Jump to content
Not connected, Your IP: 54.87.61.215
GIUUcfUSurP6Df5RetWGpf6Lse

VPN loses connection during high network demand

Recommended Posts

I'm on Windows 10 Professional 64bit, using the Eddie client.

 

During regular intervals, but most noticeably when streaming or torrenting, the network speed will go to zero and after a few seconds, the Eddie client will disconnect (icon turns grey). Network lock is on and the client is set to reconnect when the connection is lost, but this takes time and many times YouTube (for example) will just return an error because I've disconnected and reconnected from a different server. Another weird thing about YouTube is that the disconnection normally happens when I choose the 720p or 1080p video from the HTML5 player's settings button.

 

The time between first losing connection to regaining it fully takes about 45 seconds and will happen several times during a 2 minute video, if the entire video can be streamed at all.

 

I've included a screenshot of what my torrent speed looks like as an example of what I'm dealing with. There is a clear pattern to what is going on. Like I said above, it takes about 45 seconds from losing connection to reconnecting, but with torrents this can be much longer due to update intervals of the trackers.Ba3Bgay.jpg

 

I should point out that this doesn't just happen when streaming or torrenting, but it is most noticeable then due to the otherwise constant stream of data. I also notice it occasionally when opening new tabs or clicking links in my browser.

 

Thanks for any help. It's much appreciated. I've used AirVPN for around a year now and until recently haven't had many problems

Share this post


Link to post

Would you be so kind to paste your logs into spoiler tags? They might help a bit more.

[spoiler]logs[/spoiler]

does this

 

logs

 

Alternatively, you can click on the third icon from the left in this editor window, select spoiler from the drop down menu and paste your logs in there.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Absolutely. I cleared the logs and went to play a video and the problem occurred again twice. I'm connecting through an SSH tunnel.

 

The logs are as follows:

 

. 2016.01.26 13.13.51 - SSH > Network error: Software caused connection abort
. 2016.01.26 13.13.51 - OpenVPN > Connection reset, restarting [0]
. 2016.01.26 13.13.51 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.01.26 13.13.51 - SSH > FATAL ERROR: Network error: Software caused connection abort
. 2016.01.26 13.13.51 - OpenVPN > Restart pause, 5 second(s)
! 2016.01.26 13.13.51 - Disconnecting
. 2016.01.26 13.13.51 - Management - Send 'signal SIGTERM'
. 2016.01.26 13.13.51 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.26 13.13.51 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.01.26 13.13.51 - OpenVPN > Assertion failed at misc.c:779
. 2016.01.26 13.13.51 - OpenVPN > Exiting due to fatal error
. 2016.01.26 13.13.52 - Connection terminated.
I 2016.01.26 13.13.53 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.01.26 13.13.53 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.01.26 13.13.56 - Checking authorization ...
! 2016.01.26 13.13.56 - Connecting to Salm (Netherlands, Alblasserdam)
. 2016.01.26 13.13.56 - SSH > Looking up host "213.152.161.21"
. 2016.01.26 13.13.56 - SSH > Connecting to 213.152.161.21 port 22
. 2016.01.26 13.13.56 - SSH > Server version: SSH-2.0-OpenSSH_6.7p1 Debian-5
. 2016.01.26 13.13.56 - SSH > Using SSH protocol version 2
. 2016.01.26 13.13.56 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.63
. 2016.01.26 13.13.56 - SSH > Doing Diffie-Hellman group exchange
. 2016.01.26 13.13.56 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.01.26 13.13.57 - SSH > Host key fingerprint is:
. 2016.01.26 13.13.57 - SSH > ssh-rsa 2048 dd:a3:6f:80:fe:8f:45:da:6d:4a: :6f:8b:e0:41:ec
. 2016.01.26 13.13.57 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.01.26 13.13.57 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.01.26 13.13.57 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.01.26 13.13.57 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.01.26 13.13.57 - SSH > Reading private key file "C:\Users\USER\AppData\Local\AirVPN\13622b2b53e02002230fc63b3c163c9e430baaa35eb8a375748cc14eab4a0cd3.tmp.ppk"
. 2016.01.26 13.13.57 - SSH > Using username "sshtunnel".
. 2016.01.26 13.13.57 - SSH > Offered public key
. 2016.01.26 13.13.57 - SSH > Offer of public key accepted
. 2016.01.26 13.13.57 - SSH > Authenticating with public key ""
. 2016.01.26 13.13.57 - SSH > Sent public key signature
. 2016.01.26 13.13.57 - SSH > Access granted
. 2016.01.26 13.13.57 - SSH > Local port 20332 forwarding to 127.0.0.1:2018
. 2016.01.26 13.13.57 - SSH > Remote debug message: Pty allocation disabled.
. 2016.01.26 13.13.57 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.01.26 13.13.57 - SSH > Remote debug message: Forced command.
. 2016.01.26 13.13.57 - SSH > Remote debug message: Pty allocation disabled.
. 2016.01.26 13.13.57 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.01.26 13.13.57 - SSH > Remote debug message: Forced command.
. 2016.01.26 13.13.57 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.26 13.13.57 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.26 13.13.57 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.26 13.13.57 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.26 13.13.57 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.13.57 - SSH > Opening connection to 127.0.0.1:2018 for forwarding
. 2016.01.26 13.13.57 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.13.57 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.26 13.13.57 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:20332 [nonblock]
. 2016.01.26 13.13.57 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:20332
. 2016.01.26 13.13.57 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.26 13.13.57 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:20332
. 2016.01.26 13.13.57 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:20332, sid=9ce11865 1bc19cf2
. 2016.01.26 13.13.58 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.26 13.13.58 - OpenVPN > Validating certificate key usage
. 2016.01.26 13.13.58 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.26 13.13.58 - OpenVPN > VERIFY KU OK
. 2016.01.26 13.13.58 - OpenVPN > Validating certificate extended key usage
. 2016.01.26 13.13.58 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.26 13.13.58 - OpenVPN > VERIFY EKU OK
. 2016.01.26 13.13.58 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.26 13.13.59 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.26 13.13.59 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.13.59 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.26 13.13.59 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.13.59 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.26 13.13.59 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:20332
. 2016.01.26 13.14.01 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.26 13.14.01 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.154 255.255.0.0'
. 2016.01.26 13.14.01 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.26 13.14.01 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.26 13.14.01 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.26 13.14.01 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.26 13.14.01 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.26 13.14.01 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.26 13.14.01 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.26 13.14.01 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.26 13.14.02 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.26 13.14.02 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.26 13.14.02 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.154/255.255.0.0 [sUCCEEDED]
. 2016.01.26 13.14.02 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.154/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.26 13.14.02 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.26 13.14.06 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.26 13.14.06 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.26 13.14.06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.26 13.14.06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.14.06 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.14.06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.14.06 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.26 13.14.06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.26 13.14.06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.14.06 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.14.06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.14.06 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.26 13.14.06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.01.26 13.14.06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.14.06 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.14.06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.14.06 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.26 13.14.06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.01.26 13.14.06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.14.06 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.14.06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.14.06 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.21 MASK 255.255.255.255 192.168.1.1
. 2016.01.26 13.14.06 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.26 13.14.06 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.14.06 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.14.06 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.14.06 - Starting Management Interface
. 2016.01.26 13.14.06 - OpenVPN > Initialization Sequence Completed
I 2016.01.26 13.14.06 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.26 13.14.06 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.26 13.14.06 - Flushing DNS
I 2016.01.26 13.14.06 - Checking route
I 2016.01.26 13.14.31 - Checking DNS
! 2016.01.26 13.14.43 - Connected.
. 2016.01.26 13.14.43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.01.26 13.14.43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.01.26 13.16.29 - OpenVPN > Connection reset, restarting [0]
. 2016.01.26 13.16.29 - SSH > Network error: Software caused connection abort
. 2016.01.26 13.16.29 - SSH > FATAL ERROR: Network error: Software caused connection abort
. 2016.01.26 13.16.29 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.01.26 13.16.29 - OpenVPN > Restart pause, 5 second(s)
! 2016.01.26 13.16.29 - Disconnecting
. 2016.01.26 13.16.29 - Management - Send 'signal SIGTERM'
. 2016.01.26 13.16.29 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.26 13.16.29 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.01.26 13.16.29 - OpenVPN > Assertion failed at misc.c:779
. 2016.01.26 13.16.29 - OpenVPN > Exiting due to fatal error
. 2016.01.26 13.16.29 - Connection terminated.
I 2016.01.26 13.16.31 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.01.26 13.16.31 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.01.26 13.16.36 - Checking authorization ...
! 2016.01.26 13.16.36 - Connecting to Gienah (Netherlands, Alblasserdam)
. 2016.01.26 13.16.36 - SSH > Looking up host "213.152.162.95"
. 2016.01.26 13.16.36 - SSH > Connecting to 213.152.162.95 port 22
. 2016.01.26 13.16.36 - SSH > Server version: SSH-2.0-OpenSSH_6.7p1 Debian-5
. 2016.01.26 13.16.36 - SSH > Using SSH protocol version 2
. 2016.01.26 13.16.36 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.63
. 2016.01.26 13.16.36 - SSH > Doing Diffie-Hellman group exchange
. 2016.01.26 13.16.36 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.01.26 13.16.37 - SSH > Host key fingerprint is:
. 2016.01.26 13.16.37 - SSH > ssh-rsa 2048 :7e:46:ed:4b:d7:82:d8:55:63:cc:68:b2:ba:5b:2c
. 2016.01.26 13.16.37 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.01.26 13.16.37 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.01.26 13.16.37 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.01.26 13.16.37 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.01.26 13.16.37 - SSH > Reading private key file "C:\Users\USER\AppData\Local\AirVPN\7833a26ec1f92e76bc7ac3e3e44b2b333cc2525cf6350a87f661d390136bd8f4.tmp.ppk"
. 2016.01.26 13.16.37 - SSH > Using username "sshtunnel".
. 2016.01.26 13.16.37 - SSH > Offered public key
. 2016.01.26 13.16.37 - SSH > Offer of public key accepted
. 2016.01.26 13.16.37 - SSH > Authenticating with public key ""
. 2016.01.26 13.16.37 - SSH > Sent public key signature
. 2016.01.26 13.16.39 - SSH > Access granted
. 2016.01.26 13.16.39 - SSH > Local port 63508 forwarding to 127.0.0.1:2018
. 2016.01.26 13.16.39 - SSH > Remote debug message: Pty allocation disabled.
. 2016.01.26 13.16.39 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.01.26 13.16.39 - SSH > Remote debug message: Forced command.
. 2016.01.26 13.16.39 - SSH > Remote debug message: Pty allocation disabled.
. 2016.01.26 13.16.39 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.01.26 13.16.39 - SSH > Remote debug message: Forced command.
. 2016.01.26 13.16.39 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.26 13.16.39 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.26 13.16.39 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.26 13.16.39 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.26 13.16.39 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.16.39 - SSH > Opening connection to 127.0.0.1:2018 for forwarding
. 2016.01.26 13.16.39 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.16.39 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.26 13.16.39 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:63508 [nonblock]
. 2016.01.26 13.16.39 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:63508
. 2016.01.26 13.16.39 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.26 13.16.39 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:63508
. 2016.01.26 13.16.39 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:63508, sid=e8e77b86 ae65d1b5
. 2016.01.26 13.16.39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.26 13.16.39 - OpenVPN > Validating certificate key usage
. 2016.01.26 13.16.39 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.26 13.16.39 - OpenVPN > VERIFY KU OK
. 2016.01.26 13.16.39 - OpenVPN > Validating certificate extended key usage
. 2016.01.26 13.16.39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.26 13.16.39 - OpenVPN > VERIFY EKU OK
. 2016.01.26 13.16.39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.26 13.16.41 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.26 13.16.41 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.16.41 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.26 13.16.41 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.16.41 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.26 13.16.41 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:63508
. 2016.01.26 13.16.43 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.26 13.16.44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.55 255.255.0.0'
. 2016.01.26 13.16.44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.26 13.16.44 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.26 13.16.44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.26 13.16.44 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.26 13.16.44 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.26 13.16.44 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.26 13.16.44 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.26 13.16.44 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.26 13.16.45 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.26 13.16.45 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.26 13.16.45 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.55/255.255.0.0 [sUCCEEDED]
. 2016.01.26 13.16.45 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.55/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.26 13.16.45 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.26 13.16.50 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.26 13.16.50 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.26 13.16.50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.26 13.16.50 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.16.50 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.16.50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.16.50 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.26 13.16.50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.26 13.16.50 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.16.50 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.16.50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.16.50 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.26 13.16.50 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.01.26 13.16.50 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.16.50 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.16.50 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.16.50 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.26 13.16.51 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.01.26 13.16.51 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.26 13.16.51 - OpenVPN > Route addition fallback to route.exe
. 2016.01.26 13.16.51 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.26 13.16.51 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.95 MASK 255.255.255.255 192.168.1.1
. 2016.01.26 13.16.51 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.26 13.16.51 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.26 13.16.51 - Starting Management Interface
. 2016.01.26 13.16.51 - OpenVPN > Initialization Sequence Completed
I 2016.01.26 13.16.51 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.26 13.16.51 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.26 13.16.51 - Flushing DNS
I 2016.01.26 13.16.51 - Checking route

Share this post


Link to post
. 2016.01.26 13.16.29 - SSH > Network error: Software caused connection abort
[...]
. 2016.01.26 13.16.45 - OpenVPN > TAP-Windows Driver Version 9.21

Did you try connecting normally using UDP/443 for example?

Also, a few users reported issues with TAP 9.21 on Windows. You could also try downgrading to 9.9 to see if this solves the issue.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

I've tried all connection methods and SSH is actually the best case for me. When I've connected normally via either the "Automatic" setting or UDP 443, I sometimes see an upload speed of around 11MB/s shown in the "Overview" section of the Eddie client, but without being able to connect to anything. The problem with this is that the client doesn't realise something is wrong and as a result doesn't reset the connection. I'm assuming it's all related to the same issue.

 

I'll try to get TAP version 9.9 and report back.

EDIT: I'm trying to get TAP 9.9, but from the OpenVPN website, it says that the 9.9 version is for Windows XP only. Later versions of Windows should be using version 9.21

 

Thanks for looking into this!

Share this post


Link to post

I reinstalled the latest TAP driver from the openVPN and posted the logs below. So far I've had no issues, but I'll report back if I do.

 

Again, thanks for your help!

 

 

I 2016.01.26 13.42.13 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.01.26 13.42.13 - Reading options from C:\Users\USER\AppData\Local\AirVPN\AirVPN.xml
. 2016.01.26 13.42.13 - Data Path: C:\Users\USER\AppData\Local\AirVPN
. 2016.01.26 13.42.13 - App Path: C:\Program Files\AirVPN
. 2016.01.26 13.42.13 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.01.26 13.42.13 - Command line arguments (1): path="home"
. 2016.01.26 13.42.14 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.01.26 13.42.14 - Updating systems & servers data ...
W 2016.01.26 13.42.14 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.1.
E 2016.01.26 13.42.14 - OpenVPN Driver - Not available
I 2016.01.26 13.42.14 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.01.26 13.42.14 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.01.26 13.42.14 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.01.26 13.42.14 - Activation of Network Lock - Windows Firewall
. 2016.01.26 13.42.14 - Systems & servers data update completed
I 2016.01.26 13.42.17 - Session starting.
W 2016.01.26 13.42.17 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.1.
! 2016.01.26 13.42.17 - Installing tunnel driver
I 2016.01.26 13.42.21 - IPv6 disabled.
I 2016.01.26 13.42.23 - Checking authorization ...
! 2016.01.26 13.42.23 - Connecting to Alcyone (Netherlands, Alblasserdam)
. 2016.01.26 13.42.23 - SSH > Looking up host "213.152.161.118"
. 2016.01.26 13.42.23 - SSH > Connecting to 213.152.161.118 port 22
. 2016.01.26 13.42.23 - SSH > Server version: SSH-2.0-OpenSSH_6.7p1 Debian-5
. 2016.01.26 13.42.23 - SSH > Using SSH protocol version 2
. 2016.01.26 13.42.23 - SSH > We claim version: SSH-2.0-PuTTY_Release_0.63
. 2016.01.26 13.42.23 - SSH > Doing Diffie-Hellman group exchange
. 2016.01.26 13.42.23 - SSH > Doing Diffie-Hellman key exchange with hash SHA-256
. 2016.01.26 13.42.24 - SSH > Host key fingerprint is:
. 2016.01.26 13.42.24 - SSH > ssh-rsa 2048 15:97:29:ce:87:42:c4:19:a8:c4:96:e2:3f:e3:70:7d
. 2016.01.26 13.42.24 - SSH > Initialised AES-256 SDCTR client->server encryption
. 2016.01.26 13.42.24 - SSH > Initialised HMAC-SHA-256 client->server MAC algorithm
. 2016.01.26 13.42.24 - SSH > Initialised AES-256 SDCTR server->client encryption
. 2016.01.26 13.42.24 - SSH > Initialised HMAC-SHA-256 server->client MAC algorithm
. 2016.01.26 13.42.24 - SSH > Reading private key file "C:\Users\USER\AppData\Local\AirVPN\770bde8143adf0522481e47d860752b6d8febcdaba4aed9c742ed1c5c548e051.tmp.ppk"
. 2016.01.26 13.42.24 - SSH > Using username "sshtunnel".
. 2016.01.26 13.42.24 - SSH > Offered public key
. 2016.01.26 13.42.24 - SSH > Offer of public key accepted
. 2016.01.26 13.42.24 - SSH > Authenticating with public key ""
. 2016.01.26 13.42.24 - SSH > Sent public key signature
. 2016.01.26 13.42.24 - SSH > Access granted
. 2016.01.26 13.42.24 - SSH > Local port 15717 forwarding to 127.0.0.1:2018
. 2016.01.26 13.42.24 - SSH > Remote debug message: Pty allocation disabled.
. 2016.01.26 13.42.24 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.01.26 13.42.24 - SSH > Remote debug message: Forced command.
. 2016.01.26 13.42.24 - SSH > Remote debug message: Pty allocation disabled.
. 2016.01.26 13.42.24 - SSH > Remote debug message: X11 forwarding disabled.
. 2016.01.26 13.42.24 - SSH > Remote debug message: Forced command.
. 2016.01.26 13.42.24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.26 13.42.24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.26 13.42.24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.26 13.42.24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.26 13.42.24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.42.24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.42.24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.26 13.42.24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:15717 [nonblock]
. 2016.01.26 13.42.24 - SSH > Opening connection to 127.0.0.1:2018 for forwarding
. 2016.01.26 13.42.24 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:15717
. 2016.01.26 13.42.24 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.26 13.42.24 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:15717
. 2016.01.26 13.42.24 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:15717, sid=f5a58026 9be121ae
. 2016.01.26 13.42.25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.26 13.42.25 - OpenVPN > Validating certificate key usage
. 2016.01.26 13.42.25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.26 13.42.25 - OpenVPN > VERIFY KU OK
. 2016.01.26 13.42.25 - OpenVPN > Validating certificate extended key usage
. 2016.01.26 13.42.25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.26 13.42.25 - OpenVPN > VERIFY EKU OK
. 2016.01.26 13.42.25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.26 13.42.26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.26 13.42.26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.42.26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.26 13.42.26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.26 13.42.26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.26 13.42.26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:15717
. 2016.01.26 13.42.28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.26 13.42.28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.228 255.255.0.0'
. 2016.01.26 13.42.28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.26 13.42.28 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.26 13.42.28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.26 13.42.28 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.26 13.42.28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.26 13.42.28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.26 13.42.28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.26 13.42.28 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.26 13.42.29 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.26 13.42.29 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.26 13.42.29 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.228/255.255.0.0 [sUCCEEDED]
. 2016.01.26 13.42.29 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.228/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.26 13.42.29 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.26 13.42.33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.26 13.42.33 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.26 13.42.33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.26 13.42.33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.26 13.42.33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.26 13.42.33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.26 13.42.33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.26 13.42.33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.26 13.42.33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.26 13.42.33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.26 13.42.33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.26 13.42.33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.26 13.42.33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.26 13.42.33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.118 MASK 255.255.255.255 192.168.1.1
. 2016.01.26 13.42.33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.26 13.42.33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.26 13.42.33 - Starting Management Interface
. 2016.01.26 13.42.33 - OpenVPN > Initialization Sequence Completed
I 2016.01.26 13.42.33 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.26 13.42.33 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.26 13.42.33 - Flushing DNS
I 2016.01.26 13.42.33 - Checking route
I 2016.01.26 13.42.35 - Checking DNS
! 2016.01.26 13.42.48 - Connected.
. 2016.01.26 13.42.48 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.01.26 13.42.48 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

Share this post


Link to post

Alright, problem is back and I'm really not sure what is causing it...

 

The following logs are from the same happening with an SSL tunnel.

 

I 2016.01.31 13.21.21 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.01.31 13.21.21 - Reading options from C:\Users\USER\AppData\Local\AirVPN\AirVPN.xml
. 2016.01.31 13.21.22 - Data Path: C:\Users\USER\AppData\Local\AirVPN
. 2016.01.31 13.21.22 - App Path: C:\Program Files\AirVPN
. 2016.01.31 13.21.22 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.01.31 13.21.22 - Command line arguments (1): path="home"
. 2016.01.31 13.21.22 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.01.31 13.21.22 - Updating systems & servers data ...
I 2016.01.31 13.21.22 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.01.31 13.21.22 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.01.31 13.21.22 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.01.31 13.21.22 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.01.31 13.21.22 - Activation of Network Lock - Windows Firewall
. 2016.01.31 13.21.22 - Systems & servers data update completed
I 2016.01.31 13.21.25 - Session starting.
I 2016.01.31 13.21.25 - IPv6 disabled.
I 2016.01.31 13.21.27 - Checking authorization ...
! 2016.01.31 13.21.28 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.01.31 13.21.28 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.31 13.21.28 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.31 13.21.28 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.31 13.21.28 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.31 13.21.28 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.21.28 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.21.28 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.31 13.21.28 - OpenVPN > UDPv4 link local: [undef]
. 2016.01.31 13.21.28 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.01.31 13.21.28 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=67db9379 cf1771c7
. 2016.01.31 13.21.28 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.31 13.21.28 - OpenVPN > Validating certificate key usage
. 2016.01.31 13.21.28 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.31 13.21.28 - OpenVPN > VERIFY KU OK
. 2016.01.31 13.21.28 - OpenVPN > Validating certificate extended key usage
. 2016.01.31 13.21.28 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.31 13.21.28 - OpenVPN > VERIFY EKU OK
. 2016.01.31 13.21.28 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.31 13.21.34 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.21.34 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.21.34 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.21.34 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.21.34 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.31 13.21.34 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.01.31 13.21.36 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.31 13.21.36 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.222 255.255.0.0'
. 2016.01.31 13.21.36 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.31 13.21.36 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.31 13.21.36 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.31 13.21.36 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.31 13.21.36 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.31 13.21.36 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.31 13.21.36 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.31 13.21.36 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.31 13.21.37 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.31 13.21.37 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.31 13.21.37 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.5.222/255.255.0.0 [sUCCEEDED]
. 2016.01.31 13.21.37 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.5.222/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.01.31 13.21.37 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.31 13.21.41 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.01.31 13.21.41 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.21.41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.21.41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.21.41 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.31 13.21.41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.21.41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.21.41 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.21.41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.21.41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.21.41 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.21.41 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.21.41 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.21.41 - Starting Management Interface
. 2016.01.31 13.21.41 - OpenVPN > Initialization Sequence Completed
I 2016.01.31 13.21.41 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.21.41 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.31 13.21.42 - Flushing DNS
I 2016.01.31 13.21.43 - Checking route
W 2016.01.31 13.22.33 - The operation has timed out
! 2016.01.31 13.22.33 - Disconnecting
. 2016.01.31 13.22.33 - Management - Send 'signal SIGTERM'
. 2016.01.31 13.22.33 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.31 13.22.33 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.01.31 13.22.33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.01.31 13.22.33 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.01.31 13.22.38 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.22.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.38 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.22.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.38 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.22.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.38 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.22.38 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.38 - OpenVPN > Closing TUN/TAP interface
. 2016.01.31 13.22.38 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.01.31 13.22.38 - Connection terminated.
I 2016.01.31 13.22.39 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.22.39 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.01.31 13.22.42 - Checking authorization ...
! 2016.01.31 13.22.46 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.01.31 13.22.46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.31 13.22.46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.31 13.22.46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.31 13.22.46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.31 13.22.46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.22.46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.22.46 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.31 13.22.46 - OpenVPN > UDPv4 link local: [undef]
. 2016.01.31 13.22.46 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.83:443
. 2016.01.31 13.22.46 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.83:443, sid=d9caf068 a25cddf7
. 2016.01.31 13.22.46 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.31 13.22.46 - OpenVPN > Validating certificate key usage
. 2016.01.31 13.22.46 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.31 13.22.46 - OpenVPN > VERIFY KU OK
. 2016.01.31 13.22.46 - OpenVPN > Validating certificate extended key usage
. 2016.01.31 13.22.46 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.31 13.22.46 - OpenVPN > VERIFY EKU OK
. 2016.01.31 13.22.46 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.31 13.22.52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.22.52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.22.52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.22.52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.22.52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.31 13.22.52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.83:443
. 2016.01.31 13.22.54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.31 13.22.54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.5.222 255.255.0.0'
. 2016.01.31 13.22.54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.31 13.22.54 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.31 13.22.54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.31 13.22.54 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.31 13.22.54 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.31 13.22.54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.31 13.22.54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.31 13.22.54 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.31 13.22.55 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.31 13.22.55 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.31 13.22.55 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.5.222/255.255.0.0 [sUCCEEDED]
. 2016.01.31 13.22.55 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.5.222/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.01.31 13.22.55 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.31 13.22.59 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.01.31 13.22.59 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.83 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.22.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.22.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.59 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.31 13.22.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.22.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.22.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.22.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.22.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.22.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.22.59 - Starting Management Interface
. 2016.01.31 13.22.59 - OpenVPN > Initialization Sequence Completed
I 2016.01.31 13.22.59 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.22.59 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.31 13.23.00 - Flushing DNS
I 2016.01.31 13.23.00 - Checking route
W 2016.01.31 13.23.50 - The operation has timed out
! 2016.01.31 13.23.50 - Disconnecting
. 2016.01.31 13.23.50 - Management - Send 'signal SIGTERM'
. 2016.01.31 13.23.50 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.01.31 13.23.50 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.31 13.23.50 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.01.31 13.23.55 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.83 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.23.55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.23.55 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.23.55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.23.55 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.23.55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.23.55 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.01.31 13.23.55 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.23.55 - OpenVPN > Closing TUN/TAP interface
. 2016.01.31 13.23.55 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.01.31 13.23.55 - Connection terminated.
I 2016.01.31 13.23.57 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.23.57 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.01.31 13.24.00 - Checking authorization ...
! 2016.01.31 13.24.01 - Connecting to Rukbat (Netherlands, Alblasserdam)
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\55ee6e37884646d0e4deb318eceeeeac0cc8edba12e6116ffbe68e7619f5273c.tmp.ssl
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[ui]: Initializing service [openvpn]
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[ui]: Configuration successful
. 2016.01.31 13.24.01 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.31 13.24.01 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.31 13.24.01 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.31 13.24.01 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:56021
. 2016.01.31 13.24.01 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[0]: Failover strategy: round-robin
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[0]: s_connect: connecting 213.152.162.85:443
. 2016.01.31 13.24.01 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.01 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.31 13.24.01 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:65077 [nonblock]
. 2016.01.31 13.24.01 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:65077
. 2016.01.31 13.24.01 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.31 13.24.01 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:65077
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[0]: s_connect: connected 213.152.162.85:443
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:56022
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[0]: SNI: sending servername: 213.152.162.85
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[0]: CERT: Locally installed certificate matched
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[0]: SSL connected: new session negotiated
. 2016.01.31 13.24.01 - SSL > 2016.01.31 13:24:01 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.01.31 13.24.01 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:65077, sid=b32fb2eb e5b27818
. 2016.01.31 13.24.02 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.31 13.24.02 - OpenVPN > Validating certificate key usage
. 2016.01.31 13.24.02 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.31 13.24.02 - OpenVPN > VERIFY KU OK
. 2016.01.31 13.24.02 - OpenVPN > Validating certificate extended key usage
. 2016.01.31 13.24.02 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.31 13.24.02 - OpenVPN > VERIFY EKU OK
. 2016.01.31 13.24.02 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.31 13.24.03 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.24.03 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.03 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.24.03 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.03 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.31 13.24.03 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:65077
. 2016.01.31 13.24.05 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.31 13.24.05 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.23 255.255.0.0'
. 2016.01.31 13.24.05 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.31 13.24.05 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.31 13.24.05 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.31 13.24.05 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.31 13.24.05 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.31 13.24.05 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.31 13.24.05 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.31 13.24.05 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.31 13.24.05 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.31 13.24.05 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.31 13.24.05 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.23/255.255.0.0 [sUCCEEDED]
. 2016.01.31 13.24.05 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.23/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.31 13.24.05 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.31 13.24.10 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.31 13.24.10 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.24.10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.10 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.31 13.24.10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.24.10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.10 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.24.10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.24.10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.10 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.24.10 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.24.10 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.10 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.85 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.10 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.31 13.24.10 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.31 13.24.10 - OpenVPN > Route addition fallback to route.exe
. 2016.01.31 13.24.10 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.31 13.24.10 - Starting Management Interface
. 2016.01.31 13.24.10 - OpenVPN > Initialization Sequence Completed
I 2016.01.31 13.24.10 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.24.10 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.31 13.24.12 - Flushing DNS
I 2016.01.31 13.24.13 - Checking route
I 2016.01.31 13.24.14 - Checking DNS
! 2016.01.31 13.24.28 - Connected.
. 2016.01.31 13.24.28 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.01.31 13.24.28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.01.31 13.24.28 - Disconnecting
. 2016.01.31 13.24.28 - Management - Send 'signal SIGTERM'
. 2016.01.31 13.24.28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.31 13.24.28 - SSL > 2016.01.31 13:24:28 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.01.31 13.24.28 - SSL > 2016.01.31 13:24:28 LOG5[0]: Connection reset: 114322 byte(s) sent to SSL, 112535 byte(s) sent to socket
. 2016.01.31 13.24.28 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.85 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.28 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.28 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.28 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.24.28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.28 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.24.28 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.28 - OpenVPN > Closing TUN/TAP interface
. 2016.01.31 13.24.28 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.01.31 13.24.28 - Connection terminated.
I 2016.01.31 13.24.30 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.24.30 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.01.31 13.24.30 - IPv6 restored.
! 2016.01.31 13.24.31 - Session terminated.
I 2016.01.31 13.24.46 - Session starting.
I 2016.01.31 13.24.46 - IPv6 disabled.
I 2016.01.31 13.24.46 - Checking authorization ...
! 2016.01.31 13.24.46 - Connecting to Nusakan (Netherlands, Rotterdam)
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\ac06f4097e8fcb8401212223349d8d8908213af2e65f7cbdc9689c0d00bb62ad.tmp.ssl
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG6[ui]: Initializing service [openvpn]
. 2016.01.31 13.24.46 - SSL > 2016.01.31 13:24:46 LOG5[ui]: Configuration successful
. 2016.01.31 13.24.46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.31 13.24.46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.31 13.24.46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.31 13.24.47 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.31 13.24.47 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.47 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.47 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.31 13.24.47 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:46824 [nonblock]
. 2016.01.31 13.24.47 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:46824
. 2016.01.31 13.24.47 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.31 13.24.47 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:46824
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:56185
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG6[0]: Failover strategy: round-robin
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG6[0]: s_connect: connecting 213.163.74.41:443
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG5[0]: s_connect: connected 213.163.74.41:443
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:56186
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG6[0]: SNI: sending servername: 213.163.74.41
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG6[0]: CERT: Locally installed certificate matched
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG6[0]: SSL connected: new session negotiated
. 2016.01.31 13.24.47 - SSL > 2016.01.31 13:24:47 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.01.31 13.24.47 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:46824, sid=a043f6b0 248ba1a6
. 2016.01.31 13.24.47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.31 13.24.47 - OpenVPN > Validating certificate key usage
. 2016.01.31 13.24.47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.31 13.24.47 - OpenVPN > VERIFY KU OK
. 2016.01.31 13.24.47 - OpenVPN > Validating certificate extended key usage
. 2016.01.31 13.24.47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.31 13.24.47 - OpenVPN > VERIFY EKU OK
. 2016.01.31 13.24.47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.31 13.24.48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.24.48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.24.48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.24.48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.31 13.24.48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:46824
. 2016.01.31 13.24.50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.31 13.24.50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.40 255.255.0.0'
. 2016.01.31 13.24.50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.31 13.24.50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.31 13.24.50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.31 13.24.50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.31 13.24.50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.31 13.24.50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.31 13.24.50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.31 13.24.50 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.31 13.24.51 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.31 13.24.51 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.31 13.24.51 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.40/255.255.0.0 [sUCCEEDED]
. 2016.01.31 13.24.51 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.40/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.31 13.24.51 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.31 13.24.55 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.31 13.24.55 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.24.55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.31 13.24.55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.24.55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.24.55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.24.55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.24.55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.01.31 13.24.55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.24.55 - OpenVPN > C:\Windows\system32\route.exe ADD 213.163.74.41 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.24.55 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.31 13.24.55 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.31 13.24.55 - OpenVPN > Route addition fallback to route.exe
. 2016.01.31 13.24.55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.31 13.24.55 - Starting Management Interface
. 2016.01.31 13.24.55 - OpenVPN > Initialization Sequence Completed
I 2016.01.31 13.24.55 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.24.55 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.31 13.24.56 - Flushing DNS
I 2016.01.31 13.24.56 - Checking route
I 2016.01.31 13.25.01 - Checking DNS
! 2016.01.31 13.25.01 - Connected.
. 2016.01.31 13.25.01 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.01.31 13.25.01 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.01.31 13.40.16 - OpenVPN > [server] Inactivity timeout (--ping-restart), restarting
. 2016.01.31 13.40.16 - OpenVPN > SIGUSR1[soft,ping-restart] received, process restarting
. 2016.01.31 13.40.16 - OpenVPN > Restart pause, 5 second(s)
. 2016.01.31 13.40.16 - SSL > 2016.01.31 13:40:16 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.01.31 13.40.16 - SSL > 2016.01.31 13:40:16 LOG5[0]: Connection reset: 912005 byte(s) sent to SSL, 7346482 byte(s) sent to socket
! 2016.01.31 13.40.16 - Disconnecting
. 2016.01.31 13.40.16 - Management - Send 'signal SIGTERM'
. 2016.01.31 13.40.16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.01.31 13.40.16 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.01.31 13.40.16 - OpenVPN > Assertion failed at misc.c:779
. 2016.01.31 13.40.16 - OpenVPN > Exiting due to fatal error
. 2016.01.31 13.40.16 - Connection terminated.
I 2016.01.31 13.40.17 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.40.17 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.01.31 13.40.23 - Checking authorization ...
! 2016.01.31 13.40.23 - Connecting to Celaeno (Netherlands, Alblasserdam)
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:23 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:23 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:23 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:23 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\93f311175fb80787051a218086d27a75969e509bba4f31b1ad9b47ed08a8dc35.tmp.ssl
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:23 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[ui]: Initializing service [openvpn]
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG5[ui]: Configuration successful
. 2016.01.31 13.40.24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.01.31 13.40.24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.01.31 13.40.24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.01.31 13.40.24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.01.31 13.40.24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:64510
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[0]: Failover strategy: round-robin
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[0]: s_connect: connecting 213.152.161.70:443
. 2016.01.31 13.40.24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.40.24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.01.31 13.40.24 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:27262 [nonblock]
. 2016.01.31 13.40.24 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:27262
. 2016.01.31 13.40.24 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.01.31 13.40.24 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:27262
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG5[0]: s_connect: connected 213.152.161.70:443
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:64511
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[0]: SNI: sending servername: 213.152.161.70
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[0]: CERT: Locally installed certificate matched
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[0]: SSL connected: new session negotiated
. 2016.01.31 13.40.24 - SSL > 2016.01.31 13:40:24 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.01.31 13.40.24 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:27262, sid=5d86d534 564d8fdb
. 2016.01.31 13.40.24 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.01.31 13.40.24 - OpenVPN > Validating certificate key usage
. 2016.01.31 13.40.24 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.01.31 13.40.24 - OpenVPN > VERIFY KU OK
. 2016.01.31 13.40.24 - OpenVPN > Validating certificate extended key usage
. 2016.01.31 13.40.24 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.01.31 13.40.24 - OpenVPN > VERIFY EKU OK
. 2016.01.31 13.40.24 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.01.31 13.40.26 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.40.26 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.40.26 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.01.31 13.40.26 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.01.31 13.40.26 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.01.31 13.40.26 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:27262
. 2016.01.31 13.40.28 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.01.31 13.40.28 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.26 255.255.0.0'
. 2016.01.31 13.40.28 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.01.31 13.40.28 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.01.31 13.40.28 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.01.31 13.40.28 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.01.31 13.40.28 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.01.31 13.40.28 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.01.31 13.40.28 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.01.31 13.40.28 - OpenVPN > open_tun, tt->ipv6=0
. 2016.01.31 13.40.28 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.01.31 13.40.28 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.01.31 13.40.28 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.26/255.255.0.0 [sUCCEEDED]
. 2016.01.31 13.40.28 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.26/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.01.31 13.40.28 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.01.31 13.40.33 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.01.31 13.40.33 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.40.33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.31 13.40.33 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.31 13.40.33 - OpenVPN > Route addition fallback to route.exe
. 2016.01.31 13.40.33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.31 13.40.33 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.01.31 13.40.33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.01.31 13.40.33 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.31 13.40.33 - OpenVPN > Route addition fallback to route.exe
. 2016.01.31 13.40.33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.31 13.40.33 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.40.33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.01.31 13.40.33 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.31 13.40.33 - OpenVPN > Route addition fallback to route.exe
. 2016.01.31 13.40.33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.31 13.40.33 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.01.31 13.40.33 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.01.31 13.40.33 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.01.31 13.40.33 - OpenVPN > Route addition fallback to route.exe
. 2016.01.31 13.40.33 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.01.31 13.40.33 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.70 MASK 255.255.255.255 192.168.1.1
. 2016.01.31 13.40.33 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.01.31 13.40.33 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.01.31 13.40.33 - Starting Management Interface
. 2016.01.31 13.40.33 - OpenVPN > Initialization Sequence Completed
I 2016.01.31 13.40.33 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.01.31 13.40.33 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.01.31 13.40.33 - Flushing DNS
I 2016.01.31 13.40.33 - Checking route
I 2016.01.31 13.40.46 - Checking DNS
. 2016.01.31 13.41.39 - SSL > 2016.01.31 13:41:39 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.01.31 13.41.39 - SSL > 2016.01.31 13:41:39 LOG5[0]: Connection reset: 363028 byte(s) sent to SSL, 2424293 byte(s) sent to socket
. 2016.01.31 13.41.44 - SSL > 2016.01.31 13:41:44 LOG5[1]: Service [openvpn] accepted connection from 127.0.0.1:62957
. 2016.01.31 13.41.44 - SSL > 2016.01.31 13:41:44 LOG6[1]: Failover strategy: round-robin
. 2016.01.31 13.41.44 - SSL > 2016.01.31 13:41:44 LOG6[1]: s_connect: connecting 213.152.161.70:443
. 2016.01.31 13.41.45 - SSL > 2016.01.31 13:41:45 LOG5[1]: s_connect: connected 213.152.161.70:443
. 2016.01.31 13.41.45 - SSL > 2016.01.31 13:41:45 LOG5[1]: Service [openvpn] connected remote server from 192.168.1.102:62958
. 2016.01.31 13.41.45 - SSL > 2016.01.31 13:41:45 LOG6[1]: SNI: sending servername: 213.152.161.70
. 2016.01.31 13.41.45 - SSL > 2016.01.31 13:41:45 LOG6[1]: SSL connected: previous session reused

Share this post


Link to post

BUMP - The problem still persists and is getting worse. I'm at the point where my internet is almost unusable. This is seriously making me reconsider AirVPN as a future provider. I hope there's a solution to this problem.

 

More Logs:

 

 

I 2016.02.04 19.16.40 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.02.04 19.16.40 - Reading options from C:\Users\USER\AppData\Local\AirVPN\AirVPN.xml
. 2016.02.04 19.16.42 - Data Path: C:\Users\User\AppData\Local\AirVPN
. 2016.02.04 19.16.42 - App Path: C:\Program Files\AirVPN
. 2016.02.04 19.16.42 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.02.04 19.16.42 - Command line arguments (1): path="home"
. 2016.02.04 19.16.42 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.02.04 19.16.42 - Updating systems & servers data ...
I 2016.02.04 19.16.44 - OpenVPN Driver - TAP-Windows Adapter V9, version 9.21.1
I 2016.02.04 19.16.44 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.02.04 19.16.44 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.02.04 19.16.44 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.02.04 19.16.44 - Activation of Network Lock - Windows Firewall
. 2016.02.04 19.16.44 - Systems & servers data update completed
I 2016.02.04 19.16.52 - Session starting.
I 2016.02.04 19.16.56 - IPv6 disabled.
I 2016.02.04 19.17.03 - Checking authorization ...
! 2016.02.04 19.17.03 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.04 19.17.05 - SSL > 2016.02.04 19:17:05 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 19.17.05 - SSL > 2016.02.04 19:17:05 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 19.17.05 - SSL > 2016.02.04 19:17:05 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 19.17.05 - SSL > 2016.02.04 19:17:05 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\a78f9f4ac5de3e98dfb57a70e868c32cde5b939cb6ee937c343fd411773d60fd.tmp.ssl
. 2016.02.04 19.17.05 - SSL > 2016.02.04 19:17:05 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 19.17.05 - SSL > 2016.02.04 19:17:05 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 19.17.06 - SSL > 2016.02.04 19:17:05 LOG5[ui]: Configuration successful
. 2016.02.04 19.17.06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 19.17.06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 19.17.06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 19.17.08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 19.17.08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.17.08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.17.08 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 19.17.08 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:6448 [nonblock]
. 2016.02.04 19.17.08 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:6448
. 2016.02.04 19.17.08 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 19.17.08 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:6448
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:49456
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG6[0]: s_connect: connecting 213.152.161.182:443
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG5[0]: s_connect: connected 213.152.161.182:443
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:49457
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG6[0]: SNI: sending servername: 213.152.161.182
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 19.17.08 - SSL > 2016.02.04 19:17:08 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 19.17.08 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:6448, sid=3443105c 42b18e73
. 2016.02.04 19.17.09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 19.17.09 - OpenVPN > Validating certificate key usage
. 2016.02.04 19.17.09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 19.17.09 - OpenVPN > VERIFY KU OK
. 2016.02.04 19.17.09 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 19.17.09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 19.17.09 - OpenVPN > VERIFY EKU OK
. 2016.02.04 19.17.09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 19.17.11 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.17.11 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.17.11 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.17.11 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.17.11 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 19.17.11 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:6448
. 2016.02.04 19.17.13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 19.17.13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.194 255.255.0.0'
. 2016.02.04 19.17.13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 19.17.13 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 19.17.13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 19.17.13 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 19.17.13 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 19.17.13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 19.17.13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 19.17.13 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 19.17.14 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 19.17.14 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 19.17.14 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.194/255.255.0.0 [sUCCEEDED]
. 2016.02.04 19.17.14 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.194/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 19.17.14 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 19.17.18 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 19.17.18 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.17.18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.17.18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.17.18 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 19.17.18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.17.18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.17.18 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.17.18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 19.17.18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.17.18 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.17.18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 19.17.18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.17.18 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.17.18 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.17.18 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.17.18 - Starting Management Interface
. 2016.02.04 19.17.18 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 19.17.18 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.17.18 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 19.17.19 - Flushing DNS
I 2016.02.04 19.17.19 - Checking route
I 2016.02.04 19.17.21 - Checking DNS
! 2016.02.04 19.17.33 - Connected.
. 2016.02.04 19.17.33 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 19.17.33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.02.04 19.42.44 - Disconnecting
. 2016.02.04 19.42.44 - Management - Send 'signal SIGTERM'
. 2016.02.04 19.42.44 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 19.42.44 - SSL > 2016.02.04 19:42:44 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 19.42.44 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.42.44 - SSL > 2016.02.04 19:42:44 LOG5[0]: Connection reset: 747821 byte(s) sent to SSL, 2853948 byte(s) sent to socket
. 2016.02.04 19.42.44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.44 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.42.44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.44 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.42.44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.44 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.42.44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.44 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.42.44 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.44 - OpenVPN > Closing TUN/TAP interface
. 2016.02.04 19.42.44 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.02.04 19.42.45 - Connection terminated.
I 2016.02.04 19.42.46 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.42.46 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 19.42.49 - Checking authorization ...
! 2016.02.04 19.42.49 - Connecting to Alshat (Netherlands, Alblasserdam)
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:49 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:49 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:49 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:49 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\64fc4a8426edc54ae32a2525c61e64c2339fe552245c356b92e9f0c596dea24c.tmp.ssl
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:49 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG5[ui]: Configuration successful
. 2016.02.04 19.42.50 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 19.42.50 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 19.42.50 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 19.42.50 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 19.42.50 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.42.50 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.42.50 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 19.42.50 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:31884 [nonblock]
. 2016.02.04 19.42.50 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:31884
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59062
. 2016.02.04 19.42.50 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[0]: s_connect: connecting 213.152.161.6:443
. 2016.02.04 19.42.50 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:31884
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG5[0]: s_connect: connected 213.152.161.6:443
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:59063
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[0]: SNI: sending servername: 213.152.161.6
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 19.42.50 - SSL > 2016.02.04 19:42:50 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 19.42.50 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:31884, sid=9a7af896 a167b345
. 2016.02.04 19.42.50 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 19.42.50 - OpenVPN > Validating certificate key usage
. 2016.02.04 19.42.50 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 19.42.50 - OpenVPN > VERIFY KU OK
. 2016.02.04 19.42.50 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 19.42.50 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 19.42.50 - OpenVPN > VERIFY EKU OK
. 2016.02.04 19.42.50 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 19.42.51 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.42.51 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.42.51 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.42.51 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.42.51 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 19.42.51 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:31884
. 2016.02.04 19.42.54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 19.42.54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.181 255.255.0.0'
. 2016.02.04 19.42.54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 19.42.54 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 19.42.54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 19.42.54 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 19.42.54 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 19.42.54 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 19.42.54 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 19.42.54 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 19.42.54 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 19.42.54 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 19.42.54 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.181/255.255.0.0 [sUCCEEDED]
. 2016.02.04 19.42.54 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.181/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 19.42.54 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 19.42.59 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 19.42.59 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.42.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.42.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.59 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 19.42.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.42.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.59 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.42.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 19.42.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.59 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.42.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 19.42.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.59 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.6 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.42.59 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.42.59 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.42.59 - Starting Management Interface
. 2016.02.04 19.42.59 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 19.42.59 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.42.59 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 19.43.00 - Flushing DNS
I 2016.02.04 19.43.01 - Checking route
I 2016.02.04 19.43.30 - Checking DNS
! 2016.02.04 19.43.32 - Connected.
. 2016.02.04 19.43.32 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 19.43.33 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.04 19.46.55 - Updating systems & servers data ...
. 2016.02.04 19.46.56 - Systems & servers data update completed
. 2016.02.04 19.48.42 - SSL > 2016.02.04 19:48:42 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 19.48.42 - SSL > 2016.02.04 19:48:42 LOG5[0]: Connection reset: 1535176 byte(s) sent to SSL, 13318900 byte(s) sent to socket
. 2016.02.04 19.48.42 - OpenVPN > Connection reset, restarting [-1]
. 2016.02.04 19.48.42 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.02.04 19.48.42 - OpenVPN > Restart pause, 5 second(s)
! 2016.02.04 19.48.43 - Disconnecting
. 2016.02.04 19.48.43 - Management - Send 'signal SIGTERM'
. 2016.02.04 19.48.43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 19.48.43 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.02.04 19.48.43 - OpenVPN > Assertion failed at misc.c:779
. 2016.02.04 19.48.43 - OpenVPN > Exiting due to fatal error
. 2016.02.04 19.48.43 - Connection terminated.
I 2016.02.04 19.48.44 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.48.44 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 19.48.48 - Checking authorization ...
! 2016.02.04 19.48.48 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:48 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:48 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:48 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:48 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\b3dcae794829450eaa7899c9f7558e18e91e6477db65d6b2ca7d58a989b01a7a.tmp.ssl
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:48 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG5[ui]: Configuration successful
. 2016.02.04 19.48.49 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 19.48.49 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 19.48.49 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 19.48.49 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 19.48.49 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.48.49 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.48.49 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 19.48.49 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:64971 [nonblock]
. 2016.02.04 19.48.49 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:64971
. 2016.02.04 19.48.49 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 19.48.49 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:64971
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59247
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[0]: s_connect: connecting 213.152.161.182:443
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG5[0]: s_connect: connected 213.152.161.182:443
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:59248
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[0]: SNI: sending servername: 213.152.161.182
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 19.48.49 - SSL > 2016.02.04 19:48:49 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 19.48.49 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:64971, sid=c20f2242 1842a4f2
. 2016.02.04 19.48.49 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 19.48.49 - OpenVPN > Validating certificate key usage
. 2016.02.04 19.48.49 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 19.48.49 - OpenVPN > VERIFY KU OK
. 2016.02.04 19.48.49 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 19.48.49 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 19.48.49 - OpenVPN > VERIFY EKU OK
. 2016.02.04 19.48.49 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 19.48.50 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.48.50 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.48.50 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.48.50 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.48.50 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 19.48.50 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:64971
. 2016.02.04 19.48.52 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 19.48.52 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.194 255.255.0.0'
. 2016.02.04 19.48.52 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 19.48.52 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 19.48.52 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 19.48.52 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 19.48.52 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 19.48.52 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 19.48.52 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 19.48.52 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 19.48.53 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 19.48.53 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 19.48.53 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.194/255.255.0.0 [sUCCEEDED]
. 2016.02.04 19.48.53 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.194/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 19.48.53 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 19.48.57 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 19.48.57 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.48.57 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.02.04 19.48.57 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 19.48.57 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 19.48.57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 19.48.57 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 19.48.57 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.02.04 19.48.57 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 19.48.57 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 19.48.57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 19.48.57 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.48.57 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.02.04 19.48.57 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 19.48.57 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 19.48.57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 19.48.57 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.48.57 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.02.04 19.48.57 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 19.48.57 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 19.48.57 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 19.48.57 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.48.57 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.48.57 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.48.57 - Starting Management Interface
. 2016.02.04 19.48.57 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 19.48.57 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.48.57 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 19.48.57 - Flushing DNS
I 2016.02.04 19.48.58 - Checking route
I 2016.02.04 19.49.10 - Checking DNS
! 2016.02.04 19.49.13 - Connected.
. 2016.02.04 19.49.13 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 19.49.13 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.02.04 19.51.36 - Disconnecting
. 2016.02.04 19.51.36 - Management - Send 'signal SIGTERM'
. 2016.02.04 19.51.36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 19.51.36 - SSL > 2016.02.04 19:51:36 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 19.51.36 - SSL > 2016.02.04 19:51:36 LOG5[0]: Connection reset: 685014 byte(s) sent to SSL, 5489905 byte(s) sent to socket
. 2016.02.04 19.51.36 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.51.36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.36 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.51.36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.36 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.51.36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.36 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.51.36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.36 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.51.36 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.36 - OpenVPN > Closing TUN/TAP interface
. 2016.02.04 19.51.36 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.02.04 19.51.36 - Connection terminated.
I 2016.02.04 19.51.37 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.51.37 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 19.51.40 - Checking authorization ...
! 2016.02.04 19.51.41 - Connecting to Subra (Netherlands, Alblasserdam)
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\3df0cf9b2ad1695cc7740b7f42ae60108cd8e017b9de3cc962370b97c981c142.tmp.ssl
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[ui]: Configuration successful
. 2016.02.04 19.51.41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 19.51.41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 19.51.41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 19.51.41 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 19.51.41 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.51.41 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.51.41 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 19.51.41 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:7630 [nonblock]
. 2016.02.04 19.51.41 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:7630
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59355
. 2016.02.04 19.51.41 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 19.51.41 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:7630
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[0]: s_connect: connecting 213.152.162.100:443
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[0]: s_connect: connected 213.152.162.100:443
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:59356
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[0]: SNI: sending servername: 213.152.162.100
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 19.51.41 - SSL > 2016.02.04 19:51:41 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 19.51.41 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:7630, sid=59dbb9d4 d6deda35
. 2016.02.04 19.51.44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 19.51.44 - OpenVPN > Validating certificate key usage
. 2016.02.04 19.51.44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 19.51.44 - OpenVPN > VERIFY KU OK
. 2016.02.04 19.51.44 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 19.51.44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 19.51.44 - OpenVPN > VERIFY EKU OK
. 2016.02.04 19.51.44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 19.51.46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.51.46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.51.46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 19.51.46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 19.51.46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 19.51.46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:7630
. 2016.02.04 19.51.49 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 19.51.49 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.135 255.255.0.0'
. 2016.02.04 19.51.49 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 19.51.49 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 19.51.49 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 19.51.49 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 19.51.49 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 19.51.49 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 19.51.49 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 19.51.49 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 19.51.50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 19.51.50 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 19.51.50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.135/255.255.0.0 [sUCCEEDED]
. 2016.02.04 19.51.50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.135/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 19.51.50 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 19.51.54 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 19.51.54 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.51.54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.51.54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.54 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 19.51.54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.51.54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.54 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.51.54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 19.51.54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.54 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 19.51.54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 19.51.54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.54 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.162.100 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 19.51.54 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 19.51.54 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 19.51.54 - Starting Management Interface
. 2016.02.04 19.51.54 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 19.51.54 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 19.51.54 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 19.51.55 - Flushing DNS
I 2016.02.04 19.51.56 - Checking route
I 2016.02.04 19.52.09 - Checking DNS
! 2016.02.04 19.52.10 - Connected.
. 2016.02.04 19.52.10 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 19.52.10 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
! 2016.02.04 20.05.13 - Disconnecting
. 2016.02.04 20.05.13 - Management - Send 'signal SIGTERM'
. 2016.02.04 20.05.13 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 20.05.13 - SSL > 2016.02.04 20:05:13 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 20.05.13 - SSL > 2016.02.04 20:05:13 LOG5[0]: Connection reset: 3599324 byte(s) sent to SSL, 32141396 byte(s) sent to socket
. 2016.02.04 20.05.13 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.162.100 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.05.13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.14 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.05.14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.14 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.05.14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.14 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.05.14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.14 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.05.14 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.14 - OpenVPN > Closing TUN/TAP interface
. 2016.02.04 20.05.14 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.02.04 20.05.14 - Connection terminated.
I 2016.02.04 20.05.15 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.05.15 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 20.05.18 - Checking authorization ...
! 2016.02.04 20.05.18 - Connecting to Anser (Netherlands, Alblasserdam)
