Jump to content
Not connected, Your IP: 3.147.66.224
Sign in to follow this  
legendofrick100

Can't connect to VPN. DNS problem

Recommended Posts

I 2015.01.03 07:58:38 - Session starting.

! 2015.01.03 07:58:38 - Checking environment

I 2015.01.03 07:58:38 - DNS of a network adapter forced (Realtek RTL8723AE Wireless LAN 802.11n PCI-E NIC)

! 2015.01.03 07:58:38 - Checking authorization ...

! 2015.01.03 07:58:39 - Connecting to Nashira (United Kingdom, Manchester)

. 2015.01.03 07:58:39 - SSL > stunnel 4.56 on x86-pc-mingw32-gnu platform

. 2015.01.03 07:58:39 - SSL > Compiled/running with OpenSSL 1.0.1g 7 Apr 2014

. 2015.01.03 07:58:39 - SSL > Threading:WIN32 Sockets:SELECT,IPv6 SSL:ENGINE,OCSP

. 2015.01.03 07:58:39 - SSL > Reading configuration from file C:\Users\Chris\AppData\Local\AirVPN\5add6aa9b0c5444786dbb447ad8cd003f2c8698f41c9b46a943ce54340d6a15b.tmp.ssl

. 2015.01.03 07:58:39 - SSL > Initializing service [openvpn]

. 2015.01.03 07:58:39 - SSL > Configuration successful

. 2015.01.03 07:58:39 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Oct 18 2014

. 2015.01.03 07:58:39 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2015.01.03 07:58:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2015.01.03 07:58:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2015.01.03 07:58:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:41 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]

. 2015.01.03 07:58:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:47882 [nonblock]

. 2015.01.03 07:58:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:47882

. 2015.01.03 07:58:41 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2015.01.03 07:58:41 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:47882

. 2015.01.03 07:58:41 - SSL > Service [openvpn] accepted connection from 127.0.0.1:63310

. 2015.01.03 07:58:41 - SSL > connect_blocking: connecting 84.39.116.181:443

. 2015.01.03 07:58:41 - SSL > connect_blocking: connected 84.39.116.181:443

. 2015.01.03 07:58:41 - SSL > Service [openvpn] connected remote server from 192.168.1.1:63311

. 2015.01.03 07:58:41 - SSL > SSL connected: new session negotiated

. 2015.01.03 07:58:41 - SSL > Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-RC4-SHA (128-bit encryption)

. 2015.01.03 07:58:41 - SSL > Compression: null, expansion: null

. 2015.01.03 07:58:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:47882, sid=1aa4a778 223f31e8

. 2015.01.03 07:58:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2015.01.03 07:58:42 - OpenVPN > Validating certificate key usage

. 2015.01.03 07:58:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2015.01.03 07:58:42 - OpenVPN > VERIFY KU OK

. 2015.01.03 07:58:42 - OpenVPN > Validating certificate extended key usage

. 2015.01.03 07:58:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2015.01.03 07:58:42 - OpenVPN > VERIFY EKU OK

. 2015.01.03 07:58:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:43 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2015.01.03 07:58:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:47882

. 2015.01.03 07:58:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2015.01.03 07:58:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.50.0.1,comp-lzo no,route 10.50.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.50.2.226 10.50.2.225'

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: route options modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2015.01.03 07:58:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2015.01.03 07:58:46 - OpenVPN > open_tun, tt->ipv6=0

. 2015.01.03 07:58:46 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{5A405FF1-D4F5-4053-8759-65129C19D846}.tap

. 2015.01.03 07:58:46 - OpenVPN > TAP-Windows Driver Version 9.9

. 2015.01.03 07:58:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.226/255.255.255.252 on interface {5A405FF1-D4F5-4053-8759-65129C19D846} [DHCP-serv: 10.50.2.225, lease-time: 31536000]

. 2015.01.03 07:58:46 - OpenVPN > Successful ARP Flush on interface [22] {5A405FF1-D4F5-4053-8759-65129C19D846}

. 2015.01.03 07:58:51 - OpenVPN > TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.116.181 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 10.50.0.1 MASK 255.255.255.255 10.50.2.225

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - Starting Management Interface

. 2015.01.03 07:58:51 - OpenVPN > Initialization Sequence Completed

! 2015.01.03 07:58:51 - Flushing DNS

! 2015.01.03 07:58:53 - Checking route

! 2015.01.03 07:58:54 - Checking DNS

E 2015.01.03 07:58:55 - DNS checking failed.

