Jump to content
Not connected, Your IP: 54.227.76.35

All Activity

This stream auto-updates     

  1. Past hour
  2. You should initially try to run the script from command line; I think, you should just make it executable: # chmod +x /etc/openvpn/reconnect.sh Check also spaces in script, they are significant.
  3. Today
  4. I thought I would just post this here as a bit of advice to folks like myself who know a bit about computers and networking but not really that much. In the past I have spent hours trying to get AirVPN set up on DD-WRT, PFSense and OpenWRT - basically I spent hours and hours, ending up with something functioning (pfSense - thanks to the guide here) eventually. After my pfSense box died, I bricked two DD-WRT routers trying to set them up again, and spend hours trying to work out OpenWRT. Eventually I ordered a GL.iNET micro router. It took about 10 minutes to get it working properly behind my ISP router - wish I had bought one ages ago! I haven't seen a lot of info suggesting using these routers but I can recommend them, especially for the ease of use. If anyone knows of other devices which are mostly plug and play it would be good to get a hardware list for all the non-techies who want a vpn but can't set up more involved options. The more of the internet that is encrypted the better as far as I'm concerned!
  5. Thank you very much for the input. Indeed the log entry was incorrect. It was a SSL attempt as it fails in the very same step. I just tried what you suggested, SSL on 443. Same results: Any other hints?
  6. Using eddie-ui everything works fine while connected to a network but when i disable the network lock i still cannot get any connection without enabling eddie again. To disable the network lock i need to restart my whole system which is rather inconvenient. Any way i can disable it manually in my commandline or other suggestions? System and eddie information: Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Antergos Linux \r (\l), Version: Linux Datamat 5.1.3-arch1-1-ARCH #1 SMP PREEMPT Thu May 16 20:59:36 UTC 2019 x86_64 GNU/Linux, Mono/.Net: 5.20.1 (makepkg/886c4901747 Wed Apr 17 15:49:14 UTC 2019); Framework: v4.0.30319
  7. Thank you for the clarifications! It is clear to me now
  8. Yesterday
  9. So Eddie is not working simultaneously with Adguard 7.0 Beta. I try to turn off different programs, like a firewall, but Eddie started working after I turn off Adguard. I'm also using Adguard DNS, but it's fine, when AdGuard is turn off. Do you know solution to my problem? I would like to use those two programs in the same time. . 2019.05.19 19:40:06 - Routes, remove 213.152.161.229 for gateway 10.9.10.1 failed: Network interface no more available. . 2019.05.19 19:40:06 - Routes, remove 213.152.161.244 for gateway 10.14.234.1 failed: Network interface no more available. . 2019.05.19 19:40:06 - Routes, remove 213.152.162.74 for gateway 10.17.74.1 failed: Network interface no more available. . 2019.05.19 19:40:06 - Routes, remove 213.152.162.15 for gateway 10.14.170.1 failed: Network interface no more available. . 2019.05.19 19:40:06 - Routes, remove 213.152.161.117 for gateway 10.5.202.1 failed: Network interface no more available. . 2019.05.19 19:40:06 - Routes, remove 213.152.161.149 for gateway 10.32.226.1 failed: Network interface no more available. . 2019.05.19 19:40:06 - Routes, remove 213.152.161.30 for gateway 10.22.50.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.161.101 for gateway 10.17.178.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 109.202.107.5 for gateway 10.7.82.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.161.181 for gateway 10.5.146.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 193.37.254.11 for gateway 10.33.118.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.162.84 for gateway 10.28.118.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.162.149 for gateway 10.27.54.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 194.36.111.59 for gateway 10.17.22.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.161.133 for gateway 10.31.34.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 64.42.179.43 for gateway 10.23.42.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.161.181 for gateway 10.5.138.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 194.36.111.59 for gateway 10.17.10.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.161.133 for gateway 10.31.34.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.162.170 for gateway 10.12.146.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 213.152.162.154 for gateway 10.24.138.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 194.36.111.59 for gateway 10.17.10.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 198.203.28.43 for gateway 10.27.82.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 64.42.179.67 for gateway 10.23.18.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 194.36.111.59 for gateway 10.17.18.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Above log line repeated 1 times more . 2019.05.19 19:40:07 - Routes, remove 64.42.179.59 for gateway 10.22.242.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 149.255.33.155 for gateway 10.26.50.1 failed: Network interface no more available. . 2019.05.19 19:40:07 - Routes, remove 194.36.111.59 for gateway 10.17.30.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 194.36.111.59 for gateway 10.17.6.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 194.36.111.59 for gateway 10.17.10.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.42.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 91.132.0.203 for gateway 10.25.138.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 64.42.179.35 for gateway 10.23.94.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.62.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.46.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 194.36.111.59 for gateway 10.17.30.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.62.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 194.36.111.59 for gateway 10.17.30.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 91.132.0.203 for gateway 10.25.158.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.62.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 91.132.0.203 for gateway 10.25.158.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 194.36.111.59 for gateway 10.17.30.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.58.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 91.132.0.203 for gateway 10.25.154.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.58.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 64.42.179.35 for gateway 10.23.90.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 199.241.147.35 for gateway 10.28.130.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 91.132.0.203 for gateway 10.25.154.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 37.72.169.203 for gateway 10.23.110.1 failed: Network interface no more available. . 2019.05.19 19:40:08 - Routes, remove 185.228.19.147 for gateway 10.25.46.1 failed: Network interface no more available. . 2019.05.19 19:40:09 - Updating systems & servers data ... I 2019.05.19 19:40:09 - Ready . 2019.05.19 19:40:09 - Systems & servers data update completed ! 2019.05.19 19:40:11 - Activation of Network Lock - Windows Filtering Platform I 2019.05.19 19:40:13 - Session starting. I 2019.05.19 19:40:14 - Checking authorization ... ! 2019.05.19 19:40:14 - Connecting to Dimidium (United States, New York City, New York) . 2019.05.19 19:40:15 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 19:40:15 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 19:40:15 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 19:40:15 - Connection to OpenVPN Management Interface . 2019.05.19 19:40:15 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 19:40:15 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:40:15 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:40:15 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:40:15 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:40:15 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]185.228.19.149:443 . 2019.05.19 19:40:15 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 19:40:15 - OpenVPN > UDP link local: (not bound) . 2019.05.19 19:40:15 - OpenVPN > UDP link remote: [AF_INET]185.228.19.149:443 . 2019.05.19 19:40:15 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 19:40:15 - OpenVPN > TLS: Initial packet from [AF_INET]185.228.19.149:443, sid=4a86b70e 8920a29f . 2019.05.19 19:40:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 19:40:15 - OpenVPN > VERIFY KU OK . 2019.05.19 19:40:15 - OpenVPN > Validating certificate extended key usage . 2019.05.19 19:40:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 19:40:15 - OpenVPN > VERIFY EKU OK . 2019.05.19 19:40:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Dimidium, emailAddress=info@airvpn.org . 2019.05.19 19:40:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 19:40:15 - OpenVPN > [Dimidium] Peer Connection Initiated with [AF_INET]185.228.19.149:443 . 2019.05.19 19:40:16 - OpenVPN > SENT CONTROL [Dimidium]: 'PUSH_REQUEST' (status=1) . 2019.05.19 19:40:16 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.25.54.1,dhcp-option DNS6 fde6:7a:7d20:1536::1,tun-ipv6,route-gateway 10.25.54.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1536::10bf/64 fde6:7a:7d20:1536::1,ifconfig 10.25.54.193 255.255.255.0,peer-id 5,cipher AES-256-GCM' . 2019.05.19 19:40:16 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 19:40:16 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 19:40:16 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 19:40:16 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 19:40:16 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 19:40:16 - OpenVPN > interactive service msg_channel=0 . 2019.05.19 19:40:16 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=54:e1:ad:e0:00:f5 . 2019.05.19 19:40:16 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.19 19:40:16 - OpenVPN > GetBestInterfaceEx() returned if=3 . 2019.05.19 19:40:16 - OpenVPN > GDG6: II=3 DP=::/0 NH=fe80::20b:ff:fe00:add0 . 2019.05.19 19:40:16 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2019.05.19 19:40:16 - OpenVPN > ROUTE6_GATEWAY fe80::20b:ff:fe00:add0 I=3 . 2019.05.19 19:40:16 - OpenVPN > open_tun . 2019.05.19 19:40:16 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{25F5D614-41C9-41A3-9A34-0CA9879E39AB}.tap . 2019.05.19 19:40:16 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.05.19 19:40:16 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.25.54.0/10.25.54.193/255.255.255.0 [SUCCEEDED] . 2019.05.19 19:40:16 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.25.54.193/255.255.255.0 on interface {25F5D614-41C9-41A3-9A34-0CA9879E39AB} [DHCP-serv: 10.25.54.254, lease-time: 31536000] . 2019.05.19 19:40:16 - OpenVPN > Successful ARP Flush on interface [13] {25F5D614-41C9-41A3-9A34-0CA9879E39AB} . 2019.05.19 19:40:16 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.19 19:40:17 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:1536::10bf store=active . 2019.05.19 19:40:18 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1536::1 validate=no . 2019.05.19 19:40:19 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1536::/64 -> fde6:7a:7d20:1536::10bf metric 0) dev Ethernet 2 . 2019.05.19 19:40:19 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1536::/64 interface=13 fe80::8 store=active . 2019.05.19 19:40:19 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:40:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.05.19 19:40:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 185.228.19.149 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 19:40:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.05.19 19:40:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:40:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.25.54.1 . 2019.05.19 19:40:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 19:40:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:40:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.25.54.1 . 