Jump to content
Not connected, Your IP: 18.119.116.77

Recommended Posts

Hi, I use OpenVPN and Vuze.  I've bound my TAP adapter to VUZE and am forwarding a random port for transfers from AIRvpn.  I'm getting a green smiley so it seems to be configured correctly, however, about the best download speeds I've experienced are 60-80kB/s.

 

I've tried a several US servers and a few in UK and France, but they all seem about the same after 3-4 days of experimenting.  Using Ubuntu as a test download.  With the VPN, I get as high as 75kB/s.  Without, easily over 2MB/s (likely higher with more time).

 

Other items of interest, perhaps:

 

PnP is disabled on Vuze and my router

My ISP is Time Warner/Roadrunner with 50 down/5 up.

 

I'm mildly-literate with networking and this is a little new.  Is this the best I can expect?  If not, help?

 

-FreeReason

 

Log:

 

Sun Jun 07 21:31:48 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015
Sun Jun 07 21:31:48 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
Enter Management Password:
Sun Jun 07 21:31:48 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25355
Sun Jun 07 21:31:48 2015 Need hold release from management interface, waiting...
Sun Jun 07 21:31:49 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25355
Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'state on'
Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'log all on'
Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'hold off'
Sun Jun 07 21:31:49 2015 MANAGEMENT: CMD 'hold release'
Sun Jun 07 21:31:49 2015 Control Channel Authentication: tls-auth using INLINE static key file
Sun Jun 07 21:31:49 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Jun 07 21:31:49 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Jun 07 21:31:49 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]
Sun Jun 07 21:31:49 2015 MANAGEMENT: >STATE:1433727109,RESOLVE,,,
Sun Jun 07 21:31:49 2015 UDPv4 link local: [undef]
Sun Jun 07 21:31:49 2015 UDPv4 link remote: [AF_INET]104.243.24.235:443
Sun Jun 07 21:31:49 2015 MANAGEMENT: >STATE:1433727109,WAIT,,,
Sun Jun 07 21:32:03 2015 MANAGEMENT: >STATE:1433727123,AUTH,,,
Sun Jun 07 21:32:03 2015 TLS: Initial packet from [AF_INET]104.243.24.235:443, sid=e4d72540 196b78af
Sun Jun 07 21:32:03 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Sun Jun 07 21:32:03 2015 Validating certificate key usage
Sun Jun 07 21:32:03 2015 ++ Certificate has key usage  00a0, expects 00a0
Sun Jun 07 21:32:03 2015 VERIFY KU OK
Sun Jun 07 21:32:03 2015 Validating certificate extended key usage
Sun Jun 07 21:32:03 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Sun Jun 07 21:32:03 2015 VERIFY EKU OK
Sun Jun 07 21:32:03 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Sun Jun 07 21:32:06 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Jun 07 21:32:06 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Jun 07 21:32:06 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Sun Jun 07 21:32:06 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Sun Jun 07 21:32:06 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Sun Jun 07 21:32:06 2015 [server] Peer Connection Initiated with [AF_INET]104.243.24.235:443
Sun Jun 07 21:32:07 2015 MANAGEMENT: >STATE:1433727127,GET_CONFIG,,,
Sun Jun 07 21:32:08 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Sun Jun 07 21:32:08 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.0.187 255.255.0.0'
Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: timers and/or timeouts modified
Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: LZO parms modified
Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: --ifconfig/up options modified
Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: route options modified
Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: route-related options modified
Sun Jun 07 21:32:08 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Sun Jun 07 21:32:08 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Sun Jun 07 21:32:08 2015 MANAGEMENT: >STATE:1433727128,ASSIGN_IP,,10.4.0.187,
Sun Jun 07 21:32:08 2015 open_tun, tt->ipv6=0
Sun Jun 07 21:32:08 2015 TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{9F8DF516-957E-4A12-8ECD-BF34E84A2772}.tap
Sun Jun 07 21:32:08 2015 TAP-Windows Driver Version 9.21 
Sun Jun 07 21:32:08 2015 Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.0.187/255.255.0.0 [sUCCEEDED]
Sun Jun 07 21:32:08 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.0.187/255.255.0.0 on interface {9F8DF516-957E-4A12-8ECD-BF34E84A2772} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
Sun Jun 07 21:32:08 2015 Successful ARP Flush on interface [17] {9F8DF516-957E-4A12-8ECD-BF34E84A2772}
Sun Jun 07 21:32:20 2015 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 104.243.24.235 MASK 255.255.255.255 192.168.1.1
Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]
Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 11
Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]
Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]
Sun Jun 07 21:32:20 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
Sun Jun 07 21:32:20 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Sun Jun 07 21:32:20 2015 Route addition via IPAPI succeeded [adaptive]
Sun Jun 07 21:32:20 2015 Initialization Sequence Completed
Sun Jun 07 21:32:20 2015 MANAGEMENT: >STATE:1433727140,CONNECTED,SUCCESS,10.4.0.187,104.243.24.235
Sun Jun 07 21:37:03 2015 SIGTERM received, sending exit notification to peer
Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 104.243.24.235 MASK 255.255.255.255 192.168.1.1
Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]
Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]
Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]
Sun Jun 07 21:37:08 2015 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
Sun Jun 07 21:37:08 2015 Route deletion via IPAPI succeeded [adaptive]
Sun Jun 07 21:37:08 2015 Closing TUN/TAP interface
Sun Jun 07 21:37:08 2015 SIGTERM[soft,exit-with-notification] received, process exiting
Sun Jun 07 21:37:08 2015 MANAGEMENT: >STATE:1433727428,EXITING,exit-with-notification,,
 

