue. I had lots of issues previously with container failing. I had to manually start it sometimes 1-2 times in a day or longest time was maybe 2 days without container exiting. I upgraded to newest [v5.3.1] version on 22.3 and my container is still up without issues. I didn´t change any vpn configurations. Looks promising, needs more time to give the final verdict though. And I´m using PIA vpn as a provider. |
Can you elaborate on how you turn off autoheal pls? |
Sorry, I should have been clearer, I'm referring to the Autoheal container, which monitors for containers that are failing health checks and restarts them. I just stopped the container whilst debugging the issue. |
Not sure, but its working at the moment, only changed the version from 3.0 to 3.3
Good luck |
Unfortunately container still fails after some time. Yesterday I tried @Silversurfer79 settings as I also have PIA. No luck with them(container failed couple hours later) but I noticed that you changed the version. Are these version numbers same as in release versions? I use docker run so I haven't tried specifying version numbers at all. I'm running latest image. |
So no dice still crashes randomly, but alot more recenelty than it has previously. Anyone using any other solution, the dev seems to have stopped with this container. |
Is there a pinned issue for this?
Is there an existing or similar issue/discussion for this?
Is there any comment in the documentation for this?
Is this related to a provider?
Are you using the latest release?
Have you tried using the dev branch latest?
Config used
{
"alt-speed-down": 3000,
"alt-speed-enabled": true,
"alt-speed-time-begin": 660,
"alt-speed-time-day": 127,
"alt-speed-time-enabled": true,
"alt-speed-time-end": 1380,
"alt-speed-up": 50,
"bind-address-ipv4": "10.8.8.5",
"bind-address-ipv6": "::",
"blocklist-enabled": false,
"blocklist-url": "http://www.example.com/blocklist",
"cache-size-mb": 4,
"dht-enabled": true,
"download-dir": "/data/Downloads",
"download-limit": 100,
"download-limit-enabled": 0,
"download-queue-enabled": false,
"download-queue-size": 5,
"encryption": 1,
"idle-seeding-limit": 30,
"idle-seeding-limit-enabled": false,
"incomplete-dir": "/data/Downloads",
"incomplete-dir-enabled": true,
"lpd-enabled": false,
"max-peers-global": 200,
"message-level": 2,
"peer-congestion-algorithm": "",
"peer-id-ttl-hours": 6,
"peer-limit-global": 750,
"peer-limit-per-torrent": 50,
"peer-port": 51413,
"peer-port-random-high": 65535,
"peer-port-random-low": 49152,
"peer-port-random-on-start": false,
"peer-socket-tos": "default",
"pex-enabled": true,
"port-forwarding-enabled": false,
"preallocation": 1,
"prefetch-enabled": true,
"queue-stalled-enabled": true,
"queue-stalled-minutes": 30,
"ratio-limit": 3,
"ratio-limit-enabled": true,
"rename-partial-files": true,
"rpc-authentication-required": false,
"rpc-bind-address": "0.0.0.0",
"rpc-enabled": true,
"rpc-host-whitelist": "",
"rpc-host-whitelist-enabled": false,
"rpc-password": "PASSWORDHERE",
"rpc-port": 9091,
"rpc-url": "/transmission/",
"rpc-username": "USERNAMEHERE",
"rpc-whitelist": "127.0.0.1",
"rpc-whitelist-enabled": false,
"scrape-paused-torrents-enabled": true,
"script-torrent-done-enabled": false,
"script-torrent-done-filename": "/data/transmission-home/watcher.py",
"seed-queue-enabled": false,
"seed-queue-size": 10,
"speed-limit-down": 1000000,
"speed-limit-down-enabled": false,
"speed-limit-up": 50,
"speed-limit-up-enabled": false,
"start-added-torrents": true,
"trash-original-torrent-files": false,
"umask": 2,
"upload-slots-per-torrent": 14,
"utp-enabled": false,
"watch-dir": "/data/watch",
"watch-dir-enabled": true,
"watch-dir-force-generic": false
}
Current Behavior
Containers stops at random times. Usually stays up from a few hours to a day.
Log shows
event_wait : Interrupted system call (code=4)
andSIGTERM received, sending exit notification to peer
.It doesn't restart after the error.
Expected Behavior
Container keeps running or at least restarts when there's an error
How have you tried to solve the problem?