2019.05.19 19:40:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 19:40:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:40:24 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1536::1 metric -1) dev Ethernet 2 . 2019.05.19 19:40:24 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active . 2019.05.19 19:40:24 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:40:25 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1536::1 metric -1) dev Ethernet 2 . 2019.05.19 19:40:25 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:40:25 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:40:25 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1536::1 metric -1) dev Ethernet 2 . 2019.05.19 19:40:25 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:40:25 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:40:25 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1536::1 metric -1) dev Ethernet 2 . 2019.05.19 19:40:25 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 19:40:25 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:40:25 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.05.19 19:40:25 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2019.05.19 19:40:25 - DNS leak protection with packet filtering enabled. . 2019.05.19 19:40:25 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 176.103.130.130, 176.103.130.131) . 2019.05.19 19:40:25 - Routes, added a new route, 185.228.19.147 for gateway 10.25.54.1 . 2019.05.19 19:40:26 - Routes, added a new route, 2602:fe90:100:1d:3609:9c86:a398:2347 for gateway fde6:7a:7d20:1536::1 . 2019.05.19 19:40:26 - Flushing DNS I 2019.05.19 19:40:29 - Checking route IPv4 I 2019.05.19 19:40:29 - Checking route IPv6 ! 2019.05.19 19:40:34 - Connected. . 2019.05.19 19:40:34 - OpenVPN > Initialization Sequence Completed . 2019.05.19 19:46:13 - OpenVPN > [Dimidium] Inactivity timeout (--ping-restart), restarting . 2019.05.19 19:46:13 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2019.05.19 19:46:13 - OpenVPN > Restart pause, 5 second(s) ! 2019.05.19 19:46:13 - Disconnecting . 2019.05.19 19:46:13 - Routes, removed a route previously added, 185.228.19.147 for gateway 10.25.54.1 . 2019.05.19 19:46:13 - Routes, removed a route previously added, 2602:fe90:100:1d:3609:9c86:a398:2347 for gateway fde6:7a:7d20:1536::1 . 2019.05.19 19:46:13 - Sending management termination signal . 2019.05.19 19:46:13 - Management - Send 'signal SIGTERM' . 2019.05.19 19:46:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.19 19:46:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 185.228.19.149 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 19:46:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 19:46:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.25.54.1 . 2019.05.19 19:46:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 19:46:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.25.54.1 . 2019.05.19 19:46:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 19:46:13 - OpenVPN > delete_route_ipv6(::/3) . 2019.05.19 19:46:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active . 2019.05.19 19:46:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:46:13 - OpenVPN > delete_route_ipv6(2000::/4) . 2019.05.19 19:46:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:46:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:46:14 - OpenVPN > delete_route_ipv6(3000::/4) . 2019.05.19 19:46:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:46:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:46:14 - OpenVPN > delete_route_ipv6(fc00::/7) . 2019.05.19 19:46:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 19:46:14 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:46:14 - OpenVPN > Closing TUN/TAP interface . 2019.05.19 19:46:14 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1536::/64) . 2019.05.19 19:46:14 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1536::/64 interface=13 fe80::8 store=active . 2019.05.19 19:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1536::10bf store=active . 2019.05.19 19:46:14 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all . 2019.05.19 19:46:14 - OpenVPN > TAP: DHCP address released . 2019.05.19 19:46:14 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2019.05.19 19:46:14 - Connection terminated. . 2019.05.19 19:46:14 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 19:46:14 - DNS leak protection with packet filtering disabled. . 2019.05.19 19:46:14 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2019.05.19 19:46:14 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2019.05.19 19:46:17 - Checking authorization ... ! 2019.05.19 19:46:18 - Connecting to Sculptor (United States, Atlanta, Georgia) . 2019.05.19 19:46:18 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 19:46:18 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 19:46:18 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 19:46:18 - Connection to OpenVPN Management Interface . 2019.05.19 19:46:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 19:46:18 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:46:18 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:46:18 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:46:18 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:46:18 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.37:443 . 2019.05.19 19:46:18 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 19:46:18 - OpenVPN > UDP link local: (not bound) . 2019.05.19 19:46:18 - OpenVPN > UDP link remote: [AF_INET]64.42.179.37:443 . 2019.05.19 19:46:18 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 19:46:50 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 19:46:50 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 19:46:55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 19:46:55 - Disconnecting . 2019.05.19 19:46:55 - Connection terminated. I 2019.05.19 19:46:58 - Checking authorization ... ! 2019.05.19 19:46:58 - Connecting to Alkaid (United States, Chicago, Illinois) . 2019.05.19 19:46:58 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 19:46:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 19:46:58 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 19:46:58 - Connection to OpenVPN Management Interface . 2019.05.19 19:46:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 19:46:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:46:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:46:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:46:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:46:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]37.72.169.197:443 . 2019.05.19 19:46:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 19:46:58 - OpenVPN > UDP link local: (not bound) . 2019.05.19 19:46:58 - OpenVPN > UDP link remote: [AF_INET]37.72.169.197:443 . 2019.05.19 19:46:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 19:47:04 - OpenVPN > TLS: Initial packet from [AF_INET]37.72.169.197:443, sid=c82326f4 6e78ebeb . 2019.05.19 19:47:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 19:47:04 - OpenVPN > VERIFY KU OK . 2019.05.19 19:47:04 - OpenVPN > Validating certificate extended key usage . 2019.05.19 19:47:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 19:47:04 - OpenVPN > VERIFY EKU OK . 2019.05.19 19:47:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Alkaid, emailAddress=info@airvpn.org . 2019.05.19 19:47:05 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 19:47:05 - OpenVPN > [Alkaid] Peer Connection Initiated with [AF_INET]37.72.169.197:443 . 2019.05.19 19:47:06 - OpenVPN > SENT CONTROL [Alkaid]: 'PUSH_REQUEST' (status=1) . 2019.05.19 19:47:06 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.6.150.1,dhcp-option DNS6 fde6:7a:7d20:296::1,tun-ipv6,route-gateway 10.6.150.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:296::1086/64 fde6:7a:7d20:296::1,ifconfig 10.6.150.136 255.255.255.0,peer-id 1,cipher AES-256-GCM' . 2019.05.19 19:47:06 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 19:47:06 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 19:47:06 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 19:47:06 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 19:47:06 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 19:47:06 - OpenVPN > interactive service msg_channel=0 . 2019.05.19 19:47:06 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=54:e1:ad:e0:00:f5 . 2019.05.19 19:47:06 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.19 19:47:06 - OpenVPN > GetBestInterfaceEx() returned if=3 . 2019.05.19 19:47:06 - OpenVPN > GDG6: II=3 DP=::/0 NH=fe80::20b:ff:fe00:add0 . 2019.05.19 19:47:06 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2019.05.19 19:47:06 - OpenVPN > ROUTE6_GATEWAY fe80::20b:ff:fe00:add0 I=3 . 2019.05.19 19:47:06 - OpenVPN > open_tun . 2019.05.19 19:47:06 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{25F5D614-41C9-41A3-9A34-0CA9879E39AB}.tap . 2019.05.19 19:47:06 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.05.19 19:47:06 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.6.150.0/10.6.150.136/255.255.255.0 [SUCCEEDED] . 2019.05.19 19:47:06 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.6.150.136/255.255.255.0 on interface {25F5D614-41C9-41A3-9A34-0CA9879E39AB} [DHCP-serv: 10.6.150.254, lease-time: 31536000] . 2019.05.19 19:47:06 - OpenVPN > Successful ARP Flush on interface [13] {25F5D614-41C9-41A3-9A34-0CA9879E39AB} . 2019.05.19 19:47:06 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.19 19:47:07 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:296::1086 store=active . 2019.05.19 19:47:08 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:296::1 validate=no . 2019.05.19 19:47:08 - OpenVPN > add_route_ipv6(fde6:7a:7d20:296::/64 -> fde6:7a:7d20:296::1086 metric 0) dev Ethernet 2 . 2019.05.19 19:47:08 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:296::/64 interface=13 fe80::8 store=active . 2019.05.19 19:47:08 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:47:13 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 37.72.169.197 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 19:47:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.05.19 19:47:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.6.150.1 . 2019.05.19 19:47:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 19:47:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.6.150.1 . 2019.05.19 19:47:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 19:47:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:47:13 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:296::1 metric -1) dev Ethernet 2 . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active . 2019.05.19 19:47:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:47:13 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:296::1 metric -1) dev Ethernet 2 . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:47:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:47:13 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:296::1 metric -1) dev Ethernet 2 . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:47:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:47:13 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:296::1 metric -1) dev Ethernet 2 . 2019.05.19 19:47:13 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 19:47:13 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:47:13 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.05.19 19:47:13 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2019.05.19 19:47:13 - DNS leak protection with packet filtering enabled. . 2019.05.19 19:47:14 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 176.103.130.130, 176.103.130.131) . 2019.05.19 19:47:14 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to 2a00:5a60::ad1:ff, 2a00:5a60::ad2:ff) . 2019.05.19 19:47:14 - Routes, added a new route, 37.72.169.195 for gateway 10.6.150.1 . 2019.05.19 19:47:14 - Routes, added a new route, 2a02:748:4000:e:739a:f546:3826:6ae4 for gateway fde6:7a:7d20:296::1 . 2019.05.19 19:47:14 - Flushing DNS I 2019.05.19 19:47:17 - Checking route IPv4 I 2019.05.19 19:47:18 - Checking route IPv6 ! 