FreeReason 0 Posted ... Hi, I use OpenVPN and Vuze. I've bound my TAP adapter to VUZE and am forwarding a random port for transfers from AIRvpn. I'm getting a green smiley so it seems to be configured correctly, however, about the best download speeds I've experienced are 60-80kB/s. I've tried a several US servers and a few in UK and France, but they all seem about the same after 3-4 days of experimenting. Using Ubuntu as a test download. With the VPN, I get as high as 75kB/s. Without, easily over 2MB/s (likely higher with more time). Other items of interest, perhaps: PnP is disabled on Vuze and my routerMy ISP is Time Warner/Roadrunner with 50 down/5 up. I'm mildly-literate with networking and this is a little new. Is this the best I can expect? If not, help? -FreeReason Log: Sun Jun 07 21:31:48 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015Sun Jun 07 21:31:48 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08Enter Management Password:Sun Jun 07 21:31:48 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25355Sun Jun 07 21:31:48 2015 Need hold release from management interface, waiting...Sun Jun 07 21:31:49 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25355Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'state on'Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'log all on'Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'hold off'Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'hold release'Sun Jun 07 21:31:49 2015 Control Channel Authentication: tls-auth using INLINE static key fileSun Jun 07 21:31:49 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationSun Jun 07 21:31:49 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationSun Jun 07 21:31:49 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]Sun Jun 07 21:31:49 2015 MANAGEMENT: >STATE:1433727109,RESOLVE,,,Sun Jun 07 21:31:49 2015 UDPv4 link local: [undef]Sun Jun 07 21:31:49 2015 UDPv4 link remote: [AF_INET]104.243.24.235:443Sun Jun 07 21:31:49 2015 MANAGEMENT: >STATE:1433727109,WAIT,,,Sun Jun 07 21:32:03 2015 MANAGEMENT: >STATE:1433727123,AUTH,,,Sun Jun 07 21:32:03 2015 TLS: Initial packet from [AF_INET]104.243.24.235:443, sid=e4d72540 196b78afSun Jun 07 21:32:03 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgSun Jun 07 21:32:03 2015 Validating certificate key usageSun Jun 07 21:32:03 2015 ++ Certificate has key usage 00a0, expects 00a0Sun Jun 07 21:32:03 2015 VERIFY KU OKSun Jun 07 21:32:03 2015 Validating certificate extended key usageSun Jun 07 21:32:03 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationSun Jun 07 21:32:03 2015 VERIFY EKU OKSun Jun 07 21:32:03 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgSun Jun 07 21:32:06 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySun Jun 07 21:32:06 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSun Jun 07 21:32:06 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keySun Jun 07 21:32:06 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationSun Jun 07 21:32:06 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSASun Jun 07 21:32:06 2015 [server] Peer Connection Initiated with [AF_INET]104.243.24.235:443Sun Jun 07 21:32:07 2015 MANAGEMENT: >STATE:1433727127,GET_CONFIG,,,Sun Jun 07 21:32:08 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Sun Jun 07 21:32:08 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.187 255.255.0.0'Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: timers and/or timeouts modifiedSun Jun 07 21:32:08 2015 OPTIONS IMPORT: LZO parms modifiedSun Jun 07 21:32:08 2015 OPTIONS IMPORT: --ifconfig/up options modifiedSun Jun 07 21:32:08 2015 OPTIONS IMPORT: route options modifiedSun Jun 07 21:32:08 2015 OPTIONS IMPORT: route-related options modifiedSun Jun 07 21:32:08 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedSun Jun 07 21:32:08 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Sun Jun 07 21:32:08 2015 MANAGEMENT: >STATE:1433727128,ASSIGN_IP,,10.4.0.187,Sun Jun 07 21:32:08 2015 open_tun, tt->ipv6=0Sun Jun 07 21:32:08 2015 TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{9F8DF516-957E-4A12-8ECD-BF34E84A2772}.tapSun Jun 07 21:32:08 2015 TAP-Windows Driver Version 9.21 Sun Jun 07 21:32:08 2015 Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.187/255.255.0.0 [sUCCEEDED]Sun Jun 07 21:32:08 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.187/255.255.0.0 on interface {9F8DF516-957E-4A12-8ECD-BF34E84A2772} [DHCP-serv: 10.4.255.254, lease-time: 31536000]Sun Jun 07 21:32:08 2015 Successful ARP Flush on interface [17] {9F8DF516-957E-4A12-8ECD-BF34E84A2772}Sun Jun 07 21:32:20 2015 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=upSun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 104.243.24.235 MASK 255.255.255.255 192.168.1.1Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 11Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]Sun Jun 07 21:32:20 2015 Initialization Sequence CompletedSun Jun 07 21:32:20 2015 MANAGEMENT: >STATE:1433727140,CONNECTED,SUCCESS,10.4.0.187,104.243.24.235Sun Jun 07 21:37:03 2015 SIGTERM received, sending exit notification to peerSun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 104.243.24.235 MASK 255.255.255.255 192.168.1.1Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]Sun Jun 07 21:37:08 2015 Closing TUN/TAP interfaceSun Jun 07 21:37:08 2015 SIGTERM[soft,exit-with-notification] received, process exitingSun Jun 07 21:37:08 2015 MANAGEMENT: >STATE:1433727428,EXITING,exit-with-notification,, Quote Share this post Link to post
