Jump to content
Not connected, Your IP: 3.15.145.50
HorseClaws

can't connect to internet behind VPN

Recommended Posts

To receive mail or use any browser or update any program, i need to disconnect the VPN service.

Changing servers doesn't work.

Do i need to re-install AirVPN? perhaps you have an other suggestion?

This happened suddenly yesterday afternoon and it hasn't functioned properly ever since.

 

Thanks in advance.

Share this post


Link to post

To receive mail or use any browser or update any program, i need to disconnect the VPN service.

Changing servers doesn't work.

Do i need to re-install AirVPN? perhaps you have an other suggestion?

This happened suddenly yesterday afternoon and it hasn't functioned properly ever since.

 

Thanks in advance.

 

Hello,

 

can you please publish your client logs taken after a connection has been (allegedly) established?

 

Kind regards

Share this post


Link to post
Am having the same issue - I can't connect to anything online anymore when AirVPN is on. This issue occurred only this week - everything was fine previously. 

 

I get an error "Checking Route, 1 try failed (The operation has timed out)" - it keeps trying about 4-5 times then it tries a different server to the same effect. 

 

Unticking the 'Check if the tunnel effectively works' option in the Advanced tab gets rid of the 'Checking route' error and leads to successfully connecting to a server but still cannot access anything online.

 

Windows 8.1

AirVPN client v2.7 for Windows 8 64-bit

Antivirus: Avast free

Firewall: built-in Windows

 

Troubleshooting done:

1. turned firewall off

- problem persists

 

2. turned antivirus off

- problem persists

 

3. uninstalled antivirus

- problem persists

- everything was working fine till a few days ago. Noticed that Avast installs its own OpenVPN as part of its SecureLineVPN feature so I thought that may be the issue. The SecureLineVPN is a paid for service so I wasn't using it but it appears the installer installs OpenVPN just the same. Uninstalling Avast did not make a difference however.  

 

4. uninstalled AirVPN client and re-installed

- problem persists

- when I uninstalled AirVPN and re-installed it, a new problem came up when I tried to run AirVPN > it produced a 'failure to install the tunnel driver' error. Searching online led me to replacing the OpenVPN v2.3.4 files that came with the AirVPN installer to the OpenVPN v2.3.5 files. This solved the tunnel driver installation error but still couldn't access anything online with AirVPN on.

 

5. connected using OpenVPN GUI instead of AirVPN client

- problem persists

 

I think the tunnelling software is not working but I can't figure out how to fix it. Would appreciate any ideas or input that you may have. Below are 3 sets of logs which I hope are useful.

 

My log file with 'Check if the tunnel effectively works' option ticked (fails to connect to server):

 

I 2014.10.31 01:29:52 - Session starting.

! 2014.10.31 01:29:52 - Checking environment

! 2014.10.31 01:29:52 - Checking authorization ...

! 2014.10.31 01:29:52 - Connecting to Nashira (United Kingdom, Manchester)

. 2014.10.31 01:29:53 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014

. 2014.10.31 01:29:53 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2014.10.31 01:29:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2014.10.31 01:29:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2014.10.31 01:29:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:29:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:29:53 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]

. 2014.10.31 01:29:53 - OpenVPN > UDPv4 link local: [undef]

. 2014.10.31 01:29:53 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443

. 2014.10.31 01:29:53 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=35bb3672 00d03828

. 2014.10.31 01:29:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2014.10.31 01:29:53 - OpenVPN > Validating certificate key usage

. 2014.10.31 01:29:53 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2014.10.31 01:29:53 - OpenVPN > VERIFY KU OK

. 2014.10.31 01:29:53 - OpenVPN > Validating certificate extended key usage

. 2014.10.31 01:29:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2014.10.31 01:29:53 - OpenVPN > VERIFY EKU OK

. 2014.10.31 01:29:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2014.10.31 01:29:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:29:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:29:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:29:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:29:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2014.10.31 01:29:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443

. 2014.10.31 01:29:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2014.10.31 01:29:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'

. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: route options modified

. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2014.10.31 01:29:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2014.10.31 01:29:59 - OpenVPN > open_tun, tt->ipv6=0