2019.05.19 19:47:22 - Connected. . 2019.05.19 19:47:22 - OpenVPN > Initialization Sequence Completed . 2019.05.19 19:50:27 - Updating systems & servers data ... . 2019.05.19 19:50:30 - Systems & servers data update completed . 2019.05.19 19:51:42 - OpenVPN > [Alkaid] Inactivity timeout (--ping-restart), restarting . 2019.05.19 19:51:42 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2019.05.19 19:51:42 - OpenVPN > Restart pause, 5 second(s) ! 2019.05.19 19:51:42 - Disconnecting . 2019.05.19 19:51:42 - Routes, removed a route previously added, 37.72.169.195 for gateway 10.6.150.1 . 2019.05.19 19:51:42 - Routes, removed a route previously added, 2a02:748:4000:e:739a:f546:3826:6ae4 for gateway fde6:7a:7d20:296::1 . 2019.05.19 19:51:42 - Sending management termination signal . 2019.05.19 19:51:42 - Management - Send 'signal SIGTERM' . 2019.05.19 19:51:42 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 37.72.169.197 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 19:51:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.6.150.1 . 2019.05.19 19:51:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.6.150.1 . 2019.05.19 19:51:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 19:51:42 - OpenVPN > delete_route_ipv6(::/3) . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active . 2019.05.19 19:51:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:51:42 - OpenVPN > delete_route_ipv6(2000::/4) . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:51:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:51:42 - OpenVPN > delete_route_ipv6(3000::/4) . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:51:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:51:42 - OpenVPN > delete_route_ipv6(fc00::/7) . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 19:51:42 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:51:42 - OpenVPN > Closing TUN/TAP interface . 2019.05.19 19:51:42 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:296::/64) . 2019.05.19 19:51:42 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:296::/64 interface=13 fe80::8 store=active . 2019.05.19 19:51:42 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:296::1086 store=active . 2019.05.19 19:51:43 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all . 2019.05.19 19:51:43 - OpenVPN > TAP: DHCP address released . 2019.05.19 19:51:43 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2019.05.19 19:51:43 - Connection terminated. . 2019.05.19 19:51:43 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 19:51:43 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 19:51:43 - DNS leak protection with packet filtering disabled. . 2019.05.19 19:51:43 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2019.05.19 19:51:43 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2019.05.19 19:51:46 - Checking authorization ... . 2019.05.19 19:51:46 - IPv6 disabled with packet filtering. ! 2019.05.19 19:51:46 - Connecting to Metallah (United States, Pennsylvania) . 2019.05.19 19:51:47 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 19:51:47 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 19:51:47 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 19:51:47 - Connection to OpenVPN Management Interface . 2019.05.19 19:51:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 19:51:47 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:51:47 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:51:47 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:51:47 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:51:47 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]102.165.50.37:443 . 2019.05.19 19:51:47 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 19:51:47 - OpenVPN > UDP link local: (not bound) . 2019.05.19 19:51:47 - OpenVPN > UDP link remote: [AF_INET]102.165.50.37:443 . 2019.05.19 19:51:47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 19:52:19 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 19:52:19 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 19:52:24 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 19:52:24 - Disconnecting . 2019.05.19 19:52:24 - Connection terminated. . 2019.05.19 19:52:24 - IPv6 restored with packet filtering. I 2019.05.19 19:52:27 - Checking authorization ... ! 2019.05.19 19:52:28 - Connecting to Pollux (United States, Jacksonville, Florida) . 2019.05.19 19:52:28 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 19:52:28 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 19:52:28 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 19:52:28 - Connection to OpenVPN Management Interface . 2019.05.19 19:52:28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 19:52:28 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:52:28 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:52:28 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 19:52:28 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 19:52:28 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]198.203.28.45:443 . 2019.05.19 19:52:28 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 19:52:28 - OpenVPN > UDP link local: (not bound) . 2019.05.19 19:52:28 - OpenVPN > UDP link remote: [AF_INET]198.203.28.45:443 . 2019.05.19 19:52:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 19:52:28 - OpenVPN > TLS: Initial packet from [AF_INET]198.203.28.45:443, sid=f5a2e552 66b42aad . 2019.05.19 19:52:28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 19:52:28 - OpenVPN > VERIFY KU OK . 2019.05.19 19:52:28 - OpenVPN > Validating certificate extended key usage . 2019.05.19 19:52:28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 19:52:28 - OpenVPN > VERIFY EKU OK . 2019.05.19 19:52:28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2019.05.19 19:52:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 19:52:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]198.203.28.45:443 . 2019.05.19 19:52:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2019.05.19 19:52:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.27.86.1,dhcp-option DNS6 fde6:7a:7d20:1756::1,tun-ipv6,route-gateway 10.27.86.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:1756::1057/64 fde6:7a:7d20:1756::1,ifconfig 10.27.86.89 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.05.19 19:52:30 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 19:52:30 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 19:52:30 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 19:52:30 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 19:52:30 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 19:52:30 - OpenVPN > interactive service msg_channel=0 . 2019.05.19 19:52:30 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=54:e1:ad:e0:00:f5 . 2019.05.19 19:52:30 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.19 19:52:30 - OpenVPN > GetBestInterfaceEx() returned if=3 . 2019.05.19 19:52:30 - OpenVPN > GDG6: II=3 DP=::/0 NH=fe80::20b:ff:fe00:add0 . 2019.05.19 19:52:30 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2019.05.19 19:52:30 - OpenVPN > ROUTE6_GATEWAY fe80::20b:ff:fe00:add0 I=3 . 2019.05.19 19:52:30 - OpenVPN > open_tun . 2019.05.19 19:52:30 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{25F5D614-41C9-41A3-9A34-0CA9879E39AB}.tap . 2019.05.19 19:52:30 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.05.19 19:52:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.27.86.0/10.27.86.89/255.255.255.0 [SUCCEEDED] . 2019.05.19 19:52:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.27.86.89/255.255.255.0 on interface {25F5D614-41C9-41A3-9A34-0CA9879E39AB} [DHCP-serv: 10.27.86.254, lease-time: 31536000] . 2019.05.19 19:52:30 - OpenVPN > Successful ARP Flush on interface [13] {25F5D614-41C9-41A3-9A34-0CA9879E39AB} . 2019.05.19 19:52:30 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.19 19:52:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:1756::1057 store=active . 2019.05.19 19:52:32 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:1756::1 validate=no . 2019.05.19 19:52:32 - OpenVPN > add_route_ipv6(fde6:7a:7d20:1756::/64 -> fde6:7a:7d20:1756::1057 metric 0) dev Ethernet 2 . 2019.05.19 19:52:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:1756::/64 interface=13 fe80::8 store=active . 2019.05.19 19:52:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:52:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 198.203.28.45 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 19:52:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.05.19 19:52:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.27.86.1 . 2019.05.19 19:52:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 19:52:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.27.86.1 . 2019.05.19 19:52:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 19:52:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 19:52:37 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:1756::1 metric -1) dev Ethernet 2 . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active . 2019.05.19 19:52:37 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:52:37 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:1756::1 metric -1) dev Ethernet 2 . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:52:37 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:52:37 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:1756::1 metric -1) dev Ethernet 2 . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 19:52:37 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:52:37 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:1756::1 metric -1) dev Ethernet 2 . 2019.05.19 19:52:37 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 19:52:37 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 19:52:37 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.05.19 19:52:37 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2019.05.19 19:52:37 - DNS leak protection with packet filtering enabled. . 2019.05.19 19:52:37 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 176.103.130.130, 176.103.130.131) . 2019.05.19 19:52:38 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to 2a00:5a60::ad1:ff, 2a00:5a60::ad2:ff) . 2019.05.19 19:52:38 - Routes, added a new route, 198.203.28.43 for gateway 10.27.86.1 . 2019.05.19 19:52:38 - Routes, added a new route, 2605:8680:ffff:2:1010:6ac2:508f:857c for gateway fde6:7a:7d20:1756::1 . 2019.05.19 19:52:38 - Flushing DNS I 2019.05.19 19:52:41 - Checking route IPv4 I 2019.05.19 19:52:42 - Checking route IPv6 ! 2019.05.19 19:52:46 - Connected. . 2019.05.19 19:52:46 - OpenVPN > Initialization Sequence Completed . 2019.05.19 20:00:30 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2019.05.19 20:00:30 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2019.05.19 20:00:30 - OpenVPN > Restart pause, 5 second(s) ! 2019.05.19 20:00:30 - Disconnecting . 2019.05.19 20:00:30 - Routes, removed a route previously added, 198.203.28.43 for gateway 10.27.86.1 . 2019.05.19 20:00:30 - Routes, removed a route previously added, 2605:8680:ffff:2:1010:6ac2:508f:857c for gateway fde6:7a:7d20:1756::1 . 2019.05.19 20:00:30 - Sending management termination signal . 2019.05.19 20:00:30 - Management - Send 'signal SIGTERM' . 2019.05.19 20:00:30 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 198.203.28.45 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 20:00:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.27.86.1 . 2019.05.19 20:00:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.27.86.1 . 2019.05.19 20:00:30 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:00:30 - OpenVPN > delete_route_ipv6(::/3) . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active . 2019.05.19 20:00:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:30 - OpenVPN > delete_route_ipv6(2000::/4) . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:00:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:30 - OpenVPN > delete_route_ipv6(3000::/4) . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:00:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:30 - OpenVPN > delete_route_ipv6(fc00::/7) . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 20:00:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:30 - OpenVPN > Closing TUN/TAP interface . 2019.05.19 20:00:30 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:1756::/64) . 2019.05.19 20:00:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:1756::/64 interface=13 fe80::8 store=active . 2019.05.19 20:00:30 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:1756::1057 store=active . 2019.05.19 20:00:31 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all . 2019.05.19 20:00:31 - OpenVPN > TAP: DHCP address released . 2019.05.19 20:00:31 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2019.05.19 20:00:31 - Connection terminated. . 2019.05.19 20:00:31 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 20:00:31 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 20:00:31 - DNS leak protection with packet filtering disabled. . 2019.05.19 20:00:31 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2019.05.19 20:00:31 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2019.05.19 20:00:39 - Checking authorization ... ! 2019.05.19 20:00:39 - Connecting to Hercules (United States, Atlanta, Georgia) . 2019.05.19 20:00:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:00:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:00:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:00:40 - Connection to OpenVPN Management Interface . 2019.05.19 20:00:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:00:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:00:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:00:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:00:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:00:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2019.05.19 20:00:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:00:40 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:00:40 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2019.05.19 20:00:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:00:45 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=75f2e052 9048e48a . 2019.05.19 20:00:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 20:00:45 - OpenVPN > VERIFY KU OK . 2019.05.19 20:00:45 - OpenVPN > Validating certificate extended key usage . 2019.05.19 20:00:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 20:00:45 - OpenVPN > VERIFY EKU OK . 2019.05.19 20:00:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2019.05.19 20:00:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 20:00:45 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2019.05.19 20:00:47 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2019.05.19 20:00:47 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.246.1,dhcp-option DNS6 fde6:7a:7d20:12f6::1,tun-ipv6,route-gateway 10.22.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12f6::10d4/64 fde6:7a:7d20:12f6::1,ifconfig 10.22.246.214 255.255.255.0,peer-id 0,cipher AES-256-GCM' . 2019.05.19 20:00:47 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 20:00:47 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 20:00:47 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 20:00:47 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:00:47 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:00:47 - OpenVPN > interactive service msg_channel=0 . 2019.05.19 20:00:47 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=54:e1:ad:e0:00:f5 . 2019.05.19 20:00:47 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.19 20:00:47 - OpenVPN > GetBestInterfaceEx() returned if=3 . 2019.05.19 20:00:47 - OpenVPN > GDG6: II=3 DP=::/0 NH=fe80::20b:ff:fe00:add0 . 2019.05.19 20:00:47 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2019.05.19 20:00:47 - OpenVPN > ROUTE6_GATEWAY fe80::20b:ff:fe00:add0 I=3 . 2019.05.19 20:00:47 - OpenVPN > open_tun . 2019.05.19 20:00:47 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{25F5D614-41C9-41A3-9A34-0CA9879E39AB}.tap . 2019.05.19 20:00:47 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.05.19 20:00:47 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.22.246.0/10.22.246.214/255.255.255.0 [SUCCEEDED] . 2019.05.19 20:00:47 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.22.246.214/255.255.255.0 on interface {25F5D614-41C9-41A3-9A34-0CA9879E39AB} [DHCP-serv: 10.22.246.254, lease-time: 31536000] . 2019.05.19 20:00:47 - OpenVPN > Successful ARP Flush on interface [13] {25F5D614-41C9-41A3-9A34-0CA9879E39AB} . 2019.05.19 20:00:47 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.19 20:00:48 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:12f6::10d4 store=active . 2019.05.19 20:00:49 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:12f6::1 validate=no . 2019.05.19 20:00:49 - OpenVPN > add_route_ipv6(fde6:7a:7d20:12f6::/64 -> fde6:7a:7d20:12f6::10d4 metric 0) dev Ethernet 2 . 2019.05.19 20:00:49 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:12f6::/64 interface=13 fe80::8 store=active . 2019.05.19 20:00:49 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:54 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 64.42.179.61 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 20:00:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.05.19 20:00:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2019.05.19 20:00:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 20:00:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2019.05.19 20:00:54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 20:00:54 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:00:54 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:12f6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active . 2019.05.19 20:00:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:54 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:12f6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:00:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:54 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:12f6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:00:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:54 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:12f6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:00:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 20:00:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:00:54 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.05.19 20:00:54 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2019.05.19 20:00:54 - DNS leak protection with packet filtering enabled. . 2019.05.19 20:00:54 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 176.103.130.130, 176.103.130.131) . 2019.05.19 20:00:55 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to 2a00:5a60::ad1:ff, 2a00:5a60::ad2:ff) . 2019.05.19 20:00:55 - Routes, added a new route, 64.42.179.59 for gateway 10.22.246.1 . 2019.05.19 20:00:55 - Routes, added a new route, 2605:9f80:6000:80:fc8c:43ee:267e:97ab for gateway fde6:7a:7d20:12f6::1 . 2019.05.19 20:00:55 - Flushing DNS I 2019.05.19 20:00:58 - Checking route IPv4 . 2019.05.19 20:01:02 - Updating systems & servers data ... . 2019.05.19 20:01:18 - curl: (28) Connection timed out after 20000 milliseconds . 2019.05.19 20:01:18 - Checking route (2° try) . 2019.05.19 20:01:39 - curl: (28) Connection timed out after 20000 milliseconds . 2019.05.19 20:01:39 - Checking route (3° try) . 2019.05.19 20:02:01 - curl: (28) Connection timed out after 20000 milliseconds E 2019.05.19 20:02:01 - Checking route IPv4 failed. . 2019.05.19 20:02:01 - OpenVPN > Initialization Sequence Completed ! 2019.05.19 20:02:01 - Disconnecting . 2019.05.19 20:02:01 - Routes, removed a route previously added, 64.42.179.59 for gateway 10.22.246.1 . 2019.05.19 20:02:01 - Routes, removed a route previously added, 2605:9f80:6000:80:fc8c:43ee:267e:97ab for gateway fde6:7a:7d20:12f6::1 . 2019.05.19 20:02:01 - OpenVPN > [Hercules] Inactivity timeout (--ping-restart), restarting . 2019.05.19 20:02:01 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2019.05.19 20:02:01 - OpenVPN > Restart pause, 5 second(s) . 2019.05.19 20:02:01 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.61:443 . 2019.05.19 20:02:01 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:02:01 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:02:01 - OpenVPN > UDP link remote: [AF_INET]64.42.179.61:443 . 2019.05.19 20:02:01 - OpenVPN > TLS: Initial packet from [AF_INET]64.42.179.61:443, sid=11559df0 db9c5b39 . 2019.05.19 20:02:01 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 20:02:01 - OpenVPN > VERIFY KU OK . 2019.05.19 20:02:01 - OpenVPN > Validating certificate extended key usage . 2019.05.19 20:02:01 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 20:02:01 - OpenVPN > VERIFY EKU OK . 2019.05.19 20:02:01 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Hercules, emailAddress=info@airvpn.org . 2019.05.19 20:02:01 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 20:02:01 - OpenVPN > [Hercules] Peer Connection Initiated with [AF_INET]64.42.179.61:443 . 2019.05.19 20:02:01 - OpenVPN > SENT CONTROL [Hercules]: 'PUSH_REQUEST' (status=1) . 2019.05.19 20:02:01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.22.246.1,dhcp-option DNS6 fde6:7a:7d20:12f6::1,tun-ipv6,route-gateway 10.22.246.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:12f6::10d4/64 fde6:7a:7d20:12f6::1,ifconfig 10.22.246.214 255.255.255.0,peer-id 6,cipher AES-256-GCM' . 2019.05.19 20:02:01 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 20:02:01 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 20:02:01 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 20:02:01 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:02:01 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:02:01 - OpenVPN > Preserving previous TUN/TAP instance: Ethernet 2 W 2019.05.19 20:02:01 - Windows WFP, unexpected: Rule 'dns_block_all' already exists . 2019.05.19 20:02:01 - Sending management termination signal . 2019.05.19 20:02:01 - Management - Send 'signal SIGTERM' . 2019.05.19 20:02:02 - OpenVPN > MANAGEMENT: CMD 'ea1e0abdd3291120ced0df5662764cd51ad7edc2bf09278ca167c895af642083' . 2019.05.19 20:02:04 - Systems & servers data update completed . 2019.05.19 20:02:11 - Sending management termination signal . 2019.05.19 20:02:11 - Management - Send 'signal SIGTERM' . 2019.05.19 20:02:11 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.19 20:02:11 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 64.42.179.61 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 20:02:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2019.05.19 20:02:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.22.246.1 . 2019.05.19 20:02:16 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:02:16 - OpenVPN > delete_route_ipv6(::/3) . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active . 2019.05.19 20:02:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:16 - OpenVPN > delete_route_ipv6(2000::/4) . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:02:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:16 - OpenVPN > delete_route_ipv6(3000::/4) . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:02:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:16 - OpenVPN > delete_route_ipv6(fc00::/7) . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 20:02:16 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:16 - OpenVPN > Closing TUN/TAP interface . 2019.05.19 20:02:16 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:12f6::/64) . 2019.05.19 20:02:16 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:12f6::/64 interface=13 fe80::8 store=active . 2019.05.19 20:02:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:12f6::10d4 store=active . 2019.05.19 20:02:16 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all . 2019.05.19 20:02:16 - OpenVPN > TAP: DHCP address released . 2019.05.19 20:02:16 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting . 2019.05.19 20:02:16 - Connection terminated. . 2019.05.19 20:02:17 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 20:02:17 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 20:02:17 - DNS leak protection with packet filtering disabled. . 