Share this post


Link to post

Hello,

 

as a first attempt to improve performance it is necessary to enlarge OpenVPN buffers:

Sun Jun 07 21:31:49 2015 Socket Buffers: R=[8192->8192] S=[8192->8192]

 

8 kB are too few for a 50 Mbit/s line. Use the following directives to enlarge send and receive buffers to 128 kB:

sndbuf 131072

rcvbuf 131072

 

You can add them in the Configuration Generator as custom directives (click "Advanced Mode" then add those lines in the "Custom directives" field). If you run our client Eddie, you can add them in "AirVPN" -> "Preferences" -> "Advanced" -> "OVPN Directives". Future Eddie versions will implement by default a larger buffer.

 

Please keep us posted, if the problem is not resolved there are additional attempts to try (changing connection mode).

 

Kind regards

Share this post


Link to post

Thanks for the tip.  It helped, but the speed is still not great.  D/ling Ubuntu again, I was getting as high as 225 kB/s (avg 180-ish) in Miami with 80 seeds, In Dallas, avg of 150 kB/s with 77 seeds.  Chicago was about the same.  When I turned off the VPN and unbound the adapter in Vuze, speeds jumped to 5.5 MB/s.  So still way slower.  Any other suggestions?  You mentioned changing connection mode.  Do you mean using TCP over UDP?  If so, do you have a guide?

 

Thanks,

 

-FreeReason

 

Today's Log from Illinois

 

Mon Jun 08 21:30:07 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015
Mon Jun 08 21:30:07 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
Enter Management Password:
Mon Jun 08 21:30:07 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25356
Mon Jun 08 21:30:07 2015 Need hold release from management interface, waiting...
Mon Jun 08 21:30:08 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25356
Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'state on'
Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'log all on'
Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'hold off'
Mon Jun 08 21:30:08 2015 MANAGEMENT: CMD 'hold release'
Mon Jun 08 21:30:08 2015 Control Channel Authentication: tls-auth using INLINE static key file
Mon Jun 08 21:30:08 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:08 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:08 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]
Mon Jun 08 21:30:08 2015 UDPv4 link local: [undef]
Mon Jun 08 21:30:08 2015 UDPv4 link remote: [AF_INET]46.21.154.82:443
Mon Jun 08 21:30:08 2015 MANAGEMENT: >STATE:1433813408,WAIT,,,
Mon Jun 08 21:30:08 2015 MANAGEMENT: >STATE:1433813408,AUTH,,,
Mon Jun 08 21:30:08 2015 TLS: Initial packet from [AF_INET]46.21.154.82:443, sid=3778b0b9 9120fe87
Mon Jun 08 21:30:09 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jun 08 21:30:09 2015 Validating certificate key usage
Mon Jun 08 21:30:09 2015 ++ Certificate has key usage  00a0, expects 00a0
Mon Jun 08 21:30:09 2015 VERIFY KU OK
Mon Jun 08 21:30:09 2015 Validating certificate extended key usage
Mon Jun 08 21:30:09 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jun 08 21:30:09 2015 VERIFY EKU OK
Mon Jun 08 21:30:09 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jun 08 21:30:13 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jun 08 21:30:13 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:13 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jun 08 21:30:13 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:13 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jun 08 21:30:13 2015 [server] Peer Connection Initiated with [AF_INET]46.21.154.82:443
Mon Jun 08 21:30:14 2015 MANAGEMENT: >STATE:1433813414,GET_CONFIG,,,
Mon Jun 08 21:30:15 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jun 08 21:30:18 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.10.248 255.255.0.0'
Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: LZO parms modified
Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: route options modified
Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: route-related options modified
Mon Jun 08 21:30:18 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jun 08 21:30:18 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Jun 08 21:30:18 2015 MANAGEMENT: >STATE:1433813418,ASSIGN_IP,,10.4.10.248,
Mon Jun 08 21:30:18 2015 open_tun, tt->ipv6=0
Mon Jun 08 21:30:18 2015 CreateFile failed on TAP device: \\.\Global\{9F8DF516-957E-4A12-8ECD-BF34E84A2772}.tap
Mon Jun 08 21:30:18 2015 MANAGEMENT: Client disconnected
Mon Jun 08 21:30:18 2015 All TAP-Windows adapters on this system are currently in use.
Mon Jun 08 21:30:18 2015 Exiting due to fatal error

Share this post


Link to post

Hello!

 

Please note that from your last logs your system is NOT connected to the VPN because of this error:

 

Mon Jun 08 21:30:18 2015 All TAP-Windows adapters on this system are currently in use.
Mon Jun 08 21:30:18 2015 Exiting due to fatal error

 

This is usually caused by a disabled tun/tap interface (the virtual network adapter used by OpenVPN). Make sure to re-enable it, otherwise you will never be able to connect to the VPN.
 
You might like to run our free and open source client Eddie for additional security checks for these cases and many more. Eddie provides Network Lock and a route and DNS checks at the connection, warning you clearly if something has gone wrong.
 
The fact that you experienced different performance while in reality your system was not connected to any VPN server remains unexplained.
 
Kind regards

Share this post


Link to post

Sorry about the previous log post.  I pasted the wrong one.  I learned last night that if you try to connect to a VPN while another one is running, it will not let you.  The log in the previous post was simply rejecting the VPN connection because I was already connected elsewhere.  I can assure you the performance issues I experienced were while connected to a VPN.  I would prefer to continue to use Vuze as I'm familiar with the interface.  However, it you think thereis a significant speed advantage by trying Eddie, I'll give it a go.  Here is a better connection log from last night:

 

-FreeReason

 

Mon Jun 08 21:30:28 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015
Mon Jun 08 21:30:28 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
Enter Management Password:
Mon Jun 08 21:30:28 2015 MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:25357
Mon Jun 08 21:30:28 2015 Need hold release from management interface, waiting...
Mon Jun 08 21:30:28 2015 MANAGEMENT: Client connected from [AF_INET]127.0.0.1:25357
Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'state on'
Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'log all on'
Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'hold off'
Mon Jun 08 21:30:28 2015 MANAGEMENT: CMD 'hold release'
Mon Jun 08 21:30:29 2015 Control Channel Authentication: tls-auth using INLINE static key file
Mon Jun 08 21:30:29 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:29 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:29 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]
Mon Jun 08 21:30:29 2015 UDPv4 link local: [undef]
Mon Jun 08 21:30:29 2015 UDPv4 link remote: [AF_INET]149.255.33.154:443
Mon Jun 08 21:30:29 2015 MANAGEMENT: >STATE:1433813429,WAIT,,,
Mon Jun 08 21:30:29 2015 MANAGEMENT: >STATE:1433813429,AUTH,,,
Mon Jun 08 21:30:29 2015 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=b075da57 bf7825fe
Mon Jun 08 21:30:29 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jun 08 21:30:29 2015 Validating certificate key usage
Mon Jun 08 21:30:29 2015 ++ Certificate has key usage  00a0, expects 00a0
Mon Jun 08 21:30:29 2015 VERIFY KU OK
Mon Jun 08 21:30:29 2015 Validating certificate extended key usage
Mon Jun 08 21:30:29 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jun 08 21:30:29 2015 VERIFY EKU OK
Mon Jun 08 21:30:29 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jun 08 21:30:40 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jun 08 21:30:40 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:40 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jun 08 21:30:40 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:30:40 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jun 08 21:30:40 2015 [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443
Mon Jun 08 21:30:41 2015 MANAGEMENT: >STATE:1433813441,GET_CONFIG,,,
Mon Jun 08 21:30:42 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jun 08 21:30:42 2015 AUTH: Received control message: AUTH_FAILED
Mon Jun 08 21:30:42 2015 SIGUSR1[soft,auth-failure] received, process restarting
Mon Jun 08 21:30:42 2015 MANAGEMENT: >STATE:1433813442,RECONNECTING,auth-failure,,
Mon Jun 08 21:30:42 2015 Restart pause, 2 second(s)
Mon Jun 08 21:30:44 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]
Mon Jun 08 21:30:44 2015 UDPv4 link local: [undef]
Mon Jun 08 21:30:44 2015 UDPv4 link remote: [AF_INET]149.255.33.154:443
Mon Jun 08 21:30:44 2015 MANAGEMENT: >STATE:1433813444,WAIT,,,
Mon Jun 08 21:30:44 2015 MANAGEMENT: >STATE:1433813444,AUTH,,,
Mon Jun 08 21:30:44 2015 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=c72cc530 3d433d05
Mon Jun 08 21:30:44 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jun 08 21:30:44 2015 Validating certificate key usage
Mon Jun 08 21:30:44 2015 ++ Certificate has key usage  00a0, expects 00a0
Mon Jun 08 21:30:44 2015 VERIFY KU OK
Mon Jun 08 21:30:44 2015 Validating certificate extended key usage
Mon Jun 08 21:30:44 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jun 08 21:30:44 2015 VERIFY EKU OK
Mon Jun 08 21:30:44 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jun 08 21:31:04 2015 MANAGEMENT: CMD 'signal SIGHUP'
Mon Jun 08 21:31:04 2015 SIGHUP[hard,] received, process restarting
Mon Jun 08 21:31:04 2015 MANAGEMENT: >STATE:1433813464,RECONNECTING,SIGHUP,,
Mon Jun 08 21:31:04 2015 OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [PKCS11] [iPv6] built on Mar 19 2015
Mon Jun 08 21:31:04 2015 library versions: OpenSSL 1.0.1m 19 Mar 2015, LZO 2.08
Mon Jun 08 21:31:04 2015 Restart pause, 2 second(s)
Mon Jun 08 21:31:06 2015 Control Channel Authentication: tls-auth using INLINE static key file
Mon Jun 08 21:31:06 2015 Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:31:06 2015 Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:31:06 2015 Socket Buffers: R=[8192->131072] S=[8192->131072]
Mon Jun 08 21:31:06 2015 UDPv4 link local: [undef]
Mon Jun 08 21:31:06 2015 UDPv4 link remote: [AF_INET]149.255.33.154:443