Log output
STARTING TRANSMISSION
Transmission startup script complete.
Thu Dec 23 10:44:17 2021 /sbin/ip route add 66.115.147.77/32 via 10.5.0.1
Thu Dec 23 10:44:17 2021 /sbin/ip route add 0.0.0.0/1 via 10.8.8.1
Thu Dec 23 10:44:17 2021 /sbin/ip route add 128.0.0.0/1 via 10.8.8.1
Thu Dec 23 10:44:17 2021 Initialization Sequence Completed
Thu Dec 23 11:40:23 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 11:40:23 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 11:40:23 2021 VERIFY KU OK
Thu Dec 23 11:40:23 2021 Validating certificate extended key usage
Thu Dec 23 11:40:23 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 11:40:23 2021 VERIFY EKU OK
Thu Dec 23 11:40:23 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 11:40:23 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 11:40:23 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 11:40:23 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 11:40:23 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 11:40:23 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 11:40:23 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 12:36:46 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 12:36:46 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 12:36:46 2021 VERIFY KU OK
Thu Dec 23 12:36:46 2021 Validating certificate extended key usage
Thu Dec 23 12:36:46 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 12:36:46 2021 VERIFY EKU OK
Thu Dec 23 12:36:46 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 12:36:46 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 12:36:46 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 12:36:46 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 12:36:46 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 12:36:46 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 12:36:46 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 13:33:09 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 13:33:09 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 13:33:09 2021 VERIFY KU OK
Thu Dec 23 13:33:09 2021 Validating certificate extended key usage
Thu Dec 23 13:33:09 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 13:33:09 2021 VERIFY EKU OK
Thu Dec 23 13:33:09 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 13:33:09 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 13:33:09 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 13:33:09 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 13:33:09 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 13:33:09 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 13:33:09 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 14:29:32 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 14:29:32 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 14:29:32 2021 VERIFY KU OK
Thu Dec 23 14:29:32 2021 Validating certificate extended key usage
Thu Dec 23 14:29:32 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 14:29:32 2021 VERIFY EKU OK
Thu Dec 23 14:29:32 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 14:29:32 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 14:29:32 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 14:29:32 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 14:29:32 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 14:29:32 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 14:29:32 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 15:25:55 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 15:25:55 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 15:25:55 2021 VERIFY KU OK
Thu Dec 23 15:25:55 2021 Validating certificate extended key usage
Thu Dec 23 15:25:55 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 15:25:55 2021 VERIFY EKU OK
Thu Dec 23 15:25:55 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 15:25:55 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 15:25:55 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 15:25:55 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 15:25:55 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 15:25:55 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 15:25:55 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 16:22:18 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 16:22:18 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 16:22:18 2021 VERIFY KU OK
Thu Dec 23 16:22:18 2021 Validating certificate extended key usage
Thu Dec 23 16:22:18 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 16:22:18 2021 VERIFY EKU OK
Thu Dec 23 16:22:18 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 16:22:18 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 16:22:18 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 16:22:18 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 16:22:18 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 16:22:18 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 16:22:18 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 17:18:41 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 17:18:41 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 17:18:41 2021 VERIFY KU OK
Thu Dec 23 17:18:41 2021 Validating certificate extended key usage
Thu Dec 23 17:18:41 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 17:18:41 2021 VERIFY EKU OK
Thu Dec 23 17:18:41 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 17:18:41 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 17:18:41 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 17:18:41 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 17:18:41 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 17:18:41 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 17:18:41 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 18:15:04 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 18:15:04 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 18:15:04 2021 VERIFY KU OK
Thu Dec 23 18:15:04 2021 Validating certificate extended key usage
Thu Dec 23 18:15:04 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 18:15:04 2021 VERIFY EKU OK
