Jump to content
Not connected, Your IP: 18.216.34.146
Sign in to follow this  
jadzia.dax

frequent disconnects during trial

Recommended Posts

Hi all,

I signed up to 2 day trial,i've never used a vpn before. I found I was getting disconnected frequently. I could  connect initially, then it woudl fail some time later, errors "Checking route, 1° try failed (The operation has timed out)".

My OS is windows 8 and using the standard airvpn software.

I can confirm it seems related to UDP protocol, it worked for a time then stoped  working somtime later, when it failed it continued to fail and I was unable reconnect using UPD or any of the alternate UDP ports on the protocol tab in the preferences section, always with the msg checking route try failed (The operation has timed out), I also tried connecting to other coutnries all with the same issue.

Connecting via TCP seemed to work when UDP was constantly failing. However TCP seemed very slow when dowloading when compared to UPD so not really a permenant option for me.

Can confirm the errors seems to be real error, in that even if i unticked the option "check if the tunnel effectively works" it would show connected but I couldn't connect to any internet address.

I would be interested to know why UDP is not working and how to troubleshoot, ive checked the windows firewall and rotuer and i can't see any issues there.  Unfortunately my trial is over but still keen to to resolve the issue as i would like to use a vpn service with reliable speed and I dont want to use TCP as it appers to be too slow for downloads.

Below is the log:

. 2015.05.04 19:48:02 - Data Path: C:\Program Files\AirVPN
. 2015.05.04 19:48:02 - App Path: C:\Program Files\AirVPN
. 2015.05.04 19:48:02 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2015.05.04 19:48:02 - Command line arguments (0):
. 2015.05.04 19:48:02 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2015.05.04 19:48:02 - Updating systems & servers data ...
I 2015.05.04 19:48:05 - OpenVPN Driver - TAP-Windows Adapter V9
I 2015.05.04 19:48:05 - OpenVPN - Version: OpenVPN 2.3.6 (C:\Program Files\AirVPN\openvpn.exe)
I 2015.05.04 19:48:05 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2015.05.04 19:48:05 - SSL - Version: stunnel 5.09 (C:\Program Files\AirVPN\stunnel.exe)
I 2015.05.04 19:48:06 - IPV6: Available
! 2015.05.04 19:48:06 - Ready
. 2015.05.04 19:48:07 - Systems & servers data update completed
. 2015.05.04 19:50:03 - Data Path: C:\Program Files\AirVPN
. 2015.05.04 19:50:03 - App Path: C:\Program Files\AirVPN
. 2015.05.04 19:50:03 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2015.05.04 19:50:03 - Command line arguments (0):
. 2015.05.04 19:50:03 - Operating System: Microsoft Windows NT 6.2.9200.0
I 2015.05.04 19:50:03 - OpenVPN Driver - TAP-Windows Adapter V9
I 2015.05.04 19:50:03 - OpenVPN - Version: OpenVPN 2.3.6 (C:\Program Files\AirVPN\openvpn.exe)
I 2015.05.04 19:50:03 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2015.05.04 19:50:03 - SSL - Version: stunnel 5.09 (C:\Program Files\AirVPN\stunnel.exe)
I 2015.05.04 19:50:03 - IPV6: Available
! 2015.05.04 19:50:03 - Ready
I 2015.05.04 19:50:10 - Session starting.
I 2015.05.04 19:50:10 - Installing tunnel driver
I 2015.05.04 19:50:17 - Checking authorization ...
! 2015.05.04 19:50:18 - Connecting to Merope (United States, Los Angeles)
. 2015.05.04 19:50:19 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015
. 2015.05.04 19:50:19 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2015.05.04 19:50:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.05.04 19:50:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.05.04 19:50:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 19:50:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 19:50:19 - OpenVPN > Socket Buffers: R=[65536->65536] S=[64512->64512]
. 2015.05.04 19:50:19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]199.241.146.162:443 [nonblock]
. 2015.05.04 19:50:20 - OpenVPN > TCP connection established with [AF_INET]199.241.146.162:443
. 2015.05.04 19:50:20 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2015.05.04 19:50:20 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]199.241.146.162:443
. 2015.05.04 19:50:20 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.146.162:443, sid=84b57b0a 9e1face1
. 2015.05.04 19:50:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.05.04 19:50:23 - OpenVPN > Validating certificate key usage
. 2015.05.04 19:50:23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.05.04 19:50:23 - OpenVPN > VERIFY KU OK
. 2015.05.04 19:50:23 - OpenVPN > Validating certificate extended key usage
. 2015.05.04 19:50:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.05.04 19:50:23 - OpenVPN > VERIFY EKU OK
. 2015.05.04 19:50:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.05.04 19:50:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.05.04 19:50:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 19:50:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.05.04 19:50:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 19:50:30 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2015.05.04 19:50:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.146.162:443
. 2015.05.04 19:50:33 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.05.04 19:50:33 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.5.0.1,comp-lzo no,route-gateway 10.5.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.5.0.145 255.255.0.0'
. 2015.05.04 19:50:33 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.05.04 19:50:33 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.05.04 19:50:33 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.05.04 19:50:33 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.05.04 19:50:33 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2015.05.04 19:50:33 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.05.04 19:50:33 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2015.05.04 19:50:33 - OpenVPN > open_tun, tt->ipv6=0
. 2015.05.04 19:50:34 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\.tap
. 2015.05.04 19:50:34 - OpenVPN > TAP-Windows Driver Version 9.9
. 2015.05.04 19:50:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.5.0.0/10.5.0.145/255.255.0.0 [sUCCEEDED]
. 2015.05.04 19:50:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.5.0.145/255.255.0.0 on interface  [DHCP-serv: 10.5.255.254, lease-time: 31536000]
. 2015.05.04 19:50:34 - OpenVPN > Successful ARP Flush on interface [26]
. 2015.05.04 19:50:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2015.05.04 19:50:39 - OpenVPN > C:\Windows\system32\route.exe ADD 199.241.146.162 MASK 255.255.255.255 192.168.1.200
. 2015.05.04 19:50:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=40 and dwForwardType=4
. 2015.05.04 19:50:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.05.04 19:50:39 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2015.05.04 19:50:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2015.05.04 19:50:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.05.04 19:50:39 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2015.05.04 19:50:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2015.05.04 19:50:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.05.04 19:50:39 - Starting Management Interface
. 2015.05.04 19:50:39 - OpenVPN > Initialization Sequence Completed
I 2015.05.04 19:50:39 - Flushing DNS
I 2015.05.04 19:50:39 - Checking route
I 2015.05.04 19:50:42 - Checking DNS
! 2015.05.04 19:50:43 - Connected.
. 2015.05.04 19:50:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2015.05.04 19:50:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2015.05.04 20:18:33 - Updating systems & servers data ...
. 2015.05.04 20:18:36 - Systems & servers data update completed
. 2015.05.04 20:49:10 - Updating systems & servers data ...
. 2015.05.04 20:49:23 - Systems & servers data update completed
. 2015.05.04 20:50:30 - OpenVPN > TLS: soft reset sec=0 bytes=359798761/0 pkts=464385/0
. 2015.05.04 20:50:34 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.05.04 20:50:34 - OpenVPN > Validating certificate key usage