Staff 9972 Posted ... Hello, as a first attempt to improve performance it is necessary to enlarge OpenVPN buffers:Sun Jun 07 21:31:49 2015 Socket Buffers: R=[8192->8192] S=[8192->8192] 8 kB are too few for a 50 Mbit/s line. Use the following directives to enlarge send and receive buffers to 128 kB:sndbuf 131072rcvbuf 131072 You can add them in the Configuration Generator as custom directives (click "Advanced Mode" then add those lines in the "Custom directives" field). If you run our client Eddie, you can add them in "AirVPN" -> "Preferences" -> "Advanced" -> "OVPN Directives". Future Eddie versions will implement by default a larger buffer. Please keep us posted, if the problem is not resolved there are additional attempts to try (changing connection mode). Kind regards Quote Share this post Link to post
FreeReason 0 Posted ... Thanks for the tip. It helped, but the speed is still not great. D/ling Ubuntu again, I was getting as high as 225 kB/s (avg 180-ish) in Miami with 80 seeds, In Dallas, avg of 150 kB/s with 77 seeds. Chicago was about the same. When I turned off the VPN and unbound the adapter in Vuze, speeds jumped to 5.5 MB/s. So still way slower. Any other suggestions? You mentioned changing connection mode. Do you mean using TCP over UDP? If so, do you have a guide? Thanks, -FreeReason Today's Log from Illinois Mon Jun 08 21:30:07 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015Mon Jun 08 21:30:07 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08Enter Management Password:Mon Jun 08 21:30:07 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25356Mon Jun 08 21:30:07 2015 Need hold release from management interface, waiting...Mon Jun 08 21:30:08 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25356Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'state on'Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'log all on'Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'hold off'Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'hold release'Mon Jun 08 21:30:08 2015 Control Channel Authentication: tls-auth using INLINE static key fileMon Jun 08 21:30:08 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:08 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:08 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]Mon Jun 08 21:30:08 2015 UDPv4 link local: [undef]Mon Jun 08 21:30:08 2015 UDPv4 link remote: [AF_INET]46.21.154.82:443Mon Jun 08 21:30:08 2015 MANAGEMENT: >STATE:1433813408,WAIT,,,Mon Jun 08 21:30:08 2015 MANAGEMENT: >STATE:1433813408,AUTH,,,Mon Jun 08 21:30:08 2015 TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=3778b0b9 9120fe87Mon Jun 08 21:30:09 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgMon Jun 08 21:30:09 2015 Validating certificate key usageMon Jun 08 21:30:09 2015 ++ Certificate has key usage 00a0, expects 00a0Mon Jun 08 21:30:09 2015 VERIFY KU OKMon Jun 08 21:30:09 2015 Validating certificate extended key usageMon Jun 08 21:30:09 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationMon Jun 08 21:30:09 2015 VERIFY EKU OKMon Jun 08 21:30:09 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgMon Jun 08 21:30:13 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 08 21:30:13 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:13 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 08 21:30:13 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:13 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSAMon Jun 08 21:30:13 2015 [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443Mon Jun 08 21:30:14 2015 MANAGEMENT: >STATE:1433813414,GET_CONFIG,,,Mon Jun 08 21:30:15 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Mon Jun 08 21:30:18 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.10.248 255.255.0.0'Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: timers and/or timeouts modifiedMon Jun 08 21:30:18 2015 OPTIONS IMPORT: LZO parms modifiedMon Jun 08 21:30:18 2015 OPTIONS IMPORT: --ifconfig/up options modifiedMon Jun 08 21:30:18 2015 OPTIONS IMPORT: route options modifiedMon Jun 08 21:30:18 2015 OPTIONS IMPORT: route-related options modifiedMon Jun 08 21:30:18 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedMon Jun 08 21:30:18 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Mon Jun 08 21:30:18 2015 MANAGEMENT: >STATE:1433813418,ASSIGN_IP,,10.4.10.248,Mon Jun 08 21:30:18 2015 open_tun, tt->ipv6=0Mon Jun 08 21:30:18 2015 CreateFile failed on TAP device: \\.\Global\{9F8DF516-957E-4A12-8ECD-BF34E84A2772}.tapMon Jun 08 21:30:18 2015 MANAGEMENT: Client disconnectedMon Jun 08 21:30:18 2015 All TAP-Windows adapters on this system are currently in use.Mon Jun 08 21:30:18 2015 Exiting due to fatal error Quote Share this post Link to post