2019.05.19 20:02:17 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2019.05.19 20:02:17 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2019.05.19 20:02:20 - Checking authorization ... ! 2019.05.19 20:02:20 - Connecting to Cursa (United States, Miami) . 2019.05.19 20:02:20 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:02:20 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:02:20 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:02:20 - Connection to OpenVPN Management Interface . 2019.05.19 20:02:20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:02:20 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:02:20 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:02:20 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:02:20 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:02:20 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]96.47.229.61:443 . 2019.05.19 20:02:20 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:02:20 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:02:20 - OpenVPN > UDP link remote: [AF_INET]96.47.229.61:443 . 2019.05.19 20:02:20 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:02:20 - OpenVPN > TLS: Initial packet from [AF_INET]96.47.229.61:443, sid=e2ee69ee 570ddc4a . 2019.05.19 20:02:21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 20:02:21 - OpenVPN > VERIFY KU OK . 2019.05.19 20:02:21 - OpenVPN > Validating certificate extended key usage . 2019.05.19 20:02:21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 20:02:21 - OpenVPN > VERIFY EKU OK . 2019.05.19 20:02:21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org . 2019.05.19 20:02:21 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 20:02:21 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]96.47.229.61:443 . 2019.05.19 20:02:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1) . 2019.05.19 20:02:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.14.198.1,dhcp-option DNS6 fde6:7a:7d20:ac6::1,tun-ipv6,route-gateway 10.14.198.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ac6::107c/64 fde6:7a:7d20:ac6::1,ifconfig 10.14.198.126 255.255.255.0,peer-id 4,cipher AES-256-GCM' . 2019.05.19 20:02:22 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 20:02:22 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 20:02:22 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 20:02:22 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:02:22 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:02:22 - OpenVPN > interactive service msg_channel=0 . 2019.05.19 20:02:22 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=54:e1:ad:e0:00:f5 . 2019.05.19 20:02:22 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.19 20:02:22 - OpenVPN > GetBestInterfaceEx() returned if=3 . 2019.05.19 20:02:22 - OpenVPN > GDG6: II=3 DP=::/0 NH=fe80::20b:ff:fe00:add0 . 2019.05.19 20:02:22 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2019.05.19 20:02:22 - OpenVPN > ROUTE6_GATEWAY fe80::20b:ff:fe00:add0 I=3 . 2019.05.19 20:02:22 - OpenVPN > open_tun . 2019.05.19 20:02:23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{25F5D614-41C9-41A3-9A34-0CA9879E39AB}.tap . 2019.05.19 20:02:23 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.05.19 20:02:23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.14.198.0/10.14.198.126/255.255.255.0 [SUCCEEDED] . 2019.05.19 20:02:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.14.198.126/255.255.255.0 on interface {25F5D614-41C9-41A3-9A34-0CA9879E39AB} [DHCP-serv: 10.14.198.254, lease-time: 31536000] . 2019.05.19 20:02:23 - OpenVPN > Successful ARP Flush on interface [13] {25F5D614-41C9-41A3-9A34-0CA9879E39AB} . 2019.05.19 20:02:23 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.19 20:02:23 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:ac6::107c store=active . 2019.05.19 20:02:25 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:ac6::1 validate=no . 2019.05.19 20:02:25 - Detected an OpenVPN bug (On-Link route on VPN range), autofix. . 2019.05.19 20:02:25 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ac6::/64 -> fde6:7a:7d20:ac6::107c metric 0) dev Ethernet 2 . 2019.05.19 20:02:25 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ac6::/64 interface=13 fe80::8 store=active . 2019.05.19 20:02:25 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 96.47.229.61 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 20:02:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.05.19 20:02:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.14.198.1 . 2019.05.19 20:02:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 20:02:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.14.198.1 . 2019.05.19 20:02:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 20:02:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:02:30 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ac6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active . 2019.05.19 20:02:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:30 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ac6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:02:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:30 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ac6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:02:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:30 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ac6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:02:30 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 20:02:30 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:02:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.05.19 20:02:30 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2019.05.19 20:02:30 - DNS leak protection with packet filtering enabled. . 2019.05.19 20:02:31 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 176.103.130.130, 176.103.130.131) . 2019.05.19 20:02:31 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to 2a00:5a60::ad1:ff, 2a00:5a60::ad2:ff) . 2019.05.19 20:02:31 - Routes, added a new route, 96.47.229.59 for gateway 10.14.198.1 . 2019.05.19 20:02:31 - Routes, added a new route, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ac6::1 . 2019.05.19 20:02:31 - Flushing DNS I 2019.05.19 20:02:34 - Checking route IPv4 I 2019.05.19 20:02:35 - Checking route IPv6 ! 2019.05.19 20:02:39 - Connected. . 2019.05.19 20:02:39 - OpenVPN > Initialization Sequence Completed . 2019.05.19 20:05:53 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting . 2019.05.19 20:05:53 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting . 2019.05.19 20:05:53 - OpenVPN > Restart pause, 5 second(s) ! 2019.05.19 20:05:53 - Disconnecting . 2019.05.19 20:05:53 - Routes, removed a route previously added, 96.47.229.59 for gateway 10.14.198.1 . 2019.05.19 20:05:53 - Routes, removed a route previously added, 2607:ff48:aa81:0:63d0:a812:fcd8:93ba for gateway fde6:7a:7d20:ac6::1 . 2019.05.19 20:05:53 - Sending management termination signal . 2019.05.19 20:05:53 - Management - Send 'signal SIGTERM' . 2019.05.19 20:05:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM' . 2019.05.19 20:05:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 96.47.229.61 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 20:05:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:05:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.14.198.1 . 2019.05.19 20:05:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:05:53 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.14.198.1 . 2019.05.19 20:05:53 - OpenVPN > Route deletion via IPAPI succeeded [adaptive] . 2019.05.19 20:05:53 - OpenVPN > delete_route_ipv6(::/3) . 2019.05.19 20:05:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route ::/3 interface=13 fe80::8 store=active . 2019.05.19 20:05:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:05:53 - OpenVPN > delete_route_ipv6(2000::/4) . 2019.05.19 20:05:53 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:05:53 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:05:54 - OpenVPN > delete_route_ipv6(3000::/4) . 2019.05.19 20:05:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:05:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:05:54 - OpenVPN > delete_route_ipv6(fc00::/7) . 2019.05.19 20:05:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 20:05:54 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:05:54 - OpenVPN > Closing TUN/TAP interface . 2019.05.19 20:05:54 - OpenVPN > delete_route_ipv6(fde6:7a:7d20:ac6::/64) . 2019.05.19 20:05:54 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 delete route fde6:7a:7d20:ac6::/64 interface=13 fe80::8 store=active . 2019.05.19 20:05:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete address Ethernet 2 fde6:7a:7d20:ac6::107c store=active . 2019.05.19 20:05:54 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 delete dns Ethernet 2 all . 2019.05.19 20:05:54 - OpenVPN > TAP: DHCP address released . 2019.05.19 20:05:54 - OpenVPN > SIGTERM[hard,init_instance] received, process exiting . 2019.05.19 20:05:54 - Connection terminated. . 2019.05.19 20:05:54 - DNS IPv4 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 20:05:54 - DNS IPv6 of a network adapter restored to original settings (Ethernet 2, to automatic) . 2019.05.19 20:05:54 - DNS leak protection with packet filtering disabled. . 2019.05.19 20:05:54 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv4 . 2019.05.19 20:05:54 - Interface Ethernet 2 metric restored from 3 to Automatic, layer IPv6 I 2019.05.19 20:05:57 - Checking authorization ... ! 2019.05.19 20:05:58 - Connecting to Scutum (United States, Dallas, Texas) . 2019.05.19 20:05:58 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:05:58 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:05:58 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:05:58 - Connection to OpenVPN Management Interface . 2019.05.19 20:05:58 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:05:58 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:05:58 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:05:58 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:05:58 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:05:58 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.14:443 . 2019.05.19 20:05:58 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:05:58 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:05:58 - OpenVPN > UDP link remote: [AF_INET]199.249.230.14:443 . 2019.05.19 20:05:58 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:06:31 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 20:06:31 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 20:06:36 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 20:06:36 - Disconnecting . 2019.05.19 20:06:36 - Connection terminated. I 2019.05.19 20:06:39 - Checking authorization ... ! 2019.05.19 20:06:40 - Connecting to Libra (United States, Atlanta, Georgia) . 2019.05.19 20:06:40 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:06:40 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:06:40 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:06:40 - Connection to OpenVPN Management Interface . 2019.05.19 20:06:40 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:06:40 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:06:40 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:06:40 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:06:40 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:06:40 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]64.42.179.69:443 . 2019.05.19 20:06:40 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:06:40 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:06:40 - OpenVPN > UDP link remote: [AF_INET]64.42.179.69:443 . 2019.05.19 20:06:40 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:07:12 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 20:07:12 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 20:07:17 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 20:07:17 - Disconnecting . 2019.05.19 20:07:17 - Connection terminated. I 2019.05.19 20:07:20 - Checking authorization ... ! 