. 2014.10.31 01:29:59 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap

. 2014.10.31 01:29:59 - OpenVPN > TAP-Windows Driver Version 9.21

. 2014.10.31 01:29:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]

. 2014.10.31 01:29:59 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}

. 2014.10.31 01:30:04 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4

. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:04 - Starting Management Interface

. 2014.10.31 01:30:04 - OpenVPN > Initialization Sequence Completed

! 2014.10.31 01:30:04 - Flushing DNS

! 2014.10.31 01:30:04 - Checking route

W 2014.10.31 01:30:14 - Checking route, 1° try failed (The operation has timed out)

W 2014.10.31 01:30:24 - Checking route, 2° try failed (The operation has timed out)

W 2014.10.31 01:30:34 - Checking route, 3° try failed (The operation has timed out)

W 2014.10.31 01:30:44 - Checking route, 4° try failed (The operation has timed out)

W 2014.10.31 01:30:54 - Checking route, 5° try failed (The operation has timed out)

W 2014.10.31 01:30:54 - The operation has timed out

! 2014.10.31 01:30:54 - Disconnecting

. 2014.10.31 01:30:54 - Management - Send 'signal SIGTERM'

. 2014.10.31 01:30:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2014.10.31 01:30:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2014.10.31 01:30:54 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:30:59 - OpenVPN > Closing TUN/TAP interface

. 2014.10.31 01:30:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2014.10.31 01:30:59 - Connection terminated.

! 2014.10.31 01:31:02 - Checking authorization ...

! 2014.10.31 01:31:02 - Connecting to Nashira (United Kingdom, Manchester)

. 2014.10.31 01:31:02 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014

. 2014.10.31 01:31:02 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2014.10.31 01:31:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2014.10.31 01:31:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2014.10.31 01:31:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:31:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:31:02 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]

. 2014.10.31 01:31:02 - OpenVPN > UDPv4 link local: [undef]

. 2014.10.31 01:31:02 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443

. 2014.10.31 01:31:02 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=89a37c03 c4d0b556

. 2014.10.31 01:31:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2014.10.31 01:31:03 - OpenVPN > Validating certificate key usage

. 2014.10.31 01:31:03 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2014.10.31 01:31:03 - OpenVPN > VERIFY KU OK

. 2014.10.31 01:31:03 - OpenVPN > Validating certificate extended key usage

. 2014.10.31 01:31:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2014.10.31 01:31:03 - OpenVPN > VERIFY EKU OK

. 2014.10.31 01:31:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2014.10.31 01:31:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:31:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:31:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:31:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:31:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2014.10.31 01:31:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443

. 2014.10.31 01:31:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2014.10.31 01:31:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'

. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: route options modified

. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2014.10.31 01:31:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2014.10.31 01:31:08 - OpenVPN > open_tun, tt->ipv6=0

. 2014.10.31 01:31:08 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap

. 2014.10.31 01:31:08 - OpenVPN > TAP-Windows Driver Version 9.21

. 2014.10.31 01:31:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]

. 2014.10.31 01:31:08 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}

. 2014.10.31 01:31:13 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4

. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:31:13 - Starting Management Interface

. 2014.10.31 01:31:13 - OpenVPN > Initialization Sequence Completed

! 2014.10.31 01:31:13 - Flushing DNS

! 2014.10.31 01:31:13 - Checking route

W 2014.10.31 01:31:23 - Checking route, 1° try failed (The operation has timed out)

W 2014.10.31 01:31:33 - Checking route, 2° try failed (The operation has timed out)

W 2014.10.31 01:31:43 - Checking route, 3° try failed (The operation has timed out)

W 2014.10.31 01:31:53 - Checking route, 4° try failed (The operation has timed out)

W 2014.10.31 01:32:03 - Checking route, 5° try failed (The operation has timed out)

W 2014.10.31 01:32:03 - The operation has timed out

! 2014.10.31 01:32:03 - Disconnecting

. 2014.10.31 01:32:03 - Management - Send 'signal SIGTERM'

. 2014.10.31 01:32:03 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2014.10.31 01:32:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2014.10.31 01:32:03 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:08 - OpenVPN > Closing TUN/TAP interface

. 2014.10.31 01:32:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2014.10.31 01:32:08 - Connection terminated.

