Script started on Thu 22 Jun 2017 08:05:03 AM UTC ]0;robbat2@woodpecker:~/public_html/openvpn-2.4.3-weirdness/usrobbat2@woodpecker ~/public_html/openvpn-2.4.3-weirdness/us $ bash fetch.sh * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 80 (#0) > GET /community/releases/openvpn-2.4.3.tar.gz HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:05 GMT < Content-Type: application/octet-stream < Content-Length: 1422692 < Connection: keep-alive < Set-Cookie: __cfduid=d8fb09b0a09329a68f50e4cba0ead3ed11498118705; expires=Fri, 22-Jun-18 08:05:05 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 13:06:20 GMT < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:05 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db353618529e9-SEA < { [14089 bytes data] 1 1389k 1 17009 0 0 288k 0 0:00:04 --:--:-- 0:00:04 291k 100 1389k 100 1389k 0 0 7823k 0 --:--:-- --:--:-- --:--:-- 7849k * Connection #0 to host swupdate.openvpn.net left intact * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 80 (#0) > GET /community/releases/openvpn-2.4.3.tar.gz.asc HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:05 GMT < Content-Type: application/octet-stream < Content-Length: 819 < Connection: keep-alive < Set-Cookie: __cfduid=ded0e0d5ce72386ac42e661dd07cafbaa1498118705; expires=Fri, 22-Jun-18 08:05:05 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 10:19:35 GMT < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:05 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db35484ba0c3b-SEA < { [819 bytes data] 100 819 100 819 0 0 16376 0 --:--:-- --:--:-- --:--:-- 16714 * Connection #0 to host swupdate.openvpn.net left intact * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 443 (#0) * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [110 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2519 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate Status (22): { [479 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Client hello (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Client hello (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=US; ST=California; L=Pleasanton; O=OpenVPN Technologies, Inc.; CN=*.openvpn.net * start date: Mar 6 00:00:00 2017 GMT * expire date: May 13 12:00:00 2020 GMT * subjectAltName: host "swupdate.openvpn.net" matched cert's "*.openvpn.net" * issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA * SSL certificate verify ok. * SSL certificate status: good (0) } [5 bytes data] > GET /community/releases/openvpn-2.4.3.tar.gz HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > { [5 bytes data] < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:05 GMT < Content-Type: application/octet-stream < Content-Length: 1422692 < Connection: keep-alive < Set-Cookie: __cfduid=ded0e0d5ce72386ac42e661dd07cafbaa1498118705; expires=Fri, 22-Jun-18 08:05:05 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 13:06:20 GMT < ETag: "594a6f4c-15b564" < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:05 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db3553f5d0c3b-SEA < { [833 bytes data] 100 1389k 100 1389k 0 0 3812k 0 --:--:-- --:--:-- --:--:-- 3827k * Connection #0 to host swupdate.openvpn.net left intact * Trying 104.20.195.50... * TCP_NODELAY set % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0* Connected to swupdate.openvpn.net (104.20.195.50) port 443 (#0) * ALPN, offering http/1.1 * Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH * successfully set certificate verify locations: * CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs * TLSv1.2 (OUT), TLS header, Certificate Status (22): } [5 bytes data] * TLSv1.2 (OUT), TLS handshake, Client hello (1): } [512 bytes data] * TLSv1.2 (IN), TLS handshake, Server hello (2): { [110 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate (11): { [2519 bytes data] * TLSv1.2 (IN), TLS handshake, Certificate Status (22): { [479 bytes data] * TLSv1.2 (IN), TLS handshake, Server key exchange (12): { [333 bytes data] * TLSv1.2 (IN), TLS handshake, Server finished (14): { [4 bytes data] * TLSv1.2 (OUT), TLS handshake, Client key exchange (16): } [70 bytes data] * TLSv1.2 (OUT), TLS change cipher, Client hello (1): } [1 bytes data] * TLSv1.2 (OUT), TLS handshake, Finished (20): } [16 bytes data] * TLSv1.2 (IN), TLS change cipher, Client hello (1): { [1 bytes data] * TLSv1.2 (IN), TLS handshake, Finished (20): { [16 bytes data] * SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256 * ALPN, server accepted to use http/1.1 * Server certificate: * subject: C=US; ST=California; L=Pleasanton; O=OpenVPN Technologies, Inc.; CN=*.openvpn.net * start date: Mar 6 00:00:00 2017 GMT * expire date: May 13 12:00:00 2020 GMT * subjectAltName: host "swupdate.openvpn.net" matched cert's "*.openvpn.net" * issuer: C=US; O=DigiCert Inc; CN=DigiCert SHA2 Secure Server CA * SSL certificate verify ok. * SSL certificate status: good (0) } [5 bytes data] > GET /community/releases/openvpn-2.4.3.tar.gz.asc HTTP/1.1 > Host: swupdate.openvpn.net > User-Agent: curl/7.53.0 > Accept: */* > 0 0 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- 0:00:02 --:--:-- 0{ [5 bytes data] < HTTP/1.1 200 OK < Date: Thu, 22 Jun 2017 08:05:07 GMT < Content-Type: application/octet-stream < Content-Length: 819 < Connection: keep-alive < Set-Cookie: __cfduid=d8fb09b0a09329a68f50e4cba0ead3ed11498118705; expires=Fri, 22-Jun-18 08:05:05 GMT; path=/; domain=.openvpn.net; HttpOnly < Last-Modified: Wed, 21 Jun 2017 10:19:35 GMT < ETag: "594a4837-333" < CF-Cache-Status: HIT < Expires: Thu, 22 Jun 2017 12:05:07 GMT < Cache-Control: public, max-age=14400 < Accept-Ranges: bytes < Server: cloudflare-nginx < CF-RAY: 372db3578a2e29e9-SEA < { [819 bytes data] 100 819 100 819 0 0 367 0 0:00:02 0:00:02 --:--:-- 367 * Connection #0 to host swupdate.openvpn.net left intact total 2828 drwxr-xr-x 2 robbat2 users 4096 Jun 22 08:05 . drwxr-xr-x 3 robbat2 users 4096 Jun 22 07:55 .. -rwxr-xr-x 1 robbat2 users 460 Jun 22 08:04 fetch.sh -rw-r--r-- 1 robbat2 users 1422692 Jun 22 08:05 http-openvpn-2.4.3.tar.gz -rw-r--r-- 1 robbat2 users 819 Jun 22 08:05 http-openvpn-2.4.3.tar.gz.asc -rw-r--r-- 1 robbat2 users 507 Jun 22 08:05 http-openvpn-2.4.3.tar.gz.asc.headers -rw-r--r-- 1 robbat2 users 511 Jun 22 08:05 http-openvpn-2.4.3.tar.gz.headers -rw-r--r-- 1 robbat2 users 1422692 Jun 22 08:05 https-openvpn-2.4.3.tar.gz -rw-r--r-- 1 robbat2 users 819 Jun 22 08:05 https-openvpn-2.4.3.tar.gz.asc -rw-r--r-- 1 robbat2 users 529 Jun 22 08:05 https-openvpn-2.4.3.tar.gz.asc.headers -rw-r--r-- 1 robbat2 users 536 Jun 22 08:05 https-openvpn-2.4.3.tar.gz.headers -rw-r--r-- 1 robbat2 users 8192 Jun 22 08:05 log.txt e1929f82aff40f3d105e5f72aacff9c1 http-openvpn-2.4.3.tar.gz 5f482e4c16bd6762d6fc8897eb0ae498 http-openvpn-2.4.3.tar.gz.asc f0bad975cacec61d4c564c79d03cebb4 http-openvpn-2.4.3.tar.gz.asc.headers fc5192c1ca1dd4334a136181d38150d2 http-openvpn-2.4.3.tar.gz.headers e1929f82aff40f3d105e5f72aacff9c1 https-openvpn-2.4.3.tar.gz 5f482e4c16bd6762d6fc8897eb0ae498 https-openvpn-2.4.3.tar.gz.asc 65ed56cd87be2c93420c1a510abe238b https-openvpn-2.4.3.tar.gz.asc.headers 2d76621abbadf46ae74b53b935249f4c https-openvpn-2.4.3.tar.gz.headers gpg: Signature made Wed Jun 21 10:19:19 2017 UTC gpg: using RSA key D72AF3448CC2B034 gpg: Can't check signature: No public key gpg: Signature made Wed Jun 21 10:19:19 2017 UTC gpg: using RSA key D72AF3448CC2B034 gpg: Can't check signature: No public key ]0;robbat2@woodpecker:~/public_html/openvpn-2.4.3-weirdnessrobbat2@woodpecker ~/public_html/openvpn-2.4.3-weirdness $ exit Script done on Thu 22 Jun 2017 08:05:51 AM UTC