Staff 9972 Posted ... Hello! Please note that from your last logs your system is NOT connected to the VPN because of this error: Mon Jun 08 21:30:18 2015 All TAP-Windows adapters on this system are currently in use. Mon Jun 08 21:30:18 2015 Exiting due to fatal error This is usually caused by a disabled tun/tap interface (the virtual network adapter used by OpenVPN). Make sure to re-enable it, otherwise you will never be able to connect to the VPN. You might like to run our free and open source client Eddie for additional security checks for these cases and many more. Eddie provides Network Lock and a route and DNS checks at the connection, warning you clearly if something has gone wrong. The fact that you experienced different performance while in reality your system was not connected to any VPN server remains unexplained. Kind regards Quote Share this post Link to post
FreeReason 0 Posted ... Sorry about the previous log post. I pasted the wrong one. I learned last night that if you try to connect to a VPN while another one is running, it will not let you. The log in the previous post was simply rejecting the VPN connection because I was already connected elsewhere. I can assure you the performance issues I experienced were while connected to a VPN. I would prefer to continue to use Vuze as I'm familiar with the interface. However, it you think thereis a significant speed advantage by trying Eddie, I'll give it a go. Here is a better connection log from last night: -FreeReason Mon Jun 08 21:30:28 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015Mon Jun 08 21:30:28 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08Enter Management Password:Mon Jun 08 21:30:28 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25357Mon Jun 08 21:30:28 2015 Need hold release from management interface, waiting...Mon Jun 08 21:30:28 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25357Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'state on'Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'log all on'Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'hold off'Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'hold release'Mon Jun 08 21:30:29 2015 Control Channel Authentication: tls-auth using INLINE static key fileMon Jun 08 21:30:29 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:29 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:29 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]Mon Jun 08 21:30:29 2015 UDPv4 link local: [undef]Mon Jun 08 21:30:29 2015 UDPv4 link remote: [AF_INET]149.255.33.154:443Mon Jun 08 21:30:29 2015 MANAGEMENT: >STATE:1433813429,WAIT,,,Mon Jun 08 21:30:29 2015 MANAGEMENT: >STATE:1433813429,AUTH,,,Mon Jun 08 21:30:29 2015 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=b075da57 bf7825feMon Jun 08 21:30:29 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgMon Jun 08 21:30:29 2015 Validating certificate key usageMon Jun 08 21:30:29 2015 ++ Certificate has key usage 00a0, expects 00a0Mon Jun 08 21:30:29 2015 VERIFY KU OKMon Jun 08 21:30:29 2015 Validating certificate extended key usageMon Jun 08 21:30:29 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationMon Jun 08 21:30:29 2015 VERIFY EKU OKMon Jun 08 21:30:29 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgMon Jun 08 21:30:40 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 08 21:30:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:40 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 08 21:30:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:30:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSAMon Jun 08 21:30:40 2015 [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443Mon Jun 08 21:30:41 2015 MANAGEMENT: >STATE:1433813441,GET_CONFIG,,,Mon Jun 08 21:30:42 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Mon Jun 08 21:30:42 2015 AUTH: Received control message: AUTH_FAILEDMon Jun 08 21:30:42 2015 SIGUSR1[soft,auth-failure] received, process restartingMon Jun 08 21:30:42 2015 MANAGEMENT: >STATE:1433813442,RECONNECTING,auth-failure,,Mon Jun 08 21:30:42 2015 Restart pause, 2 second(s)Mon Jun 08 21:30:44 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]Mon Jun 08 21:30:44 2015 UDPv4 link local: [undef]Mon Jun 08 21:30:44 2015 UDPv4 link remote: [AF_INET]149.255.33.154:443Mon Jun 08 21:30:44 2015 MANAGEMENT: >STATE:1433813444,WAIT,,,Mon Jun 08 21:30:44 2015 MANAGEMENT: >STATE:1433813444,AUTH,,,Mon Jun 08 21:30:44 2015 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=c72cc530 3d433d05Mon Jun 08 21:30:44 