Thu Dec 23 18:15:04 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 18:15:04 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 18:15:04 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 18:15:04 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 18:15:04 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 18:15:04 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 18:15:04 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 19:11:27 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 19:11:27 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 19:11:27 2021 VERIFY KU OK
Thu Dec 23 19:11:27 2021 Validating certificate extended key usage
Thu Dec 23 19:11:27 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 19:11:27 2021 VERIFY EKU OK
Thu Dec 23 19:11:27 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 19:11:27 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 19:11:27 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 19:11:27 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 19:11:27 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 19:11:27 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 19:11:27 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 20:07:50 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 20:07:50 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 20:07:50 2021 VERIFY KU OK
Thu Dec 23 20:07:50 2021 Validating certificate extended key usage
Thu Dec 23 20:07:50 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 20:07:50 2021 VERIFY EKU OK
Thu Dec 23 20:07:50 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 20:07:50 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 20:07:50 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 20:07:50 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 20:07:50 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 20:07:50 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 20:07:50 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 21:04:13 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 21:04:13 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 21:04:13 2021 VERIFY KU OK
Thu Dec 23 21:04:13 2021 Validating certificate extended key usage
Thu Dec 23 21:04:13 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 21:04:13 2021 VERIFY EKU OK
Thu Dec 23 21:04:13 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 21:04:13 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 21:04:13 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 21:04:13 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 21:04:13 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 21:04:13 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 21:04:13 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 22:00:36 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 22:00:36 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 22:00:36 2021 VERIFY KU OK
Thu Dec 23 22:00:36 2021 Validating certificate extended key usage
Thu Dec 23 22:00:36 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 22:00:36 2021 VERIFY EKU OK
Thu Dec 23 22:00:36 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 22:00:36 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 22:00:36 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 22:00:36 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 22:00:36 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 22:00:36 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 22:00:36 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 22:56:59 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 22:56:59 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 22:56:59 2021 VERIFY KU OK
Thu Dec 23 22:56:59 2021 Validating certificate extended key usage
Thu Dec 23 22:56:59 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 22:56:59 2021 VERIFY EKU OK
Thu Dec 23 22:56:59 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 22:56:59 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 22:56:59 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 22:56:59 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 22:56:59 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 22:56:59 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 22:56:59 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Thu Dec 23 23:53:22 2021 VERIFY OK: depth=2, C=VG, O=Surfshark, CN=Surfshark Root CA
Thu Dec 23 23:53:22 2021 VERIFY OK: depth=1, C=VG, O=Surfshark, CN=Surfshark Intermediate CA
Thu Dec 23 23:53:22 2021 VERIFY KU OK
Thu Dec 23 23:53:22 2021 Validating certificate extended key usage
Thu Dec 23 23:53:22 2021 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Thu Dec 23 23:53:22 2021 VERIFY EKU OK
Thu Dec 23 23:53:22 2021 VERIFY OK: depth=0, CN=ca-van-v018.prod.surfshark.com
Thu Dec 23 23:53:22 2021 WARNING: 'link-mtu' is used inconsistently, local='link-mtu 1633', remote='link-mtu 1581'
Thu Dec 23 23:53:22 2021 WARNING: 'cipher' is used inconsistently, local='cipher AES-256-CBC', remote='cipher AES-256-GCM'
Thu Dec 23 23:53:22 2021 WARNING: 'auth' is used inconsistently, local='auth SHA512', remote='auth [null-digest]'
Thu Dec 23 23:53:22 2021 Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 23:53:22 2021 Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key
Thu Dec 23 23:53:22 2021 Control Channel: TLSv1.2, cipher TLSv1.2 ECDHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Fri Dec 24 00:00:03 2021 event_wait : Interrupted system call (code=4)
Fri Dec 24 00:00:03 2021 SIGTERM received, sending exit notification to peer
Fri Dec 24 00:00:04 2021 /etc/openvpn/tunnelDown.sh tun0 1500 1584 10.8.8.4 255.255.255.0 init
resolv.conf was restored
Sending kill signal to transmission-daemon
Waiting 5s for transmission-daemon to die
Successfuly closed transmission-daemon
Fri Dec 24 00:00:08 2021 /sbin/ip route del 66.115.147.77/32
Fri Dec 24 00:00:08 2021 /sbin/ip route del 0.0.0.0/1
Fri Dec 24 00:00:08 2021 /sbin/ip route del 128.0.0.0/1
Fri Dec 24 00:00:08 2021 Closing TUN/TAP interface
Fri Dec 24 00:00:08 2021 /sbin/ip addr del dev tun0 10.8.8.4/24
Fri Dec 24 00:00:08 2021 SIGTERM[soft,exit-with-notification] received, process exiting
Environment
Anything else?
No response
The text was updated successfully, but these errors were encountered: