HorseClaws 0 Posted ... To receive mail or use any browser or update any program, i need to disconnect the VPN service.Changing servers doesn't work.Do i need to re-install AirVPN? perhaps you have an other suggestion?This happened suddenly yesterday afternoon and it hasn't functioned properly ever since. Thanks in advance. Quote Share this post Link to post
Staff 10014 Posted ... To receive mail or use any browser or update any program, i need to disconnect the VPN service.Changing servers doesn't work.Do i need to re-install AirVPN? perhaps you have an other suggestion?This happened suddenly yesterday afternoon and it hasn't functioned properly ever since. Thanks in advance. Hello, can you please publish your client logs taken after a connection has been (allegedly) established? Kind regards Quote Share this post Link to post
Fringe 0 Posted ... Am having the same issue - I can't connect to anything online anymore when AirVPN is on. This issue occurred only this week - everything was fine previously. I get an error "Checking Route, 1 try failed (The operation has timed out)" - it keeps trying about 4-5 times then it tries a different server to the same effect. Unticking the 'Check if the tunnel effectively works' option in the Advanced tab gets rid of the 'Checking route' error and leads to successfully connecting to a server but still cannot access anything online. Windows 8.1AirVPN client v2.7 for Windows 8 64-bitAntivirus: Avast freeFirewall: built-in Windows Troubleshooting done:1. turned firewall off- problem persists 2. turned antivirus off- problem persists 3. uninstalled antivirus- problem persists- everything was working fine till a few days ago. Noticed that Avast installs its own OpenVPN as part of its SecureLineVPN feature so I thought that may be the issue. The SecureLineVPN is a paid for service so I wasn't using it but it appears the installer installs OpenVPN just the same. Uninstalling Avast did not make a difference however. 4. uninstalled AirVPN client and re-installed- problem persists- when I uninstalled AirVPN and re-installed it, a new problem came up when I tried to run AirVPN > it produced a 'failure to install the tunnel driver' error. Searching online led me to replacing the OpenVPN v2.3.4 files that came with the AirVPN installer to the OpenVPN v2.3.5 files. This solved the tunnel driver installation error but still couldn't access anything online with AirVPN on. 5. connected using OpenVPN GUI instead of AirVPN client- problem persists I think the tunnelling software is not working but I can't figure out how to fix it. Would appreciate any ideas or input that you may have. Below are 3 sets of logs which I hope are useful. My log file with 'Check if the tunnel effectively works' option ticked (fails to connect to server): I 2014.10.31 01:29:52 - Session starting.! 2014.10.31 01:29:52 - Checking environment! 2014.10.31 01:29:52 - Checking authorization ...! 2014.10.31 01:29:52 - Connecting to Nashira (United Kingdom, Manchester). 2014.10.31 01:29:53 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014. 2014.10.31 01:29:53 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05. 2014.10.31 01:29:53 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2014.10.31 01:29:53 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2014.10.31 01:29:53 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:29:53 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:29:53 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]. 2014.10.31 01:29:53 - OpenVPN > UDPv4 link local: [undef]. 2014.10.31 01:29:53 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443. 2014.10.31 01:29:53 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=35bb3672 00d03828. 2014.10.31 01:29:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2014.10.31 01:29:53 - OpenVPN > Validating certificate key usage. 2014.10.31 01:29:53 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2014.10.31 01:29:53 - OpenVPN > VERIFY KU OK. 2014.10.31 01:29:53 - OpenVPN > Validating certificate extended key usage. 2014.10.31 01:29:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2014.10.31 01:29:53 - OpenVPN > VERIFY EKU OK. 2014.10.31 01:29:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2014.10.31 01:29:56 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:29:56 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:29:56 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:29:56 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:29:56 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2014.10.31 01:29:56 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443. 2014.10.31 01:29:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2014.10.31 01:29:59 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: route options modified. 2014.10.31 01:29:59 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2014.10.31 01:29:59 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2014.10.31 01:29:59 - OpenVPN > open_tun, tt->ipv6=0. 2014.10.31 01:29:59 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap. 2014.10.31 01:29:59 - OpenVPN > TAP-Windows Driver Version 9.21. 2014.10.31 01:29:59 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]. 2014.10.31 01:29:59 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}. 2014.10.31 01:30:04 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:30:04 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:30:04 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:30:04 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:30:04 - Starting Management Interface. 2014.10.31 01:30:04 - OpenVPN > Initialization Sequence Completed! 2014.10.31 01:30:04 - Flushing DNS! 2014.10.31 01:30:04 - Checking routeW 2014.10.31 01:30:14 - Checking route, 1° try failed (The operation has timed out)W 2014.10.31 01:30:24 - Checking route, 2° try failed (The operation has timed out)W 2014.10.31 01:30:34 - Checking route, 3° try failed (The operation has timed out)W 2014.10.31 01:30:44 - Checking route, 4° try failed (The operation has timed out)W 2014.10.31 01:30:54 - Checking route, 5° try failed (The operation has timed out)W 2014.10.31 01:30:54 - The operation has timed out! 2014.10.31 01:30:54 - Disconnecting. 2014.10.31 01:30:54 - Management - Send 'signal SIGTERM'. 2014.10.31 01:30:54 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2014.10.31 01:30:54 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2014.10.31 01:30:54 - OpenVPN > SIGTERM received, sending exit notification to peer. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:30:59 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:30:59 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:30:59 - OpenVPN > Closing TUN/TAP interface. 2014.10.31 01:30:59 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2014.10.31 01:30:59 - Connection terminated.! 2014.10.31 01:31:02 - Checking authorization ...! 2014.10.31 01:31:02 - Connecting to Nashira (United Kingdom, Manchester). 2014.10.31 01:31:02 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014. 2014.10.31 01:31:02 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05. 2014.10.31 01:31:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2014.10.31 01:31:02 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2014.10.31 01:31:02 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:31:02 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:31:02 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]. 2014.10.31 01:31:02 - OpenVPN > UDPv4 link local: [undef]. 2014.10.31 01:31:02 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443. 2014.10.31 01:31:02 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=89a37c03 c4d0b556. 2014.10.31 01:31:03 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2014.10.31 01:31:03 - OpenVPN > Validating certificate key usage. 2014.10.31 01:31:03 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2014.10.31 01:31:03 - OpenVPN > VERIFY KU OK. 2014.10.31 01:31:03 - OpenVPN > Validating certificate extended key usage. 2014.10.31 01:31:03 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2014.10.31 01:31:03 - OpenVPN > VERIFY EKU OK. 2014.10.31 01:31:03 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2014.10.31 01:31:06 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:31:06 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:31:06 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:31:06 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:31:06 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2014.10.31 01:31:06 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443. 2014.10.31 01:31:08 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2014.10.31 01:31:08 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: route options modified. 2014.10.31 01:31:08 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2014.10.31 01:31:08 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2014.10.31 01:31:08 - OpenVPN > open_tun, tt->ipv6=0. 2014.10.31 01:31:08 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap. 2014.10.31 01:31:08 - OpenVPN > TAP-Windows Driver Version 9.21. 2014.10.31 01:31:08 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]. 2014.10.31 01:31:08 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}. 2014.10.31 01:31:13 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:31:13 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:31:13 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:31:13 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:31:13 - Starting Management Interface. 2014.10.31 01:31:13 - OpenVPN > Initialization Sequence Completed! 2014.10.31 01:31:13 - Flushing DNS! 2014.10.31 01:31:13 - Checking routeW 2014.10.31 01:31:23 - Checking route, 1° try failed (The operation has timed out)W 2014.10.31 01:31:33 - Checking route, 2° try failed (The operation has timed out)W 2014.10.31 01:31:43 - Checking route, 3° try failed (The operation has timed out)W 2014.10.31 01:31:53 - Checking route, 4° try failed (The operation has timed out)W 2014.10.31 01:32:03 - Checking route, 5° try failed (The operation has timed out)W 2014.10.31 01:32:03 - The operation has timed out! 2014.10.31 01:32:03 - Disconnecting. 2014.10.31 01:32:03 - Management - Send 'signal SIGTERM'. 2014.10.31 01:32:03 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2014.10.31 01:32:03 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2014.10.31 01:32:03 - OpenVPN > SIGTERM received, sending exit notification to peer. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:32:08 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:32:08 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:32:08 - OpenVPN > Closing TUN/TAP interface. 2014.10.31 01:32:08 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2014.10.31 01:32:08 - Connection terminated.! 2014.10.31 01:32:11 - Checking authorization ...! 2014.10.31 01:32:12 - Connecting to Nashira (United Kingdom, Manchester). 2014.10.31 01:32:12 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014. 2014.10.31 01:32:12 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05. 2014.10.31 01:32:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2014.10.31 01:32:12 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2014.10.31 01:32:12 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:32:12 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:32:12 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]. 2014.10.31 01:32:12 - OpenVPN > UDPv4 link local: [undef]. 2014.10.31 01:32:12 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443. 2014.10.31 01:32:12 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=4f075134 92161cfe. 2014.10.31 01:32:12 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2014.10.31 01:32:12 - OpenVPN > Validating certificate key usage. 2014.10.31 01:32:12 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2014.10.31 01:32:12 - OpenVPN > VERIFY KU OK. 2014.10.31 01:32:12 - OpenVPN > Validating certificate extended key usage. 2014.10.31 01:32:12 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2014.10.31 01:32:12 - OpenVPN > VERIFY EKU OK. 2014.10.31 01:32:12 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2014.10.31 01:32:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:32:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:32:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:32:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:32:15 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2014.10.31 01:32:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443. 2014.10.31 01:32:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2014.10.31 01:32:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2014.10.31 01:32:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2014.10.31 01:32:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2014.10.31 01:32:18 - OpenVPN > open_tun, tt->ipv6=0. 2014.10.31 01:32:18 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap. 2014.10.31 01:32:18 - OpenVPN > TAP-Windows Driver Version 9.21. 2014.10.31 01:32:18 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]. 2014.10.31 01:32:18 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}. 2014.10.31 01:32:23 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:32:23 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:32:23 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:32:23 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:32:23 - Starting Management Interface. 2014.10.31 01:32:23 - OpenVPN > Initialization Sequence Completed! 2014.10.31 01:32:23 - Flushing DNS! 2014.10.31 01:32:23 - Checking routeW 2014.10.31 01:32:33 - Checking route, 1° try failed (The operation has timed out)W 2014.10.31 01:32:43 - Checking route, 2° try failed (The operation has timed out)W 2014.10.31 01:32:53 - Checking route, 3° try failed (The operation has timed out)W 2014.10.31 01:33:03 - Checking route, 4° try failed (The operation has timed out)W 2014.10.31 01:33:13 - Checking route, 5° try failed (The operation has timed out)W 2014.10.31 01:33:13 - The operation has timed out! 2014.10.31 01:33:13 - Disconnecting. 2014.10.31 01:33:13 - Management - Send 'signal SIGTERM'. 2014.10.31 01:33:13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2014.10.31 01:33:13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2014.10.31 01:33:13 - OpenVPN > SIGTERM received, sending exit notification to peer. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:33:18 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:33:18 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]. 2014.10.31 01:33:18 - OpenVPN > Closing TUN/TAP interface. 2014.10.31 01:33:18 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting. 2014.10.31 01:33:18 - Connection terminated.I 2014.10.31 01:33:18 - Cancel requested.! 2014.10.31 01:33:18 - Session terminated. My log file with 'Check if the tunnel effectively works' option unticked (connects to server but unable to access the net): I 2014.10.31 01:34:17 - Session starting.! 2014.10.31 01:34:17 - Checking environment! 2014.10.31 01:34:17 - Checking authorization ...! 2014.10.31 01:34:17 - Connecting to Nashira (United Kingdom, Manchester). 2014.10.31 01:34:17 - OpenVPN > OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014. 2014.10.31 01:34:17 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05. 2014.10.31 01:34:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2014.10.31 01:34:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2014.10.31 01:34:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:34:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:34:17 - OpenVPN > Socket Buffers: R=[65536->65536] S=[65536->65536]. 