Mon Jun 08 21:31:06 2015 MANAGEMENT: >STATE:1433813466,WAIT,,,
Mon Jun 08 21:31:06 2015 MANAGEMENT: >STATE:1433813466,AUTH,,,
Mon Jun 08 21:31:06 2015 TLS: Initial packet from [AF_INET]149.255.33.154:443, sid=d6c643df 45f4d09e
Mon Jun 08 21:31:07 2015 VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
Mon Jun 08 21:31:07 2015 Validating certificate key usage
Mon Jun 08 21:31:07 2015 ++ Certificate has key usage  00a0, expects 00a0
Mon Jun 08 21:31:07 2015 VERIFY KU OK
Mon Jun 08 21:31:07 2015 Validating certificate extended key usage
Mon Jun 08 21:31:07 2015 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
Mon Jun 08 21:31:07 2015 VERIFY EKU OK
Mon Jun 08 21:31:07 2015 VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
Mon Jun 08 21:31:12 2015 Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jun 08 21:31:12 2015 Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:31:12 2015 Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
Mon Jun 08 21:31:12 2015 Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
Mon Jun 08 21:31:12 2015 Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA
Mon Jun 08 21:31:12 2015 [server] Peer Connection Initiated with [AF_INET]149.255.33.154:443
Mon Jun 08 21:31:13 2015 MANAGEMENT: >STATE:1433813473,GET_CONFIG,,,
Mon Jun 08 21:31:14 2015 SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
Mon Jun 08 21:31:14 2015 PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.9.255 255.255.0.0'
Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: timers and/or timeouts modified
Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: LZO parms modified
Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: --ifconfig/up options modified
Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: route options modified
Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: route-related options modified
Mon Jun 08 21:31:14 2015 OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
Mon Jun 08 21:31:14 2015 do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
Mon Jun 08 21:31:14 2015 MANAGEMENT: >STATE:1433813474,ASSIGN_IP,,10.4.9.255,
Mon Jun 08 21:31:14 2015 open_tun, tt->ipv6=0
Mon Jun 08 21:31:14 2015 TAP-WIN32 device [Local Area Connection 3] opened: \\.\Global\{9F8DF516-957E-4A12-8ECD-BF34E84A2772}.tap
Mon Jun 08 21:31:14 2015 TAP-Windows Driver Version 9.21 
Mon Jun 08 21:31:14 2015 Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.9.255/255.255.0.0 [sUCCEEDED]
Mon Jun 08 21:31:14 2015 Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.9.255/255.255.0.0 on interface {9F8DF516-957E-4A12-8ECD-BF34E84A2772} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
Mon Jun 08 21:31:14 2015 Successful ARP Flush on interface [17] {9F8DF516-957E-4A12-8ECD-BF34E84A2772}
Mon Jun 08 21:31:19 2015 TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 149.255.33.154 MASK 255.255.255.255 192.168.1.1
Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]
Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 11
Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=10 and dwForwardType=4
Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]
Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]
Mon Jun 08 21:31:19 2015 C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
Mon Jun 08 21:31:19 2015 ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
Mon Jun 08 21:31:19 2015 Route addition via IPAPI succeeded [adaptive]
Mon Jun 08 21:31:19 2015 Initialization Sequence Completed
Mon Jun 08 21:31:19 2015 MANAGEMENT: >STATE:1433813479,CONNECTED,SUCCESS,10.4.9.255,149.255.33.154
Mon Jun 08 21:35:53 2015 SIGTERM received, sending exit notification to peer
Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 149.255.33.154 MASK 255.255.255.255 192.168.1.1
Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]
Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]
Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]
Mon Jun 08 21:35:58 2015 C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
Mon Jun 08 21:35:58 2015 Route deletion via IPAPI succeeded [adaptive]
Mon Jun 08 21:35:58 2015 Closing TUN/TAP interface
Mon Jun 08 21:35:58 2015 SIGTERM[soft,exit-with-notification] received, process exiting
Mon Jun 08 21:35:58 2015 MANAGEMENT: >STATE:1433813758,EXITING,exit-with-notification,,

Share this post


Link to post

Try to not bind it to an interface. At least it helped me (qBittorrent).


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...