ghostp 5 Posted ... Hello, since a few days I get weird disconnections when I'm going via a SSL Tunnel. Why's that and am I compromised after this disconnection? Thanks in advance for your help! I 2016.01.24 18:26:52 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64. 2016.01.24 18:26:52 - Reading options from C:\Users\xxxx\AppData\Local\AirVPN\AirVPN.xml. 2016.01.24 18:26:52 - Data Path: C:\Users\xxxx\AppData\Local\AirVPN. 2016.01.24 18:26:52 - App Path: C:\Program Files\AirVPN. 2016.01.24 18:26:52 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe. 2016.01.24 18:26:52 - Command line arguments (1): path="home". 2016.01.24 18:26:52 - Operating System: Microsoft Windows NT 6.2.9200.0. 2016.01.24 18:26:52 - Updating systems & servers data ...I 2016.01.24 18:26:53 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1I 2016.01.24 18:26:53 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)I 2016.01.24 18:26:53 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)I 2016.01.24 18:26:53 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)! 2016.01.24 18:26:53 - Ready. 2016.01.24 18:26:53 - Systems & servers data update completedI 2016.01.24 18:27:02 - Checking login ...! 2016.01.24 18:27:02 - Logged in.I 2016.01.24 18:27:05 - Session starting.I 2016.01.24 18:27:05 - IPv6 disabled.I 2016.01.24 18:27:05 - Checking authorization ...! 2016.01.24 18:27:06 - Connecting to Alcyone (Netherlands, Alblasserdam). 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Reading configuration from file C:\Users\ghost\AppData\Local\AirVPN\8568e89d3fa4716c29f3f34fe81aa9760538b25bde372f7d325f43989e0023d3.tmp.ssl. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: UTF-8 byte order mark not detected. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[ui]: Initializing service [openvpn]. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[ui]: Configuration successful. 2016.01.24 18:27:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.24 18:27:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.24 18:27:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.24 18:27:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49578. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: Failover strategy: round-robin. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: s_connect: connecting 213.152.161.118:443. 2016.01.24 18:27:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 18:27:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 18:27:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.24 18:27:06 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:14257 [nonblock]. 2016.01.24 18:27:06 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:14257. 2016.01.24 18:27:06 - OpenVPN > TCPv4_CLIENT link local: [undef]. 2016.01.24 18:27:06 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:14257. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: s_connect: connected 213.152.161.118:443. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: Service [openvpn] connected remote server from 192.168.178.38:49579. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: SNI: sending servername: 213.152.161.118. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG6[0]: CERT: Locally installed certificate matched. 2016.01.24 18:27:06 - SSL > 2016.01.24 18:27:06 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org. 2016.01.24 18:27:07 - SSL > 2016.01.24 18:27:07 LOG6[0]: SSL connected: new session negotiated. 2016.01.24 18:27:07 - SSL > 2016.01.24 18:27:07 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption). 2016.01.24 18:27:07 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:14257, sid=061ed504 076718a3. 2016.01.24 18:27:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.24 18:27:07 - OpenVPN > Validating certificate key usage. 2016.01.24 18:27:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.24 18:27:07 - OpenVPN > VERIFY KU OK. 2016.01.24 18:27:07 - OpenVPN > Validating certificate extended key usage. 2016.01.24 18:27:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.24 18:27:07 - OpenVPN > VERIFY EKU OK. 2016.01.24 18:27:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.24 18:27:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.24 18:27:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 18:27:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.24 18:27:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 18:27:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.24 18:27:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:14257. 2016.01.24 18:27:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.24 18:27:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.172 255.255.0.0'. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.24 18:27:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.24 18:27:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.24 18:27:10 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.24 18:27:10 - OpenVPN > TAP-WIN32 device [LAN-Verbindung] opened: \\.