2014.10.31 01:34:17 - OpenVPN > UDPv4 link local: [undef]. 2014.10.31 01:34:17 - OpenVPN > UDPv4 link remote: [AF_INET]84.39.116.179:443. 2014.10.31 01:34:17 - OpenVPN > TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=ae3c6eeb dee96703. 2014.10.31 01:34:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2014.10.31 01:34:17 - OpenVPN > Validating certificate key usage. 2014.10.31 01:34:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2014.10.31 01:34:17 - OpenVPN > VERIFY KU OK. 2014.10.31 01:34:17 - OpenVPN > Validating certificate extended key usage. 2014.10.31 01:34:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2014.10.31 01:34:17 - OpenVPN > VERIFY EKU OK. 2014.10.31 01:34:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2014.10.31 01:34:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:34:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:34:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2014.10.31 01:34:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2014.10.31 01:34:20 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2014.10.31 01:34:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443. 2014.10.31 01:34:23 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2014.10.31 01:34:23 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: route options modified. 2014.10.31 01:34:23 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2014.10.31 01:34:23 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2014.10.31 01:34:23 - OpenVPN > open_tun, tt->ipv6=0. 2014.10.31 01:34:23 - OpenVPN > TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tap. 2014.10.31 01:34:23 - OpenVPN > TAP-Windows Driver Version 9.21. 2014.10.31 01:34:23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]. 2014.10.31 01:34:23 - OpenVPN > Successful ARP Flush on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}. 2014.10.31 01:34:28 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:34:28 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153. 2014.10.31 01:34:28 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2014.10.31 01:34:28 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2014.10.31 01:34:28 - Starting Management Interface. 2014.10.31 01:34:28 - OpenVPN > Initialization Sequence Completed! 2014.10.31 01:34:28 - Flushing DNS! 2014.10.31 01:34:28 - Connected.. 2014.10.31 01:34:28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2014.10.31 01:34:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info My log file with OpenVPN GUI (connects to server but unable to access the net): Fri Oct 31 01:41:14 2014 Warning: cannot open --log file: C:\Program Files\OpenVPN\log\AirVPN_United-Kingdom_UDP-443.log: Access is denied. (errno=5)Fri Oct 31 01:41:14 2014 OpenVPN 2.3.5 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Oct 28 2014Fri Oct 31 01:41:14 2014 library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05Fri Oct 31 01:41:14 2014 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25340Fri Oct 31 01:41:14 2014 Need hold release from management interface, waiting...Fri Oct 31 01:41:15 2014 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25340Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'state on'Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'log all on'Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'hold off'Fri Oct 31 01:41:15 2014 MANAGEMENT: CMD 'hold release'Fri Oct 31 01:41:15 2014 Control Channel Authentication: tls-auth using INLINE static key fileFri Oct 31 01:41:15 2014 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Oct 31 01:41:15 2014 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Oct 31 01:41:15 2014 Socket Buffers: R=[65536->65536] S=[65536->65536]Fri Oct 31 01:41:15 2014 MANAGEMENT: >STATE:1414716075,RESOLVE,,,Fri Oct 31 01:41:15 2014 UDPv4 link local: [undef]Fri Oct 31 01:41:15 2014 UDPv4 link remote: [AF_INET]84.39.116.179:443Fri Oct 31 01:41:15 2014 MANAGEMENT: >STATE:1414716075,WAIT,,,Fri Oct 31 01:41:15 2014 MANAGEMENT: >STATE:1414716075,AUTH,,,Fri Oct 31 01:41:15 2014 TLS: Initial packet from [AF_INET]84.39.116.179:443, sid=2560f1b0 1ebb3ecfFri Oct 31 01:41:15 2014 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgFri Oct 31 01:41:15 2014 Validating certificate key usageFri Oct 31 01:41:15 2014 ++ Certificate has key usage 00a0, expects 00a0Fri Oct 31 01:41:15 2014 VERIFY KU OKFri Oct 31 01:41:15 2014 Validating certificate extended key usageFri Oct 31 01:41:15 2014 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationFri Oct 31 01:41:15 2014 VERIFY EKU OKFri Oct 31 01:41:15 2014 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgFri Oct 31 01:41:18 2014 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyFri Oct 31 01:41:18 2014 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Oct 31 01:41:18 2014 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyFri Oct 31 01:41:18 2014 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationFri Oct 31 01:41:18 2014 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSAFri Oct 31 01:41:18 2014 [server] Peer Connection Initiated with [AF_INET]84.39.116.179:443Fri Oct 31 01:41:19 2014 MANAGEMENT: >STATE:1414716079,GET_CONFIG,,,Fri Oct 31 01:41:20 2014 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Fri Oct 31 01:41:20 2014 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.4.0.1,comp-lzo no,route 10.4.