Sat Nov 12 21:25:24 2016 WARNING: No server certificate verification method has been enabled. See
http://openvpn.net/howto.html#mitm for more info.
Sat Nov 12 21:25:24 2016 Socket Buffers: R=[212992->212992] S=[212992->212992]
Sat Nov 12 21:25:24 2016 UDPv4 link local: [undef]
Sat Nov 12 21:25:24 2016 UDPv4 link remote: [AF_INET]212.129.33.61:40000
Sat Nov 12 21:25:26 2016 TLS: Initial packet from [AF_INET]212.129.33.61:40000, sid=aa7ba7ff f786c823
Sat Nov 12 21:25:26 2016 WARNING: this configuration may cache passwords in memory -- use the auth-nocache option to prevent this
Sat Nov 12 21:25:26 2016 VERIFY OK: depth=1, C=MT, ST=MLT, L=Valletta, O=FreeVPN.me, OU=FreeVPN.me, CN=FreeVPN.me CA, name=FreeVPN.me, emailAddress=contact@freevpn.me
Sat Nov 12 21:25:26 2016 VERIFY OK: depth=0, C=MT, ST=MLT, L=Valletta, O=FreeVPN.me, OU=FreeVPN.me, CN=FreeVPN.me, name=FreeVPN.me, emailAddress=contact@freevpn.me
Sat Nov 12 21:25:30 2016 Data Channel Encrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Nov 12 21:25:30 2016 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Nov 12 21:25:30 2016 Data Channel Decrypt: Cipher 'AES-128-CBC' initialized with 128 bit key
Sat Nov 12 21:25:30 2016 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sat Nov 12 21:25:30 2016 Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 2048 bit RSA
Sat Nov 12 21:25:30 2016 [FreeVPN.me] Peer Connection Initiated with [AF_INET]212.129.33.61:40000
Sat Nov 12 21:25:32 2016 SENT CONTROL [FreeVPN.me]: 'PUSH_REQUEST' (status=1)
Sat Nov 12 21:25:32 2016 AUTH: Received control message: AUTH_FAILED
Sat Nov 12 21:25:32 2016 SIGTERM[soft,auth-failure] received, process exiting