2019.05.19 20:07:21 - Connecting to Vulpecula (United States, Dallas, Texas) . 2019.05.19 20:07:21 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:07:21 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:07:21 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:07:21 - Connection to OpenVPN Management Interface . 2019.05.19 20:07:21 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:07:21 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:07:21 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:07:21 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:07:21 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:07:21 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.4:443 . 2019.05.19 20:07:21 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:07:21 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:07:21 - OpenVPN > UDP link remote: [AF_INET]199.249.230.4:443 . 2019.05.19 20:07:21 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:07:53 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 20:07:53 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 20:07:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 20:07:58 - Disconnecting . 2019.05.19 20:07:58 - Connection terminated. I 2019.05.19 20:08:01 - Checking authorization ... ! 2019.05.19 20:08:02 - Connecting to Equuleus (United States, Dallas, Texas) . 2019.05.19 20:08:02 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:08:02 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:08:02 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:08:02 - Connection to OpenVPN Management Interface . 2019.05.19 20:08:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:08:02 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:08:02 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:08:02 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:08:02 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:08:02 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.39:443 . 2019.05.19 20:08:02 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:08:02 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:08:02 - OpenVPN > UDP link remote: [AF_INET]199.249.230.39:443 . 2019.05.19 20:08:02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:08:35 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 20:08:35 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 20:08:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 20:08:40 - Disconnecting . 2019.05.19 20:08:40 - Connection terminated. I 2019.05.19 20:08:43 - Checking authorization ... ! 2019.05.19 20:08:43 - Connecting to Lich (United States, New York City, New York) . 2019.05.19 20:08:43 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:08:43 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:08:43 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:08:43 - Connection to OpenVPN Management Interface . 2019.05.19 20:08:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:08:43 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:08:43 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:08:43 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:08:43 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:08:43 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]194.36.111.61:443 . 2019.05.19 20:08:43 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:08:43 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:08:43 - OpenVPN > UDP link remote: [AF_INET]194.36.111.61:443 . 2019.05.19 20:08:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:09:15 - OpenVPN > [UNDEF] Inactivity timeout (--ping-exit), exiting . 2019.05.19 20:09:15 - OpenVPN > SIGTERM received, sending exit notification to peer . 2019.05.19 20:09:20 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting ! 2019.05.19 20:09:20 - Disconnecting . 2019.05.19 20:09:20 - Connection terminated. I 2019.05.19 20:09:23 - Checking authorization ... ! 2019.05.19 20:09:23 - Connecting to Helvetios (United States, Dallas, Texas) . 2019.05.19 20:09:23 - OpenVPN > OpenVPN 2.4.6 x86_64-w64-mingw32 [SSL (OpenSSL)] [LZO] [LZ4] [PKCS11] [AEAD] built on Apr 27 2018 . 2019.05.19 20:09:23 - OpenVPN > Windows version 6.2 (Windows 8 or greater) 64bit . 2019.05.19 20:09:23 - OpenVPN > library versions: OpenSSL 1.1.0h 27 Mar 2018, LZO 2.10 . 2019.05.19 20:09:23 - Connection to OpenVPN Management Interface . 2019.05.19 20:09:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100 . 2019.05.19 20:09:23 - OpenVPN > Outgoing Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:09:23 - OpenVPN > Outgoing Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:09:23 - OpenVPN > Incoming Control Channel Encryption: Cipher 'AES-256-CTR' initialized with 256 bit key . 2019.05.19 20:09:23 - OpenVPN > Incoming Control Channel Encryption: Using 256 bit message hash 'SHA256' for HMAC authentication . 2019.05.19 20:09:23 - OpenVPN > TCP/UDP: Preserving recently used remote address: [AF_INET]199.249.230.49:443 . 2019.05.19 20:09:23 - OpenVPN > Socket Buffers: R=[65536->262144] S=[65536->262144] . 2019.05.19 20:09:23 - OpenVPN > UDP link local: (not bound) . 2019.05.19 20:09:23 - OpenVPN > UDP link remote: [AF_INET]199.249.230.49:443 . 2019.05.19 20:09:23 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100 . 2019.05.19 20:09:23 - OpenVPN > TLS: Initial packet from [AF_INET]199.249.230.49:443, sid=7ee3d714 064cf242 . 2019.05.19 20:09:24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org . 2019.05.19 20:09:24 - OpenVPN > VERIFY KU OK . 2019.05.19 20:09:24 - OpenVPN > Validating certificate extended key usage . 2019.05.19 20:09:24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication . 2019.05.19 20:09:24 - OpenVPN > VERIFY EKU OK . 2019.05.19 20:09:24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=Helvetios, emailAddress=info@airvpn.org . 2019.05.19 20:09:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1.2 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA . 2019.05.19 20:09:24 - OpenVPN > [Helvetios] Peer Connection Initiated with [AF_INET]199.249.230.49:443 . 2019.05.19 20:09:25 - OpenVPN > SENT CONTROL [Helvetios]: 'PUSH_REQUEST' (status=1) . 2019.05.19 20:09:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,comp-lzo no,redirect-gateway ipv6 def1 bypass-dhcp,dhcp-option DNS 10.18.214.1,dhcp-option DNS6 fde6:7a:7d20:ed6::1,tun-ipv6,route-gateway 10.18.214.1,topology subnet,ping 10,ping-restart 60,ifconfig-ipv6 fde6:7a:7d20:ed6::102b/64 fde6:7a:7d20:ed6::1,ifconfig 10.18.214.45 255.255.255.0,peer-id 3,cipher AES-256-GCM' . 2019.05.19 20:09:25 - OpenVPN > Pushed option removed by filter: 'redirect-gateway ipv6 def1 bypass-dhcp' . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: compression parms modified . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: route-related options modified . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: peer-id set . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: adjusting link_mtu to 1625 . 2019.05.19 20:09:25 - OpenVPN > OPTIONS IMPORT: data channel crypto options modified . 2019.05.19 20:09:25 - OpenVPN > Data Channel: using negotiated cipher 'AES-256-GCM' . 2019.05.19 20:09:25 - OpenVPN > Outgoing Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:09:25 - OpenVPN > Incoming Data Channel: Cipher 'AES-256-GCM' initialized with 256 bit key . 2019.05.19 20:09:25 - OpenVPN > interactive service msg_channel=0 . 2019.05.19 20:09:25 - OpenVPN > ROUTE_GATEWAY 192.168.0.1/255.255.255.0 I=3 HWADDR=54:e1:ad:e0:00:f5 . 2019.05.19 20:09:25 - OpenVPN > GDG6: remote_host_ipv6=n/a . 2019.05.19 20:09:25 - OpenVPN > GetBestInterfaceEx() returned if=3 . 2019.05.19 20:09:25 - OpenVPN > GDG6: II=3 DP=::/0 NH=fe80::20b:ff:fe00:add0 . 2019.05.19 20:09:25 - OpenVPN > GDG6: Metric=256, Loopback=0, AA=1, I=0 . 2019.05.19 20:09:25 - OpenVPN > ROUTE6_GATEWAY fe80::20b:ff:fe00:add0 I=3 . 2019.05.19 20:09:25 - OpenVPN > open_tun . 2019.05.19 20:09:25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{25F5D614-41C9-41A3-9A34-0CA9879E39AB}.tap . 2019.05.19 20:09:25 - OpenVPN > TAP-Windows Driver Version 9.21 . 2019.05.19 20:09:25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.18.214.0/10.18.214.45/255.255.255.0 [SUCCEEDED] . 2019.05.19 20:09:25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.18.214.45/255.255.255.0 on interface {25F5D614-41C9-41A3-9A34-0CA9879E39AB} [DHCP-serv: 10.18.214.254, lease-time: 31536000] . 2019.05.19 20:09:25 - OpenVPN > Successful ARP Flush on interface [13] {25F5D614-41C9-41A3-9A34-0CA9879E39AB} . 2019.05.19 20:09:25 - OpenVPN > do_ifconfig, tt->did_ifconfig_ipv6_setup=1 . 2019.05.19 20:09:26 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set address interface=13 fde6:7a:7d20:ed6::102b store=active . 2019.05.19 20:09:27 - OpenVPN > NETSH: C:\WINDOWS\system32\netsh.exe interface ipv6 set dns Ethernet 2 static fde6:7a:7d20:ed6::1 validate=no . 2019.05.19 20:09:27 - OpenVPN > add_route_ipv6(fde6:7a:7d20:ed6::/64 -> fde6:7a:7d20:ed6::102b metric 0) dev Ethernet 2 . 2019.05.19 20:09:27 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fde6:7a:7d20:ed6::/64 interface=13 fe80::8 store=active . 2019.05.19 20:09:27 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:09:32 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 199.249.230.49 MASK 255.255.255.255 192.168.0.1 . 2019.05.19 20:09:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4 . 2019.05.19 20:09:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.18.214.1 . 2019.05.19 20:09:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 20:09:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.18.214.1 . 2019.05.19 20:09:32 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=35 and dwForwardType=4 . 2019.05.19 20:09:32 - OpenVPN > Route addition via IPAPI succeeded [adaptive] . 2019.05.19 20:09:32 - OpenVPN > add_route_ipv6(::/3 -> fde6:7a:7d20:ed6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route ::/3 interface=13 fe80::8 store=active . 2019.05.19 20:09:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:09:32 - OpenVPN > add_route_ipv6(2000::/4 -> fde6:7a:7d20:ed6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 2000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:09:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:09:32 - OpenVPN > add_route_ipv6(3000::/4 -> fde6:7a:7d20:ed6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route 3000::/4 interface=13 fe80::8 store=active . 2019.05.19 20:09:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:09:32 - OpenVPN > add_route_ipv6(fc00::/7 -> fde6:7a:7d20:ed6::1 metric -1) dev Ethernet 2 . 2019.05.19 20:09:32 - OpenVPN > C:\WINDOWS\system32\netsh.exe interface ipv6 add route fc00::/7 interface=13 fe80::8 store=active . 2019.05.19 20:09:32 - OpenVPN > env_block: add PATH=C:\WINDOWS\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem . 2019.05.19 20:09:32 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv4 . 2019.05.19 20:09:32 - Interface Ethernet 2 metric changed from Automatic to 3, layer IPv6 . 2019.05.19 20:09:32 - DNS leak protection with packet filtering enabled. . 2019.05.19 20:09:32 - DNS IPv4 of a network adapter forced (Ethernet 2, from automatic to 176.103.130.130, 176.103.130.131) . 2019.05.19 20:09:33 - DNS IPv6 of a network adapter forced (Ethernet 2, from automatic to 2a00:5a60::ad1:ff, 2a00:5a60::ad2:ff) . 2019.05.19 20:09:33 - Routes, added a new route, 199.249.230.47 for gateway 10.18.214.1 . 2019.05.19 20:09:33 - Routes, added a new route, 2620:7:6001:c024:c74a:96e4:16bd:fff for gateway fde6:7a:7d20:ed6::1 . 2019.05.19 20:09:33 - Flushing DNS I 2019.05.19 20:09:36 - Checking route IPv4 I 2019.05.19 20:09:37 - Checking route IPv6 ! 2019.05.19 20:09:41 - Connected. . 2019.05.19 20:09:41 - OpenVPN > Initialization Sequence Completed . 2019.05.19 20:11:07 - Updating systems & servers data ... . 2019.05.19 20:11:09 - Systems & servers data update completed
  10. Hi, I'm having difficulty following the earlier guide; there isn't a checkbox for "Allow detected DNS" in the Network Lock tab, and when I type in the addresses in the Routes dialogue, nothing happens in the "notes" field. Maybe I'm using an outdated version of the Eddie client?
  11. I'm in the UK. For a number of weeks/months, I have had intermittent problems using AirVPN M247 servers in London. Currently Geminorum, previously Alshain, Asterion. The problem manifests as slow browsing with occasional total network freezes, on occasions this was associated with slow speed tests. (appox 2Mb/s). On investigation there appears to be extended periods of increased latency using these London servers. When using them I see 100-200 ms pings to nearby sites instead of a more normal 25ms. On further investigation traceroute shows the added latency occurs at between node lonap.as9009.net and the rest of the UK, which I think is to do with the London M247 data centre peering to the rest of the UK. I don't see increased latency if I try from Amsterdam. So I see the high latency between Airvpn servers (UK Maidenhead) Kitel and (London) Geminorum but not between (Netherlands) Alphard and (London) Geminorum. So my guess is that the London M247 data centre has some kind of regular problem/bottle neck peering with the rest of the UK and this might be what is causing my occasional slow browsing, Do you know anything about this? Can anything be done to fix it? I don't know a lot about networking so please expect and forgive any false/ignorant assumptions. Obviously, as a work around, I can just use other UK servers, so the issue isn't critical. Regards
  12. Last week
  13. Why do websites keep doing this... I usually visit AirVPN website to check if there is an Eddie update. On https://airvpn.org/windows/ I middle click Changelog: nothing. I right click to choose "Open Link in New Tab": nothing, as if it is not a link, even though cursor indicates that it is a link. Evidently even the changelog page is hidden behind some Javascript code now, and I am forced to allow Javascript just to see it. Fine, I'll bookmark it to access it easily next time. But no, it is not a page, it opens in a modal window! Why would something that is not a warning open in a modal window? I hit the Page Down key (or space key, or down arrow key) to see more content (since it is a modal window for no reason, not enough content fits), but no, the main page moves down instead of the changelog, because the changelog is in a modal window for no reason. I am forced to use the cursor just to move down. I then want to go back to the page; I can't just close this one as I was unable to open it in a new tab. So I click backspace button to go back. Nothing happens, because I am not on a new page, it is just a modal window. I try the Escape key, nothing happens. I need to use the cursor again, just to go back to the page. (I am primarily a keyboard user, I dislike having to use mouse. Normally I wouldn't use the mouse even to click the link, I would just use the ' keyboard shortcut on Firefox to click it, but since it is no longer an actual link, I could not.) I shouldn't care about this that much as I don't use it that often, but I couldn't help but rant as I keep seeing all websites move to this Javascript-heavy app-like UI. I don't really understand, whom is this supposed to help? What would be wrong with simple HTML pages? The page https://airvpn.org/mirrors/eddie.website/changelog/ is so much better to navigate and more accessible than a modal window in another page (I found it from my browsing history; I bookmarked it, but I am not sure if it will be updated, given that the new design does not link to it). On a positive note, I like that the forum has less useless whitespace than it used to. Ideally I would prefer even less, but modern website trends tends to add even further whitespace, so I was pleasently surprised to see it more information-dense. I am not fond of the app-like navigation between pages, but at least it works normally with Javascript disabled.
  14. Since yesterday I was able to forward ports no problem. Then today I tried to forward a port and clicked test in the client area and the circle stayed grey. Any idea why?
  15. Some servers work and some don't. It's hit or miss currently.
  16. I'm picking up the thread from the last page, so I apologize if this has already been addressed. Can you ping ANY outside sites, from the pfSense box itself? Diagnostics > Ping. Select the WAN as the source address and attempt to ping an Air server (i.e. ran.airvpn.org) and see what happens. If not, then there's another issue, likely NAT related that's preventing it from getting a connection to the VPN. If it works, then please try the following: VPN > OpenVPN > Clients. You have 4 buttons along the top: Settings, Related Status, Related Log Entries, Help. Click "Related Log Entries" and THAT will tell you what occurs when trying to connect to AirVPN.
  17. Hi NaDre, thank you but I am hoping to do this over command line rather than a browser ideally so I can automate it as a script. Is there a way to do this using the API?
  18. Use the "Client Area"/"Config Generator" tabs. Check the "Advanced Mode" box. Select the "Linux" button in "Choose your Operating System". Select "UDP" in "Protocols". In the "By single servers" area click the "Invert selection" button. At the bottom press the "Generate" button. Then find "or download an archive by choosing a format" and select one to download.
  19. Hi, I was wondering if there is a way to get the .ovpn config files downloaded via terminal in Ubuntu. I am trying to automate my setup a bit. The goal is to download .ovpn files for all available servers and stored locally to integrate into network manager. I'm not a very advanced user but am trying to learn; apologies if this question is covered elsewhere or doesn't make sense. I couldn't find anything like this in the API FAQ.
  20. Hello! We're glad to inform you that we are opening the beta testing phase of our free and open source software Eddie for Android version 2.3. You can participate to the beta testing by joining the beta community in the Google Play Store here: https://play.google.com/apps/testing/org.airvpn.eddie You can also download the Eddie Android 2.2 beta 1 apk directly from our repository: https://eddie.website/repository/eddie/android/2.3beta1/org.airvpn.eddie.apk The application is fully localized and we look for translators, especially for translations into Japanese, Korean and other languages. If you wish to translate (from English) please contact info@airvpn.org for every detail. Available languages: Chinese (simplified), Chinese (traditional), Danish, Dutch, English, French, German, Italian, Portuguese, Spanish, Russian, Turkish. Eddie for Android is free and open source software released under GPLv3. We invite you to check from independent 3rd parties the lack of trackers code signatures, for example here: https://reports.exodus-privacy.eu.org/en/reports/search/org.airvpn.eddie New in version 2.3: Disabled data backup on uninstall Server statistics shown in Favorite/Forbidden/Countries & Servers groups Logout drops user credentials Native library updated to the latest openvpn3, lz4, mbedtls and asio commits Minor bug fixes Main features: Free and open source OpenVPN GUI based on OpenVPN 3 The only Android application officially developed by AirVPN Robust, best effort prevention of traffic leaks outside the VPN tunnel Battery-conscious application Low RAM footprint Ergonomic and friendly interface Ability to start and connect the application at device boot Option to define which apps must have traffic inside or outside the VPN tunnel through white and black list Localization in simplified and traditional Chinese, Danish, English, French, German, Italian, Portuguese, Russian, Spanish, Turkish Full integration with AirVPN Enhanced security thanks to locally stored encrypted data through master password Quick one-tap connection and smart, fully automated server selection Smart server selection with custom settings Manual server selection Smart attempts to bypass OpenVPN blocks featuring protocol and server fail-over Full Android TV compatibility including D-Pad support. Mouse emulation is not required. Enhancements aimed to increase accessibility and comfort to visually impaired persons AirVPN servers sorting options Customizable "Favorite" and "Forbidden" servers and countries OpenVPN mimetype support to import profiles from external applications Multiple OpenVPN profile support. The app now imports and manages multiple OpenVPN profiles Support for custom bootstrap servers Support for favorite and forbidden countries AirVPN broadcast messages support User's subscription expiration date is shown in login/connection information The app is aware of concurrent VPN use. In case another app is granted VPN access, Eddie acts accordingly and releases VPN resources Optional local networks access. In such case, local network devices are exempted from the VPN and can be accessed within the local devices Localization override. User can choose the default language and localization from one of the available ones Favorite and forbidden lists can be emptied with a single tap VPN Lock can now be disabled or enabled from settings VPN reconnection in case of unexpected OpenVPN disconnection. (It requires VPN Lock to be disabled) User can generate an OpenVPN profile for any AirVPN server or country and save it in OpenVPN profile manager Server scoring algorithm implementing the latest AirVPN balancing factors in order to determine the best server for quick connection Network name and extra information are shown along with network type Device network status management Changelog 2.3 beta 1 (VC 21) - Release date: 17 May 2019 by ProMIND AndroidManifest.xml - [ProMIND] set android:allowBackup and android:fullBackupOnly to false airvpn_server_listview_group_item.xml - [ProMIND] added server statistics layout ConnectAirVPNServerFragment.java - [ProMIND] AirVPNServerExpandableListAdapter.GroupListViewHolder: added server statistics items - [ProMIND] AirVPNServerExpandableListAdapter.getGroupView(): added server statistics items to HEADER and GROUP types - [ProMIND] createGroupList(): compute server statistics for HEADER and GROUP types AirVPNUser.java - [ProMIND] getUserLocation(): set connection timeout to SupportTools.HTTP_CONNECTION_TIMEOUT - [ProMIND] getUserLocation(): set read timeout to SupportTools.HTTP_READ_TIMEOUT - [ProMIND] logout(): user name, password and current profile are set to empty and forgetAirVPNCredentials() is called native library - [ProMIND] updated to the latest openvpn3, lz4, mbedtls and asio commits manifest.xml - [ProMIND] updated to the latest document Complete changelog for stable release 2.2: https://gitlab.com/AirVPN/EddieAndroid/blob/master/ChangeLog.txt Kind regards and datalove AirVPN Staff
  21. i assume this still isn't working. i can see about 5 options to change 1. under NCP ADD aes 256 GCM 2. auth digest alg needs to be set to sha512 3. toppology needs to be changed to subnet 4. TOS service need to uncheck don't pull routes. 5. please change VERB to 4 so we can actually read issues i the log