\Global\{9177F3DF-D2F7-432D-90C0-9E13F6A18897}.tap. 2016.01.24 18:27:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.24 18:27:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.172/255.255.0.0 [sUCCEEDED]. 2016.01.24 18:27:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.172/255.255.0.0 on interface {9177F3DF-D2F7-432D-90C0-9E13F6A18897} [DHCP-serv: 10.50.255.254, lease-time: 31536000]. 2016.01.24 18:27:10 - OpenVPN > Successful ARP Flush on interface [10] {9177F3DF-D2F7-432D-90C0-9E13F6A18897}. 2016.01.24 18:27:15 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.178.1. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.178.1 MASK 255.255.255.255 192.168.178.1 IF 2. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.01.24 18:27:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.118 MASK 255.255.255.255 192.168.178.1. 2016.01.24 18:27:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4. 2016.01.24 18:27:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]. 2016.01.24 18:27:15 - Starting Management Interface. 2016.01.24 18:27:15 - OpenVPN > Initialization Sequence CompletedI 2016.01.24 18:27:15 - DNS of a network adapter forced (Qualcomm Atheros AR946x Wireless Network Adapter)I 2016.01.24 18:27:15 - DNS of a network adapter forced (TAP-Windows Adapter V9)I 2016.01.24 18:27:15 - Flushing DNSI 2016.01.24 18:27:15 - Checking routeI 2016.01.24 18:27:15 - Checking DNS! 2016.01.24 18:27:16 - Connected.. 2016.01.24 18:27:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100. 2016.01.24 18:27:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info. 2016.01.24 18:57:02 - Updating systems & servers data .... 2016.01.24 18:57:03 - Systems & servers data update completed. 2016.01.24 19:27:08 - OpenVPN > TLS: soft reset sec=0 bytes=8542125572/0 pkts=10283502/0. 2016.01.24 19:27:08 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.24 19:27:08 - OpenVPN > Validating certificate key usage. 2016.01.24 19:27:08 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.24 19:27:08 - OpenVPN > VERIFY KU OK. 2016.01.24 19:27:08 - OpenVPN > Validating certificate extended key usage. 2016.01.24 19:27:08 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.24 19:27:08 - OpenVPN > VERIFY EKU OK. 2016.01.24 19:27:08 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.24 19:27:10 - Updating systems & servers data .... 2016.01.24 19:27:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.24 19:27:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 19:27:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.24 19:27:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 19:27:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.24 19:27:11 - Systems & servers data update completed. 2016.01.24 19:57:18 - Updating systems & servers data .... 2016.01.24 19:57:19 - Systems & servers data update completedI 2016.01.24 20:27:08 - Renewing TLS key. 2016.01.24 20:27:08 - OpenVPN > TLS: tls_process: killed expiring key. 2016.01.24 20:27:10 - OpenVPN > TLS: soft reset sec=0 bytes=14910385123/0 pkts=16773488/0. 2016.01.24 20:27:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.24 20:27:11 - OpenVPN > Validating certificate key usage. 2016.01.24 20:27:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.24 20:27:11 - OpenVPN > VERIFY KU OK. 2016.01.24 20:27:11 - OpenVPN > Validating certificate extended key usage. 2016.01.24 20:27:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.24 20:27:11 - OpenVPN > VERIFY EKU OK. 2016.01.24 20:27:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.24 20:27:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.24 20:27:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 20:27:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.24 20:27:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.24 20:27:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.24 20:27:24 - Updating systems & servers data .... 2016.01.24 20:27:26 - Systems & servers data update completed. 2016.01.24 20:46:04 - SSL > 2016.01.24 20:46:04 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054). 2016.01.24 20:46:04 - OpenVPN > Connection reset, restarting [-1]. 2016.01.24 20:46:04 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting! 2016.01.24 20:46:04 - Disconnecting. 2016.01.24 20:46:04 - OpenVPN > Restart pause, 5 second(s). 2016.01.24 20:46:04 - SSL > 2016.01.24 20:46:04 LOG5[0]: Connection reset: 1440511055 byte(s) sent to SSL, 25386076627 byte(s) sent to socket. 2016.01.24 20:46:04 - Management - Send 'signal SIGTERM'. 2016.01.24 20:46:04 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'. 2016.01.24 20:46:04 - OpenVPN > MANAGEMENT: Client disconnected. 2016.01.24 20:46:04 - OpenVPN > Assertion failed at misc.c:779. 2016.01.24 20:46:04 - OpenVPN > Exiting due to fatal error. 2016.01.24 20:46:04 - Connection terminated.I 2016.01.24 20:46:05 - DNS of a network adapter restored to original settings (Qualcomm Atheros AR946x Wireless Network Adapter)I 2016.01.24 20:46:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9) Quote Share this post Link to post