! 2014.10.31 01:32:11 - Checking authorization ...

! 2014.10.31 01:32:12 - Connecting to Nashira (United Kingdom, Manchester)

. 2014.10.31 01:32:12 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014

. 2014.10.31 01:32:12 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2014.10.31 01:32:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2014.10.31 01:32:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2014.10.31 01:32:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:32:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:32:12 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]

. 2014.10.31 01:32:12 - OpenVPN > UDPv4 link local: [undef]

. 2014.10.31 01:32:12 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443

. 2014.10.31 01:32:12 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=4f075134 92161cfe

. 2014.10.31 01:32:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2014.10.31 01:32:12 - OpenVPN > Validating certificate key usage

. 2014.10.31 01:32:12 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2014.10.31 01:32:12 - OpenVPN > VERIFY KU OK

. 2014.10.31 01:32:12 - OpenVPN > Validating certificate extended key usage

. 2014.10.31 01:32:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2014.10.31 01:32:12 - OpenVPN > VERIFY EKU OK

. 2014.10.31 01:32:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2014.10.31 01:32:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:32:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:32:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:32:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:32:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2014.10.31 01:32:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443

. 2014.10.31 01:32:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2014.10.31 01:32:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'

. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: route options modified

. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2014.10.31 01:32:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2014.10.31 01:32:18 - OpenVPN > open_tun, tt->ipv6=0

. 2014.10.31 01:32:18 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap

. 2014.10.31 01:32:18 - OpenVPN > TAP-Windows Driver Version 9.21

. 2014.10.31 01:32:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]

. 2014.10.31 01:32:18 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}

. 2014.10.31 01:32:23 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4

. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:32:23 - Starting Management Interface

. 2014.10.31 01:32:23 - OpenVPN > Initialization Sequence Completed

! 2014.10.31 01:32:23 - Flushing DNS

! 2014.10.31 01:32:23 - Checking route

W 2014.10.31 01:32:33 - Checking route, 1° try failed (The operation has timed out)

W 2014.10.31 01:32:43 - Checking route, 2° try failed (The operation has timed out)

W 2014.10.31 01:32:53 - Checking route, 3° try failed (The operation has timed out)

W 2014.10.31 01:33:03 - Checking route, 4° try failed (The operation has timed out)

W 2014.10.31 01:33:13 - Checking route, 5° try failed (The operation has timed out)

W 2014.10.31 01:33:13 - The operation has timed out

! 2014.10.31 01:33:13 - Disconnecting

. 2014.10.31 01:33:13 - Management - Send 'signal SIGTERM'

. 2014.10.31 01:33:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2014.10.31 01:33:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2014.10.31 01:33:13 - OpenVPN > SIGTERM received, sending exit notification to peer

. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2014.10.31 01:33:18 - OpenVPN > Closing TUN/TAP interface

. 2014.10.31 01:33:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting

. 2014.10.31 01:33:18 - Connection terminated.

I 2014.10.31 01:33:18 - Cancel requested.

! 2014.10.31 01:33:18 - Session terminated.

 

 

My log file with 'Check if the tunnel effectively works' option unticked (connects to server but unable to access the net):

 

I 2014.10.31 01:34:17 - Session starting.

! 2014.10.31 01:34:17 - Checking environment

! 2014.10.31 01:34:17 - Checking authorization ...

! 2014.10.31 01:34:17 - Connecting to Nashira (United Kingdom, Manchester)

. 2014.10.31 01:34:17 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014

. 2014.10.31 01:34:17 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2014.10.31 01:34:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100

. 2014.10.31 01:34:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2014.10.31 01:34:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:34:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:34:17 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]

. 2014.10.31 01:34:17 - OpenVPN > UDPv4 link local: [undef]

. 2014.10.31 01:34:17 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443

. 2014.10.31 01:34:17 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=ae3c6eeb dee96703

. 2014.10.31 01:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2014.10.31 01:34:17 - OpenVPN > Validating certificate key usage

. 2014.10.31 01:34:17 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2014.10.31 01:34:17 - OpenVPN > VERIFY KU OK

. 2014.10.31 01:34:17 - OpenVPN > Validating certificate extended key usage

. 2014.10.31 01:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2014.10.31 01:34:17 - OpenVPN > VERIFY EKU OK

. 2014.10.31 01:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2014.10.31 01:34:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:34:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:34:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2014.10.31 01:34:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2014.10.31 01:34:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2014.10.31 01:34:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443

. 2014.10.31 01:34:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2014.10.31 01:34:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'

. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: route options modified

. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2014.10.31 01:34:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2014.10.31 01:34:23 - OpenVPN > open_tun, tt->ipv6=0

. 2014.10.31 01:34:23 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap

. 2014.10.31 01:34:23 - OpenVPN > TAP-Windows Driver Version 9.21

. 2014.10.31 01:34:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]

. 2014.10.31 01:34:23 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}

. 2014.10.31 01:34:28 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1

. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4

. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153

. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153

. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4

. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2014.10.31 01:34:28 - Starting Management Interface

. 2014.10.31 01:34:28 - OpenVPN > Initialization Sequence Completed

! 2014.10.31 01:34:28 - Flushing DNS

! 2014.10.31 01:34:28 - Connected.

. 2014.10.31 01:34:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100

. 2014.10.31 01:34:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

 

 

My log file with OpenVPN GUI (connects to server but unable to access the net):

 


Fri Oct 31 01:41:14 2014 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\AirVPN_United-Kingdom_UDP-443.log: Access is denied.   (errno=5)

Fri Oct 31 01:41:14 2014 OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014

Fri Oct 31 01:41:14 2014 library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

Fri Oct 31 01:41:14 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340

Fri Oct 31 01:41:14 2014 Need hold release from management interface, waiting...

Fri Oct 31 01:41:15 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340

Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'state on'

Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'log all on'

Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'hold off'

Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'hold release'

Fri Oct 31 01:41:15 2014 Control Channel Authentication: tls-auth using INLINE static key file

Fri Oct 31 01:41:15 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri Oct 31 01:41:15 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri Oct 31 01:41:15 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]

Fri Oct 31 01:41:15 2014 MANAGEMENT: >STATE:1414716075,RESOLVE,,,

Fri Oct 31 01:41:15 2014 UDPv4 link local: [undef]

Fri Oct 31 01:41:15 2014 UDPv4 link remote: [AF_INET]84.39.116.179:443

Fri Oct 31 01:41:15 2014 MANAGEMENT: >STATE:1414716075,WAIT,,,

Fri Oct 31 01:41:15 2014 MANAGEMENT: >STATE:1414716075,AUTH,,,

Fri Oct 31 01:41:15 2014 TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=2560f1b0 1ebb3ecf

Fri Oct 31 01:41:15 2014 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

Fri Oct 31 01:41:15 2014 Validating certificate key usage

Fri Oct 31 01:41:15 2014 ++ Certificate has key usage  00a0, expects 00a0

Fri Oct 31 01:41:15 2014 VERIFY KU OK

Fri Oct 31 01:41:15 2014 Validating certificate extended key usage

Fri Oct 31 01:41:15 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

Fri Oct 31 01:41:15 2014 VERIFY EKU OK

Fri Oct 31 01:41:15 2014 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

Fri Oct 31 01:41:18 2014 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

Fri Oct 31 01:41:18 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri Oct 31 01:41:18 2014 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

Fri Oct 31 01:41:18 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

Fri Oct 31 01:41:18 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

Fri Oct 31 01:41:18 2014 [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443

Fri Oct 31 01:41:19 2014 MANAGEMENT: >STATE:1414716079,GET_CONFIG,,,

Fri Oct 31 01:41:20 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

Fri Oct 31 01:41:20 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'

Fri Oct 31 01:41:20 2014 OPTIONS IMPORT: timers and/or timeouts modified

Fri Oct 31 01:41:20 2014 OPTIONS IMPORT: LZO parms modified

Fri Oct 31 01:41:20 2014 OPTIONS IMPORT: --ifconfig/up options modified

Fri Oct 31 01:41:20 2014 OPTIONS IMPORT: route options modified

Fri Oct 31 01:41:20 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

Fri Oct 31 01:41:20 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

Fri Oct 31 01:41:20 2014 MANAGEMENT: >STATE:1414716080,ASSIGN_IP,,10.4.45.154,

Fri Oct 31 01:41:20 2014 open_tun, tt->ipv6=0

Fri Oct 31 01:41:20 2014 TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap

Fri Oct 31 01:41:20 2014 TAP-Windows Driver Version 9.21 

Fri Oct 31 01:41:20 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]

Fri Oct 31 01:41:20 2014 NOTE: FlushIpNetTable failed on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} (status=5) : Access is denied.  

Fri Oct 31 01:41:25 2014 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up

Fri Oct 31 01:41:25 2014 C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1

Fri Oct 31 01:41:25 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied.   [status=5 if_index=2]

Fri Oct 31 01:41:25 2014 Route addition via IPAPI failed [adaptive]

Fri Oct 31 01:41:25 2014 Route addition fallback to route.exe

Fri Oct 31 01:41:25 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

Fri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1

Fri Oct 31 01:41:26 2014 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153

Fri Oct 31 01:41:26 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied.   [status=5 if_index=16]

Fri Oct 31 01:41:26 2014 Route addition via IPAPI failed [adaptive]

Fri Oct 31 01:41:26 2014 Route addition fallback to route.exe

Fri Oct 31 01:41:26 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

Fri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1

Fri Oct 31 01:41:26 2014 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153

Fri Oct 31 01:41:26 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied.   [status=5 if_index=16]

Fri Oct 31 01:41:26 2014 Route addition via IPAPI failed [adaptive]

Fri Oct 31 01:41:26 2014 Route addition fallback to route.exe

Fri Oct 31 01:41:26 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

Fri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1

Fri Oct 31 01:41:26 2014 MANAGEMENT: >STATE:1414716086,ADD_ROUTES,,,

Fri Oct 31 01:41:26 2014 C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153

Fri Oct 31 01:41:26 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied.   [status=5 if_index=16]

Fri Oct 31 01:41:26 2014 Route addition via IPAPI failed [adaptive]

Fri Oct 31 01:41:26 2014 Route addition fallback to route.exe

Fri Oct 31 01:41:26 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem

Fri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1

Fri Oct 31 01:41:26 2014 Initialization Sequence Completed

Fri Oct 31 01:41:26 2014 MANAGEMENT: >STATE:1414716086,CONNECTED,SUCCESS,10.4.45.154,84.39.116.179

Share this post


Link to post

And the plot thickens ...

 

I tried connecting to AirVPN using my MacBook (vs my PC desktop) and lo and behold, I was getting the same issue. 2 very different machines experiencing the same problem made me wonder if the ISP is the issue.

 

Fortunately I have a 2nd internet connection at home with a different provider and with it I was able to connect to AirVPN.

 

So by the looks of it, it is my ISP that is the issue! Is it possible for an ISP to block the use of AirVPN??? Is there something I can do on my end to work around this?

Share this post


Link to post

sorry, no i can't. (what is a client log?)

there's no connection established through airvpn at all.

 

update: i've been away for a couple of days and the problem seems to have fixed itself.

 

can you please publish your client logs taken after a connection has been (allegedly) established?

Share this post


Link to post

@Fringe

 

Hello,

 

what happens with a TCP connection? You can change connection mode in Eddie in "AirVPN" -> "Preferences" -> "Protocols".

 

About OpenVPN GUI, you failed to run it with administrator privileges, can you please try again and report back at your convenience?

 

From the initial symptoms, maybe your ISP partially disrupts UDP, or at least certain UDP streams. If this is the case, then Eddie correctly detects a routing failure. We have been experiencing this behavior with some ISP.

 

Kind regards

Share this post


Link to post

Dear AirVPN,

 

Thanks for you help - switching the protocol from Automatic UDP to TCP fixed the problem!

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...