. 2015.05.04 20:50:34 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.05.04 20:50:34 - OpenVPN > VERIFY KU OK
. 2015.05.04 20:50:34 - OpenVPN > Validating certificate extended key usage
. 2015.05.04 20:50:34 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.05.04 20:50:34 - OpenVPN > VERIFY EKU OK
. 2015.05.04 20:50:34 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.05.04 20:50:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.05.04 20:50:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 20:50:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.05.04 20:50:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 20:50:46 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2015.05.04 21:20:19 - Updating systems & servers data ...
. 2015.05.04 21:20:24 - Systems & servers data update completed
! 2015.05.04 21:45:12 - Disconnecting
. 2015.05.04 21:45:12 - Management - Send 'signal SIGTERM'
. 2015.05.04 21:45:12 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2015.05.04 21:45:12 - OpenVPN > C:\Windows\system32\route.exe DELETE 199.241.146.162 MASK 255.255.255.255 192.168.1.200
. 2015.05.04 21:45:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2015.05.04 21:45:12 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2015.05.04 21:45:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2015.05.04 21:45:12 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.5.0.1
. 2015.05.04 21:45:12 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2015.05.04 21:45:12 - OpenVPN > Closing TUN/TAP interface
. 2015.05.04 21:45:12 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2015.05.04 21:45:12 - Connection terminated.
I 2015.05.04 21:45:16 - Checking authorization ...
! 2015.05.04 21:45:17 - Connecting to Merope (United States, Los Angeles)
. 2015.05.04 21:45:17 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015
. 2015.05.04 21:45:17 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08
. 2015.05.04 21:45:17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2015.05.04 21:45:17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2015.05.04 21:45:17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 21:45:17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 21:45:17 - OpenVPN > Socket Buffers: R=[65536->65536] S=[64512->64512]
. 2015.05.04 21:45:17 - OpenVPN > UDPv4 link local: [undef]
. 2015.05.04 21:45:17 - OpenVPN > UDPv4 link remote: [AF_INET]199.241.146.162:443
. 2015.05.04 21:45:17 - OpenVPN > TLS: Initial packet from [AF_INET]199.241.146.162:443, sid=19bd610b 3bf2b90e
. 2015.05.04 21:45:20 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2015.05.04 21:45:20 - OpenVPN > Validating certificate key usage
. 2015.05.04 21:45:20 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2015.05.04 21:45:20 - OpenVPN > VERIFY KU OK
. 2015.05.04 21:45:20 - OpenVPN > Validating certificate extended key usage
. 2015.05.04 21:45:20 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2015.05.04 21:45:20 - OpenVPN > VERIFY EKU OK
. 2015.05.04 21:45:20 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2015.05.04 21:45:23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.05.04 21:45:23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 21:45:23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2015.05.04 21:45:23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2015.05.04 21:45:23 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
. 2015.05.04 21:45:23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.241.146.162:443
. 2015.05.04 21:45:25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2015.05.04 21:45:25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.6.245 255.255.0.0'
. 2015.05.04 21:45:25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2015.05.04 21:45:25 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2015.05.04 21:45:25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2015.05.04 21:45:25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2015.05.04 21:45:25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2015.05.04 21:45:25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2015.05.04 21:45:25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2015.05.04 21:45:25 - OpenVPN > open_tun, tt->ipv6=0
. 2015.05.04 21:45:26 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\.tap
. 2015.05.04 21:45:26 - OpenVPN > TAP-Windows Driver Version 9.9
. 2015.05.04 21:45:26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.6.245/255.255.0.0 [sUCCEEDED]
. 2015.05.04 21:45:26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.6.245/255.255.0.0 on interface  [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2015.05.04 21:45:26 - OpenVPN > Successful ARP Flush on interface [26]
. 2015.05.04 21:45:30 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2015.05.04 21:45:30 - OpenVPN > C:\Windows\system32\route.exe ADD 199.241.146.162 MASK 255.255.255.255 192.168.1.200
. 2015.05.04 21:45:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2015.05.04 21:45:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.05.04 21:45:30 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2015.05.04 21:45:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2015.05.04 21:45:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.05.04 21:45:30 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2015.05.04 21:45:30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=30 and dwForwardType=4
. 2015.05.04 21:45:30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2015.05.04 21:45:30 - Starting Management Interface
. 2015.05.04 21:45:30 - OpenVPN > Initialization Sequence Completed
I 2015.05.04 21:45:30 - Flushing DNS
I 2015.05.04 21:45:30 - Checking route
W 2015.05.04 21:45:40 - Checking route, 1° try failed (The operation has timed out)
W 2015.05.04 21:45:50 - Checking route, 2° try failed (The operation has timed out)
W 2015.05.04 21:46:00 - Checking route, 3° try failed (The operation has timed out)
W 2015.05.04 21:46:10 - Checking route, 4° try failed (The operation has timed out)
W 2015.05.04 21:46:20 - Checking route, 5° try failed (The operation has timed out)
W 2015.05.04 21:46:20 - The operation has timed out
! 2015.05.04 21:46:21 - Disconnecting

Share this post


Link to post

It seems there are many issues with the new US servers. Would you mind to check what happens if you try the same with the Netherlands ones?

 

Did you submit any ticket? Forum is usually slower in order to get a right answer from Staff

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image
Sign in to follow this  

×
×
  • Create New...