. 2015.01.03 07:58:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

! 2015.01.03 07:58:55 - Disconnecting

. 2015.01.03 07:58:55 - Management - Send 'signal SIGTERM'

. 2015.01.03 07:58:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2015.01.03 07:58:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2015.01.03 07:58:55 - SSL > readsocket: Connection reset by peer (WSAECONNRESET) (10054)

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.50.0.1 MASK 255.255.255.255 10.50.2.225

. 2015.01.03 07:58:55 - SSL > Connection reset: 11686 byte(s) sent to SSL, 9389 byte(s) sent to socket

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.116.181 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > Closing TUN/TAP interface

. 2015.01.03 07:58:55 - OpenVPN > SIGTERM[hard,] received, process exiting

. 2015.01.03 07:58:55 - Connection terminated.

! 2015.01.03 07:58:58 - Checking authorization ...

! 2015.01.03 07:58:59 - Connecting to Nashira (United Kingdom, Manchester)

. 2015.01.03 07:58:59 - SSL > stunnel 4.56 on x86-pc-mingw32-gnu platform

. 2015.01.03 07:58:59 - SSL > Compiled/running with OpenSSL 1.0.1g 7 Apr 2014

. 2015.01.03 07:58:59 - SSL > Threading:WIN32 Sockets:SELECT,IPv6 SSL:ENGINE,OCSP

. 2015.01.03 07:58:59 - SSL > Reading configuration from file C:\Users\Chris\AppData\Local\AirVPN\1fc84b0ea3d4ba6be0486806a7092657fa23c3dc94b3ff3cc7cc018d083487ed.tmp.ssl

. 2015.01.03 07:58:59 - SSL > Initializing service [openvpn]

. 2015.01.03 07:58:59 - SSL > Configuration successful

. 2015.01.03 07:58:59 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Oct 18 2014

. 2015.01.03 07:58:59 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2015.01.03 07:58:59 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2015.01.03 07:58:59 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2015.01.03 07:58:59 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:59 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:59 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]

. 2015.01.03 07:58:59 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:57891 [nonblock]

. 2015.01.03 07:58:59 - SSL > Service [openvpn] accepted connection from 127.0.0.1:63321

. 2015.01.03 07:58:59 - SSL > connect_blocking: connecting 84.39.116.181:443

. 2015.01.03 07:58:59 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:57891

. 2015.01.03 07:58:59 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2015.01.03 07:58:59 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:57891

. 2015.01.03 07:59:00 - SSL > connect_blocking: connected 84.39.116.181:443

. 2015.01.03 07:59:00 - SSL > Service [openvpn] connected remote server from 192.168.1.1:63322

. 2015.01.03 07:59:00 - SSL > SSL connected: new session negotiated

. 2015.01.03 07:59:00 - SSL > Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-RC4-SHA (128-bit encryption)

. 2015.01.03 07:59:00 - SSL > Compression: null, expansion: null

. 2015.01.03 07:59:00 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:57891, sid=30319c46 d5361561

. 2015.01.03 07:59:00 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2015.01.03 07:59:00 - OpenVPN > Validating certificate key usage

. 2015.01.03 07:59:00 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2015.01.03 07:59:00 - OpenVPN > VERIFY KU OK

. 2015.01.03 07:59:00 - OpenVPN > Validating certificate extended key usage

. 2015.01.03 07:59:00 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2015.01.03 07:59:00 - OpenVPN > VERIFY EKU OK

. 2015.01.03 07:59:00 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2015.01.03 07:59:02 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.01.03 07:59:02 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:59:02 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.01.03 07:59:02 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:59:02 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2015.01.03 07:59:02 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:57891

. 2015.01.03 07:59:04 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2015.01.03 07:59:04 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.50.0.1,comp-lzo no,route 10.50.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.50.2.226 10.50.2.225'

. 2015.01.03 07:59:04 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2015.01.03 07:59:04 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2015.01.03 07:59:04 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2015.01.03 07:59:04 - OpenVPN > OPTIONS IMPORT: route options modified

. 2015.01.03 07:59:04 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2015.01.03 07:59:04 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2015.01.03 07:59:04 - O

penVPN > open_tun, tt->ipv6=0


I 2015.01.03 07:58:38 - Session starting.

! 2015.01.03 07:58:38 - Checking environment

 

. 2015.01.03 07:58:39 - SSL > stunnel 4.56 on x86-pc-mingw32-gnu platform

. 2015.01.03 07:58:39 - SSL > Compiled/running with OpenSSL 1.0.1g 7 Apr 2014

. 2015.01.03 07:58:39 - SSL > Threading:WIN32 Sockets:SELECT,IPv6 SSL:ENGINE,OCSP

. 2015.01.03 07:58:39 - SSL > Reading configuration from file AppData\Local\AirVPN\5add6aa9b0c5444786dbb447ad8cd003f2c8698f41c9b46a943ce54340d6a15b.tmp.ssl

. 2015.01.03 07:58:39 - SSL > Initializing service [openvpn]

. 2015.01.03 07:58:39 - SSL > Configuration successful

. 2015.01.03 07:58:39 - OpenVPN > OpenVPN 2.3.4 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Oct 18 2014