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.4.45.154 10.4.45.153'Fri Oct 31 01:41:20 2014 OPTIONS IMPORT: timers and/or timeouts modifiedFri Oct 31 01:41:20 2014 OPTIONS IMPORT: LZO parms modifiedFri Oct 31 01:41:20 2014 OPTIONS IMPORT: --ifconfig/up options modifiedFri Oct 31 01:41:20 2014 OPTIONS IMPORT: route options modifiedFri Oct 31 01:41:20 2014 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedFri Oct 31 01:41:20 2014 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Fri Oct 31 01:41:20 2014 MANAGEMENT: >STATE:1414716080,ASSIGN_IP,,10.4.45.154,Fri Oct 31 01:41:20 2014 open_tun, tt->ipv6=0Fri Oct 31 01:41:20 2014 TAP-WIN32 device [VPN] opened: \\.\Global\{3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6}.tapFri Oct 31 01:41:20 2014 TAP-Windows Driver Version 9.21 Fri Oct 31 01:41:20 2014 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.45.154/255.255.255.252 on interface {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} [DHCP-serv: 10.4.45.153, lease-time: 31536000]Fri Oct 31 01:41:20 2014 NOTE: FlushIpNetTable failed on interface [16] {3048CACE-8EBA-46B1-B2B9-E2EE360FAAD6} (status=5) : Access is denied. Fri Oct 31 01:41:25 2014 TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=upFri Oct 31 01:41:25 2014 C:\WINDOWS\system32\route.exe ADD 84.39.116.179 MASK 255.255.255.255 192.168.1.1Fri Oct 31 01:41:25 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied. [status=5 if_index=2]Fri Oct 31 01:41:25 2014 Route addition via IPAPI failed [adaptive]Fri Oct 31 01:41:25 2014 Route addition fallback to route.exeFri Oct 31 01:41:25 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemFri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1Fri Oct 31 01:41:26 2014 C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.45.153Fri Oct 31 01:41:26 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied. [status=5 if_index=16]Fri Oct 31 01:41:26 2014 Route addition via IPAPI failed [adaptive]Fri Oct 31 01:41:26 2014 Route addition fallback to route.exeFri Oct 31 01:41:26 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemFri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1Fri Oct 31 01:41:26 2014 C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.45.153Fri Oct 31 01:41:26 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied. [status=5 if_index=16]Fri Oct 31 01:41:26 2014 Route addition via IPAPI failed [adaptive]Fri Oct 31 01:41:26 2014 Route addition fallback to route.exeFri Oct 31 01:41:26 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemFri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1Fri Oct 31 01:41:26 2014 MANAGEMENT: >STATE:1414716086,ADD_ROUTES,,,Fri Oct 31 01:41:26 2014 C:\WINDOWS\system32\route.exe ADD 10.4.0.1 MASK 255.255.255.255 10.4.45.153Fri Oct 31 01:41:26 2014 ROUTE: route addition failed using CreateIpForwardEntry: Access is denied. [status=5 if_index=16]Fri Oct 31 01:41:26 2014 Route addition via IPAPI failed [adaptive]Fri Oct 31 01:41:26 2014 Route addition fallback to route.exeFri Oct 31 01:41:26 2014 env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\WbemFri Oct 31 01:41:26 2014 ERROR: Windows route add command failed [adaptive]: returned error code 1Fri Oct 31 01:41:26 2014 Initialization Sequence CompletedFri Oct 31 01:41:26 2014 MANAGEMENT: >STATE:1414716086,CONNECTED,SUCCESS,10.4.45.154,84.39.116.179 Quote Share this post Link to post
Fringe 0 Posted ... And the plot thickens ... I tried connecting to AirVPN using my MacBook (vs my PC desktop) and lo and behold, I was getting the same issue. 2 very different machines experiencing the same problem made me wonder if the ISP is the issue. Fortunately I have a 2nd internet connection at home with a different provider and with it I was able to connect to AirVPN. So by the looks of it, it is my ISP that is the issue! Is it possible for an ISP to block the use of AirVPN??? Is there something I can do on my end to work around this? Quote Share this post Link to post
HorseClaws 0 Posted ... sorry, no i can't. (what is a client log?)there's no connection established through airvpn at all. update: i've been away for a couple of days and the problem seems to have fixed itself. can you please publish your client logs taken after a connection has been (allegedly) established? Quote Share this post Link to post
Staff 10014 Posted ... @Fringe Hello, what happens with a TCP connection? You can change connection mode in Eddie in "AirVPN" -> "Preferences" -> "Protocols". About OpenVPN GUI, you failed to run it with administrator privileges, can you please try again and report back at your convenience? From the initial symptoms, maybe your ISP partially disrupts UDP, or at least certain UDP streams. If this is the case, then Eddie correctly detects a routing failure. We have been experiencing this behavior with some ISP. Kind regards Quote Share this post Link to post
Fringe 0 Posted ... Dear AirVPN, Thanks for you help - switching the protocol from Automatic UDP to TCP fixed the problem! Quote Share this post Link to post