  22. Out of interest, who is the Data Center provider?
  23. Thanks for the kind words! Here's the log: Eddie System/Environment Report - 5/17/2019 10:43 PM UTC Eddie version: 2.17.2 Eddie OS build: linux_x64 Eddie architecture: x64 OS type: Linux OS name: Linux Mint 19.1 Tessa \n \l OS version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux OS architecture: x64 Mono /.Net Framework: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 OpenVPN driver: Found, /dev/net/tun OpenVPN: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) SSH: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) SSL: stunnel 5.44 (/usr/bin/stunnel4) curl: 7.58.0 (/usr/bin/curl) Profile path: /home/betacat/.airvpn/default.xml Data path: /home/betacat/.airvpn Application path: /usr/lib/eddie-ui Executable path: /usr/lib/eddie-ui/Eddie-UI.exe Command line arguments: (5 args) path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" Network Lock Active: No Connected to VPN: No Detected DNS: 127.0.0.53 Test DNS IPv4: Ok Test DNS IPv6: Ok Test Ping IPv4: -1 ms Test Ping IPv6: 174 ms Test HTTP IPv4: Error:curl: (28) Connection timed out after 20001 milliseconds Test HTTP IPv6: Ok Test HTTPS: Ok ---------------------------- Important options not at defaults: login: (omissis) password: (omissis) remember: True gui.tray_show: False gui.tray_minimized: False ---------------------------- Logs: . 2019.05.17 15:41:35 - Eddie version: 2.17.2 / linux_x64, System: Linux, Name: Linux Mint 19.1 Tessa \n \l, Version: Linux system-x 4.15.0-50-generic #54-Ubuntu SMP Mon May 6 18:46:08 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux, Mono/.Net: 4.6.2 (Debian 4.6.2.7+dfsg-1ubuntu1); Framework: v4.0.30319 . 2019.05.17 15:41:35 - Reading options from /home/betacat/.airvpn/default.xml . 2019.05.17 15:41:36 - Command line arguments (5): path="/home/betacat/.airvpn" path.resources="/usr/share/eddie-ui" path.exec="/usr/bin/eddie-ui" console.mode="none" linux.dbus="unix:path=/run/user/1000/bus" . 2019.05.17 15:41:36 - Profile path: /home/betacat/.airvpn/default.xml . 2019.05.17 15:41:38 - OpenVPN Driver - Found, /dev/net/tun . 2019.05.17 15:41:38 - OpenVPN - Version: 2.4.4 - OpenSSL 1.1.0g 2 Nov 2017, LZO 2.08 (/usr/sbin/openvpn) . 2019.05.17 15:41:38 - SSH - Version: OpenSSH_7.6p1 Ubuntu-4ubuntu0.3, OpenSSL 1.0.2n 7 Dec 2017 (/usr/bin/ssh) . 2019.05.17 15:41:38 - SSL - Version: stunnel 5.44 (/usr/bin/stunnel4) . 2019.05.17 15:41:38 - curl - Version: 7.58.0 (/usr/bin/curl) . 2019.05.17 15:41:38 - Certification Authorities: /usr/share/eddie-ui/cacert.pem I 2019.05.17 15:41:39 - Ready . 2019.05.17 15:41:40 - Collect information about AirVPN completed ---------------------------- Network Interfaces and Routes: { "support_ipv4": true, "support_ipv6": true, "routes": [ { "address": "0.0.0.0\/0", "gateway": "xxx.xxx.x.xxx", "interface": "enp0s10", "metric": "20100" }, { "address": "2600:1700:cb80:2600::\/60", "gateway": "fe80::fa18:97ff:fe4b:47ed", "interface": "enp0s10", "metric": "100" }, { "address": "::\/0", "gateway": "fe80::fa18:97ff:fe4b:47ed", "interface": "enp0s10", "metric": "20100" } ], "interfaces": [ { "friendly": "lo", "id": "lo", "name": "lo", "description": "lo", "type": "Loopback", "status": "Unknown", "bytes_received": "8879028", "bytes_sent": "8879028", "support_ipv4": true, "support_ipv6": true, "ips": [ "xxx.x.x.x", "::1" ], "gateways": [], "bind": true }, { "friendly": "enp0s10", "id": "enp0s10", "name": "enp0s10", "description": "enp0s10", "type": "Ethernet", "status": "Up", "bytes_received": "6003777086", "bytes_sent": "661455669", "support_ipv4": true, "support_ipv6": true, "ips": [ "xxx.xxx.x.66", "2600:1700:cb80:2600:2501:60ed:7ae6:faf9", "2600:1700:cb80:2600:ba96:d3fc:913a:8220", "fe80::b697:ad65:b913:32e4" ], "gateways": [ "xxx.xxx.x.xxx", "fe80::fa18:97ff:fe4b:47ed" ], "bind": true } ], "ipv4-default-gateway": "xxx.xxx.x.xxx", "ipv4-default-interface": "enp0s10", "ipv6-default-gateway": "fe80::fa18:97ff:fe4b:47ed", "ipv6-default-interface": "enp0s10" } ---------------------------- UID: 0 Run as normal user: True; ID:1000; Name:betacat ---------------------------- ip addr show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 inet xxx.x.x.x/8 scope host lo valid_lft forever preferred_lft forever inet6 ::1/128 scope host valid_lft forever preferred_lft forever 2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP group default qlen 1000 link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff inet xxx.xxx.x.66/24 brd xxx.xxx.x.255 scope global dynamic noprefixroute enp0s10 valid_lft 73849sec preferred_lft 73849sec inet6 2600:1700:cb80:2600:2501:60ed:7ae6:faf9/64 scope global temporary dynamic valid_lft 3580sec preferred_lft 3580sec inet6 2600:1700:cb80:2600:ba96:d3fc:913a:8220/64 scope global dynamic mngtmpaddr noprefixroute valid_lft 3580sec preferred_lft 3580sec inet6 fe80::b697:ad65:b913:32e4/64 scope link noprefixroute valid_lft forever preferred_lft forever ---------------------------- ip link show: 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 2: enp0s10: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc fq_codel state UP mode DEFAULT group default qlen 1000 link/ether 00:15:f2:82:7c:d4 brd ff:ff:ff:ff:ff:ff ---------------------------- ip -4 route show: default via xxx.xxx.x.xxx dev enp0s10 proto dhcp metric 20100 xxx.xxx.0.0/16 dev enp0s10 scope link metric 1000 xxx.xxx.x.0/24 dev enp0s10 proto kernel scope link src xxx.xxx.x.66 metric 100 ---------------------------- ip -6 route show: 2600:1700:cb80:2600::/64 dev enp0s10 proto ra metric 100 pref medium 2600:1700:cb80:2600::/60 via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 100 pref high fe80::/64 dev enp0s10 proto kernel metric 100 pref medium fe80::/64 dev enp0s10 proto kernel metric 256 pref medium default via fe80::fa18:97ff:fe4b:47ed dev enp0s10 proto ra metric 20100 pref medium
  24. I see SSL in the logs. Are you really using SSH? Have you tried SSL/443? It should work everywhere because networks blocking this also block all HTTPS traffic to the web and I don't think they want this.
  25. Hm. Do this again like you always use Eddie but after disconnection create a support file instead. You find it in the logs tab, a swimming ring icon on the right. You can choose to only paste the last 20-30 log lines, if you want. I'm only interested in the verbose output around that NetLock deactivation message, I think it shows the command used, its execution status and everything that might get posted as an error. And generally, I really like how you are not turning away from this either, thinking for yourself working out solutions for smaller issues around your main one. Keep it up, I'm sure we get behind all this, and thank you!
  26. Hello, I use Eddie in this very restricted university network where 'airvpn' is blocked everywhere. Many of its known IPs are also blocked. After attempting several protocols and settings combination I finally got airvpn to work using SSH with port 80 via Castor and Chara only. Couldn't make it to work on iOS yet. After successfully establishing connections using MacOS, I did also with a Lubuntu VM running in Windows with McAfee firewall on as host. Recently, the linux VM stopped connecting over SSH ONLY. If I go to any other network and attempt UDP, TCP, etc, it connects without any issues. SSH will fail not only in this university network, but at home as well or anywhere. It still goes fine on Mac. Linux logs do not show me anything. Only that it keeps trying to check IPv4 tunnel and that's it: I have also tried to use the new experimental Eddie client, disabling the host OS firewall, accessing Eddie as root. All to no avail. Meanwhile SSH with port 80 keeps working nicely in MacOS. Any hints? Thank you very much!
  27. Hello, unless we misunderstand the request, the need can be met by ticking "Lock current" in the "Servers" tab. Kind regards
  1. Load more activity
×
×
  • Create New...