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgMon Jun 08 21:30:44 2015 Validating certificate key usageMon Jun 08 21:30:44 2015 ++ Certificate has key usage 00a0, expects 00a0Mon Jun 08 21:30:44 2015 VERIFY KU OKMon Jun 08 21:30:44 2015 Validating certificate extended key usageMon Jun 08 21:30:44 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationMon Jun 08 21:30:44 2015 VERIFY EKU OKMon Jun 08 21:30:44 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgMon Jun 08 21:31:04 2015 MANAGEMENT: CMD 'signal SIGHUP'Mon Jun 08 21:31:04 2015 SIGHUP[hard,] received, process restartingMon Jun 08 21:31:04 2015 MANAGEMENT: >STATE:1433813464,RECONNECTING,SIGHUP,,Mon Jun 08 21:31:04 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015Mon Jun 08 21:31:04 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08Mon Jun 08 21:31:04 2015 Restart pause, 2 second(s)Mon Jun 08 21:31:06 2015 Control Channel Authentication: tls-auth using INLINE static key fileMon Jun 08 21:31:06 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:31:06 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:31:06 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]Mon Jun 08 21:31:06 2015 UDPv4 link local: [undef]Mon Jun 08 21:31:06 2015 UDPv4 link remote: [AF_INET]149.255.33.154:443Mon Jun 08 21:31:06 2015 MANAGEMENT: >STATE:1433813466,WAIT,,,Mon Jun 08 21:31:06 2015 MANAGEMENT: >STATE:1433813466,AUTH,,,Mon Jun 08 21:31:06 2015 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=d6c643df 45f4d09eMon Jun 08 21:31:07 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.orgMon Jun 08 21:31:07 2015 Validating certificate key usageMon Jun 08 21:31:07 2015 ++ Certificate has key usage 00a0, expects 00a0Mon Jun 08 21:31:07 2015 VERIFY KU OKMon Jun 08 21:31:07 2015 Validating certificate extended key usageMon Jun 08 21:31:07 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server AuthenticationMon Jun 08 21:31:07 2015 VERIFY EKU OKMon Jun 08 21:31:07 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.orgMon Jun 08 21:31:12 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 08 21:31:12 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:31:12 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit keyMon Jun 08 21:31:12 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authenticationMon Jun 08 21:31:12 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSAMon Jun 08 21:31:12 2015 [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443Mon Jun 08 21:31:13 2015 MANAGEMENT: >STATE:1433813473,GET_CONFIG,,,Mon Jun 08 21:31:14 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)Mon Jun 08 21:31:14 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.255 255.255.0.0'Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: timers and/or timeouts modifiedMon Jun 08 21:31:14 2015 OPTIONS IMPORT: LZO parms modifiedMon Jun 08 21:31:14 2015 OPTIONS IMPORT: --ifconfig/up options modifiedMon Jun 08 21:31:14 2015 OPTIONS IMPORT: route options modifiedMon Jun 08 21:31:14 2015 OPTIONS IMPORT: route-related options modifiedMon Jun 08 21:31:14 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modifiedMon Jun 08 21:31:14 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0Mon Jun 08 21:31:14 2015 MANAGEMENT: >STATE:1433813474,ASSIGN_IP,,10.4.9.255,Mon Jun 08 21:31:14 2015 open_tun, tt->ipv6=0Mon Jun 08 21:31:14 2015 TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{9F8DF516-957E-4A12-8ECD-BF34E84A2772}.tapMon Jun 08 21:31:14 2015 TAP-Windows Driver Version 9.21 Mon Jun 08 21:31:14 2015 Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.255/255.255.0.0 [sUCCEEDED]Mon Jun 08 21:31:14 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.255/255.255.0.0 on interface {9F8DF516-957E-4A12-8ECD-BF34E84A2772} [DHCP-serv: 10.4.255.254, lease-time: 31536000]Mon Jun 08 21:31:14 2015 Successful ARP Flush on interface [17] {9F8DF516-957E-4A12-8ECD-BF34E84A2772}Mon Jun 08 21:31:19 2015 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=upMon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.1.1Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 11Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]Mon Jun 08 21:31:19 2015 Initialization Sequence CompletedMon Jun 08 21:31:19 2015 MANAGEMENT: >STATE:1433813479,CONNECTED,SUCCESS,10.4.9.255,149.255.33.154Mon Jun 08 21:35:53 2015 SIGTERM received, sending exit notification to peerMon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 149.255.33.154 MASK 255.255.255.255 192.168.1.1Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]Mon Jun 08 21:35:58 2015 Closing TUN/TAP interfaceMon Jun 08 21:35:58 2015 SIGTERM[soft,exit-with-notification] received, process exitingMon Jun 08 21:35:58 2015 MANAGEMENT: >STATE:1433813758,EXITING,exit-with-notification,, Quote Share this post Link to post
OpenSourcerer 1435 Posted ... Try to not bind it to an interface. At least it helped me (qBittorrent). Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post