anonnon 2 Posted ... I joined up a few days ago and since then I've had a problem where the connection is lost and the AirVPN client goes through a loop of trying to reconnect and failing. The problem in the logs appears to be "[server] Inactivity timeout (--ping-restart), restarting". I can eventually reconnect if I exit the AirVPN client and disable then re-enable the TAP adaptor. But the disconnection problem returns after a while. I have tried a variety of fixes as suggested on this forum and others; such as trying different versions of the AirVPN client, trying the OpenVPN client, changing settings and configs, trying TCP protocol, etc. I use the Kaspersky firewall and it doesn't seem to be interfering with the connection. I was hoping that someone on the forum could help me out with this. I'm not really a technical person and I'm getting frustrated with the disconnections. Any help would be appreciated. Here is the log from the most recent disconnection / reconnection loop: ! 2015.08.21 12:27:29 - Ready. 2015.08.21 12:27:31 - Systems & servers data update completedI 2015.08.21 12:27:42 - Session starting.I 2015.08.21 12:27:43 - Network adapter DHCP switched to static (Linksys AE1200)I 2015.08.21 12:27:46 - IPv6 disabled.I 2015.08.21 12:27:46 - Checking authorization ...! 2015.08.21 12:27:47 - Connecting to Kraz (Canada, Toronto, Ontario). 2015.08.21 12:27:47 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015. 2015.08.21 12:27:47 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2015.08.21 12:27:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.08.21 12:27:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.08.21 12:27:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 12:27:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 12:27:48 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]. 2015.08.21 12:27:48 - OpenVPN > UDPv4 link local: [undef]. 2015.08.21 12:27:48 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.94.61:443. 2015.08.21 12:27:48 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.94.61:443, sid=7438bc71 0687df69. 2015.08.21 12:27:49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.08.21 12:27:49 - OpenVPN > Validating certificate key usage. 2015.08.21 12:27:49 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.08.21 12:27:49 - OpenVPN > VERIFY KU OK. 2015.08.21 12:27:49 - OpenVPN > Validating certificate extended key usage. 2015.08.21 12:27:49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.08.21 12:27:49 - OpenVPN > VERIFY EKU OK. 2015.08.21 12:27:49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.08.21 12:27:57 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.21 12:27:57 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 12:27:57 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.21 12:27:57 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 12:27:57 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.08.21 12:27:57 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.94.61:443. 2015.08.21 12:27:59 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.08.21 12:28:00 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.28.59 255.255.0.0'. 2015.08.21 12:28:00 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.08.21 12:28:00 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.08.21 12:28:00 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.08.21 12:28:00 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.08.21 12:28:00 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2015.08.21 12:28:00 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.08.21 12:28:00 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.08.21 12:28:00 - OpenVPN > open_tun, tt->ipv6=0. 2015.08.21 12:28:00 - OpenVPN > TAP-WIN32 device [Local Area Connection 2] opened: \\.\Global\{B0C49080-B81F-4841-AE8A-9B62005C876B}.tap. 2015.08.21 12:28:00 - OpenVPN > TAP-Windows Driver Version 9.21. 2015.08.21 12:28:00 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.28.59/255.255.0.0 [sUCCEEDED]. 2015.08.21 12:28:00 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.28.59/255.255.0.0 on interface {B0C49080-B81F-4841-AE8A-9B62005C876B} [DHCP-serv: 10.4.255.254, lease-time: 31536000]. 2015.08.21 12:28:00 - OpenVPN > Successful ARP Flush on interface [31] {B0C49080-B81F-4841-AE8A-9B62005C876B}. 2015.08.21 12:28:05 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up. 2015.08.21 12:28:05 - OpenVPN > C:\Windows\system32\route.exe ADD 199.19.94.61 MASK 255.255.255.255 192.168.1.1. 2015.08.21 12:28:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4. 2015.08.21 12:28:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.21 12:28:05 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1. 2015.08.21 12:28:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2015.08.21 12:28:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.21 12:28:05 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1. 2015.08.21 12:28:05 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2015.08.21 12:28:05 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2015.08.21 12:28:05 - Starting Management Interface. 2015.08.21 12:28:05 - OpenVPN > Initialization Sequence CompletedI 2015.08.21 12:28:05 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2015.08.21 12:28:07 - DNS of a network adapter forced (Linksys AE1200)I 2015.08.21 12:28:07 - Flushing DNSI 2015.08.21 12:28:07 - Checking routeI 2015.08.21 12:28:10 - Checking DNS! 2015.08.21 12:28:11 - Connected.. 2015.08.21 12:28:11 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2015.08.21 12:28:11 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2015.08.21 12:58:14 - Updating systems & servers data .... 2015.08.21 12:58:17 - Systems & servers data update completed. 2015.08.21 13:18:55 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting. 2015.08.21 13:18:55 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting. 2015.08.21 13:18:55 - OpenVPN > Restart pause, 2 second(s)! 2015.08.21 13:18:55 - Disconnecting. 2015.08.21 13:18:55 - Management - Send 'signal SIGTERM'. 2015.08.21 13:18:55 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2015.08.21 13:18:55 - OpenVPN > MANAGEMENT: Client disconnected. 2015.08.21 13:18:55 - OpenVPN > Assertion failed at misc.c:788. 2015.08.21 13:18:55 - OpenVPN > Exiting due to fatal error. 2015.08.21 13:18:55 - Connection terminated.I 2015.08.21 13:18:55 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)I 2015.08.21 13:18:55 - DNS of a network adapter restored to original settings (Linksys AE1200)I 2015.08.21 13:19:38 - Checking authorization ...W 2015.08.21 13:21:02 - Authorization check failed, continue anyway ({1])! 2015.08.21 13:21:02 - Connecting to Grumium (Canada, Toronto, Ontario). 2015.08.21 13:21:02 - OpenVPN > OpenVPN 2.3.6 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Jan 12 2015. 2015.08.21 13:21:02 - OpenVPN > library versions: OpenSSL 1.0.1k 8 Jan 2015, LZO 2.08. 2015.08.21 13:21:02 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2015.08.21 13:21:03 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2015.08.21 13:21:03 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 13:21:03 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 13:21:03 - OpenVPN > Socket Buffers: R=[8192->8192] S=[8192->8192]. 2015.08.21 13:21:03 - OpenVPN > UDPv4 link local: [undef]. 2015.08.21 13:21:03 - OpenVPN > UDPv4 link remote: [AF_INET]199.19.95.187:443. 2015.08.21 13:21:03 - OpenVPN > TLS: Initial packet from [AF_INET]199.19.95.187:443, sid=62b5f395 1d6f2ef4. 2015.08.21 13:21:04 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2015.08.21 13:21:04 - OpenVPN > Validating certificate key usage. 2015.08.21 13:21:04 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2015.08.21 13:21:04 - OpenVPN > VERIFY KU OK. 2015.08.21 13:21:04 - OpenVPN > Validating certificate extended key usage. 2015.08.21 13:21:04 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2015.08.21 13:21:04 - OpenVPN > VERIFY EKU OK. 2015.08.21 13:21:04 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2015.08.21 13:21:13 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.21 13:21:13 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 13:21:13 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2015.08.21 13:21:13 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2015.08.21 13:21:13 - OpenVPN > Control Channel: TLSv1, cipher TLSv1/SSLv3 DHE-RSA-AES256-SHA, 4096 bit RSA. 2015.08.21 13:21:13 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]199.19.95.187:443. 2015.08.21 13:21:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2015.08.21 13:21:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.27.73 255.255.0.0'. 2015.08.21 13:21:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2015.08.21 13:21:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2015.08.21 13:21:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2015.08.21 13:21:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2015.08.21 13:21:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2015.08.21 13:21:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2015.08.21 13:21:16 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2015.08.21 13:21:16 - OpenVPN > open_tun, tt->ipv6=0. 2015.08.21 13:21:16 - OpenVPN > CreateFile failed on TAP device: \\.\Global\{B0C49080-B81F-4841-AE8A-9B62005C876B}.tap. 2015.08.21 13:21:16 - OpenVPN > All TAP-Windows adapters on this system are currently in use.. 2015.08.21 13:21:16 - OpenVPN > Exiting due to fatal error! 2015.08.21 13:21:16 - Disconnecting. 2015.08.21 13:21:16 - Connection terminated.I 2015.08.21 13:21:19 - Checking authorization ... Thanks! Quote Share this post Link to post
Nertoslep 0 Posted ... "OpenVPN > All TAP-Windows adapters on this system are currently in use" is well know error but mostly it touches win 8/10 systems.For few days i have had it on machine with win7 64bit after upgradeing to 2.9 client. I tried move to 2.10.x, and even installing full stand alone openvpn - didn't helped.So I downgraded to 2.8 and problem is gone, working like a charm. Quote Share this post Link to post
anonnon 2 Posted ... Thanks for your help Nertoslep. So installing 2.8 might resolve the problem reconnecting. Any idea how to prevent the disconnection problem? I think the problem is "[server] Inactivity timeout (--ping-restart), restarting". I've tried a few things already, but no luck. Quote Share this post Link to post