. 2015.01.03 07:58:39 - OpenVPN > library versions: OpenSSL 1.0.1j 15 Oct 2014, LZO 2.05

. 2015.01.03 07:58:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3101

. 2015.01.03 07:58:41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file

. 2015.01.03 07:58:41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:41 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]

. 2015.01.03 07:58:41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:47882 [nonblock]

. 2015.01.03 07:58:41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:47882

. 2015.01.03 07:58:41 - OpenVPN > TCPv4_CLIENT link local: [undef]

. 2015.01.03 07:58:41 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:47882

. 2015.01.03 07:58:41 - SSL > Service [openvpn] accepted connection from 127.0.0.1:63310

. 2015.01.03 07:58:41 - SSL > connect_blocking: connecting 84.39.116.181:443

. 2015.01.03 07:58:41 - SSL > connect_blocking: connected 84.39.116.181:443

. 2015.01.03 07:58:41 - SSL > Service [openvpn] connected remote server from 192.168.1.1:63311

. 2015.01.03 07:58:41 - SSL > SSL connected: new session negotiated

. 2015.01.03 07:58:41 - SSL > Negotiated TLSv1/SSLv3 ciphersuite: ECDHE-RSA-RC4-SHA (128-bit encryption)

. 2015.01.03 07:58:41 - SSL > Compression: null, expansion: null

. 2015.01.03 07:58:41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:47882, sid=1aa4a778 223f31e8

. 2015.01.03 07:58:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org

. 2015.01.03 07:58:42 - OpenVPN > Validating certificate key usage

. 2015.01.03 07:58:42 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0

. 2015.01.03 07:58:42 - OpenVPN > VERIFY KU OK

. 2015.01.03 07:58:42 - OpenVPN > Validating certificate extended key usage

. 2015.01.03 07:58:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication

. 2015.01.03 07:58:42 - OpenVPN > VERIFY EKU OK

. 2015.01.03 07:58:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key

. 2015.01.03 07:58:43 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication

. 2015.01.03 07:58:43 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA

. 2015.01.03 07:58:43 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:47882

. 2015.01.03 07:58:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)

. 2015.01.03 07:58:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1,dhcp-option DNS 10.50.0.1,comp-lzo no,route 10.50.0.1,topology net30,ping 10,ping-restart 60,ifconfig 10.50.2.226 10.50.2.225'

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: route options modified

. 2015.01.03 07:58:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified

. 2015.01.03 07:58:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0

. 2015.01.03 07:58:46 - OpenVPN > open_tun, tt->ipv6=0

. 2015.01.03 07:58:46 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{5A405FF1-D4F5-4053-8759-65129C19D846}.tap

. 2015.01.03 07:58:46 - OpenVPN > TAP-Windows Driver Version 9.9

. 2015.01.03 07:58:46 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.226/255.255.255.252 on interface {5A405FF1-D4F5-4053-8759-65129C19D846} [DHCP-serv: 10.50.2.225, lease-time: 31536000]

. 2015.01.03 07:58:46 - OpenVPN > Successful ARP Flush on interface [22] {5A405FF1-D4F5-4053-8759-65129C19D846}

. 2015.01.03 07:58:51 - OpenVPN > TEST ROUTES: 3/3 succeeded len=2 ret=1 a=0 u/d=up

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 84.39.116.181 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - OpenVPN > C:\Windows\system32\route.exe ADD 10.50.0.1 MASK 255.255.255.255 10.50.2.225

. 2015.01.03 07:58:51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4

. 2015.01.03 07:58:51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:51 - Starting Management Interface

. 2015.01.03 07:58:51 - OpenVPN > Initialization Sequence Completed

! 2015.01.03 07:58:51 - Flushing DNS

! 2015.01.03 07:58:53 - Checking route

! 2015.01.03 07:58:54 - Checking DNS

E 2015.01.03 07:58:55 - DNS checking failed.

. 2015.01.03 07:58:55 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3101

! 2015.01.03 07:58:55 - Disconnecting

. 2015.01.03 07:58:55 - Management - Send 'signal SIGTERM'

. 2015.01.03 07:58:55 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

. 2015.01.03 07:58:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'

. 2015.01.03 07:58:55 - SSL > readsocket: Connection reset by peer (WSAECONNRESET) (10054)

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 10.50.0.1 MASK 255.255.255.255 10.50.2.225

. 2015.01.03 07:58:55 - SSL > Connection reset: 11686 byte(s) sent to SSL, 9389 byte(s) sent to socket

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 84.39.116.181 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.254

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.2.225

. 2015.01.03 07:58:55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]

. 2015.01.03 07:58:55 - OpenVPN > Closing TUN/TAP interface

. 2015.01.03 07:58:55 - OpenVPN > SIGTERM[hard,] received, process exiting

. 2015.01.03 07:58:55 - Connection terminated.

! 2015.01.03 07:58:58 - Checking authorization ...

 


Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...