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:18 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:18 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:18 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:18 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\df41cacdff7ba92276d526ec27bdcb47c1711667f64b1b491d0992fbb46d73e9.tmp.ssl
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:18 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG5[ui]: Configuration successful
. 2016.02.04 20.05.19 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 20.05.19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 20.05.19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 20.05.19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 20.05.19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.05.19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.05.19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 20.05.19 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:36680 [nonblock]
. 2016.02.04 20.05.19 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:36680
. 2016.02.04 20.05.19 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 20.05.19 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:36680
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59761
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[0]: s_connect: connecting 109.202.103.171:443
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG5[0]: s_connect: connected 109.202.103.171:443
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:59762
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[0]: SNI: sending servername: 109.202.103.171
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 20.05.19 - SSL > 2016.02.04 20:05:19 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 20.05.19 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:36680, sid=9180c561 ad2ea7e4
. 2016.02.04 20.05.19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 20.05.19 - OpenVPN > Validating certificate key usage
. 2016.02.04 20.05.19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 20.05.19 - OpenVPN > VERIFY KU OK
. 2016.02.04 20.05.19 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 20.05.19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 20.05.19 - OpenVPN > VERIFY EKU OK
. 2016.02.04 20.05.19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 20.05.20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.05.20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.05.20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.05.20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.05.20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 20.05.20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:36680
. 2016.02.04 20.05.22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 20.05.22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.2.119 255.255.0.0'
. 2016.02.04 20.05.22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 20.05.22 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 20.05.22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 20.05.22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 20.05.22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 20.05.22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 20.05.22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 20.05.22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 20.05.23 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 20.05.23 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 20.05.23 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.2.119/255.255.0.0 [sUCCEEDED]
. 2016.02.04 20.05.23 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.2.119/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 20.05.23 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 20.05.27 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 20.05.27 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.05.27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.05.27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.27 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 20.05.27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.05.27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.05.27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 20.05.27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.05.27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 20.05.27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.27 - OpenVPN > C:\Windows\system32\route.exe ADD 109.202.103.171 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.05.27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.05.27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.05.27 - Starting Management Interface
. 2016.02.04 20.05.27 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 20.05.27 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.05.27 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 20.05.28 - Flushing DNS
I 2016.02.04 20.05.28 - Checking route
I 2016.02.04 20.05.49 - Checking DNS
! 2016.02.04 20.06.02 - Connected.
. 2016.02.04 20.06.02 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 20.06.02 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.04 20.16.10 - SSL > 2016.02.04 20:16:10 LOG3[0]: SSL_write: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 20.16.10 - SSL > 2016.02.04 20:16:10 LOG5[0]: Connection reset: 1310472 byte(s) sent to SSL, 9265701 byte(s) sent to socket
. 2016.02.04 20.16.10 - OpenVPN > Connection reset, restarting [-1]
. 2016.02.04 20.16.10 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.02.04 20.16.10 - OpenVPN > Restart pause, 5 second(s)
! 2016.02.04 20.16.10 - Disconnecting
. 2016.02.04 20.16.10 - Management - Send 'signal SIGTERM'
. 2016.02.04 20.16.10 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 20.16.10 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.02.04 20.16.10 - OpenVPN > Assertion failed at misc.c:779
. 2016.02.04 20.16.10 - OpenVPN > Exiting due to fatal error
. 2016.02.04 20.16.10 - Connection terminated.
I 2016.02.04 20.16.11 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.16.11 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 20.16.16 - Checking authorization ...
! 2016.02.04 20.16.16 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:16 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:16 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:16 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:16 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\7ce9ee1e075c4c847c9b32216e4e2a652daf7c550f87c1d822f6b4d7603d3dca.tmp.ssl
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:16 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG5[ui]: Configuration successful
. 2016.02.04 20.16.17 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 20.16.17 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 20.16.17 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 20.16.17 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 20.16.17 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.16.17 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.16.17 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 20.16.17 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:20799 [nonblock]
. 2016.02.04 20.16.17 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:20799
. 2016.02.04 20.16.17 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 20.16.17 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:20799
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:59917
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[0]: s_connect: connecting 213.152.161.182:443
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG5[0]: s_connect: connected 213.152.161.182:443
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:59918
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[0]: SNI: sending servername: 213.152.161.182
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 20.16.17 - SSL > 2016.02.04 20:16:17 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 20.16.17 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:20799, sid=7f8d20e2 643f11b0
. 2016.02.04 20.16.18 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 20.16.18 - OpenVPN > Validating certificate key usage
. 2016.02.04 20.16.18 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 20.16.18 - OpenVPN > VERIFY KU OK
. 2016.02.04 20.16.18 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 20.16.18 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 20.16.18 - OpenVPN > VERIFY EKU OK
. 2016.02.04 20.16.18 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 20.16.18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.16.18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.16.18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.16.18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.16.18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 20.16.19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:20799
. 2016.02.04 20.16.21 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 20.16.21 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.194 255.255.0.0'
. 2016.02.04 20.16.21 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 20.16.21 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 20.16.21 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 20.16.21 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 20.16.21 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 20.16.21 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 20.16.21 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 20.16.22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 20.16.22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 20.16.22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 20.16.22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.194/255.255.0.0 [sUCCEEDED]
. 2016.02.04 20.16.22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.194/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 20.16.22 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 20.16.27 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 20.16.27 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.16.27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.02.04 20.16.27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 20.16.27 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 20.16.27 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 20.16.27 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 20.16.27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.02.04 20.16.27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 20.16.27 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 20.16.27 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 20.16.27 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.16.27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.02.04 20.16.27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 20.16.27 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 20.16.27 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 20.16.27 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.16.27 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.02.04 20.16.27 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 20.16.27 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 20.16.27 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 20.16.27 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.16.27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.16.27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.16.27 - Starting Management Interface
. 2016.02.04 20.16.27 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 20.16.27 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.16.27 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 20.16.27 - Flushing DNS
I 2016.02.04 20.16.27 - Checking route
I 2016.02.04 20.16.53 - Checking DNS
! 2016.02.04 20.17.12 - Connected.
. 2016.02.04 20.17.12 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 20.17.12 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.04 20.17.29 - Updating systems & servers data ...
. 2016.02.04 20.18.11 - Cannot retrieve systems & servers data. Please retry later or contact us for help. (The operation has timed out)
! 2016.02.04 20.18.17 - Disconnecting
. 2016.02.04 20.18.17 - Management - Send 'signal SIGTERM'
. 2016.02.04 20.18.17 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 20.18.17 - SSL > 2016.02.04 20:18:17 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 20.18.17 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.18.17 - SSL > 2016.02.04 20:18:17 LOG5[0]: Connection reset: 599568 byte(s) sent to SSL, 1532816 byte(s) sent to socket
. 2016.02.04 20.18.17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.17 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.18.17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.17 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.18.17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.17 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.18.17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.17 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.18.17 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.17 - OpenVPN > Closing TUN/TAP interface
. 2016.02.04 20.18.17 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.02.04 20.18.17 - Connection terminated.
I 2016.02.04 20.18.18 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.18.18 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 20.18.21 - Checking authorization ...
! 2016.02.04 20.18.22 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\6ea53d4d4a46adbaca3754428d37440771069df3a1acd1555ed965dd39f19630.tmp.ssl
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[ui]: Configuration successful
. 2016.02.04 20.18.22 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 20.18.22 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 20.18.22 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 20.18.22 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 20.18.22 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:60038
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 20.18.22 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.18.22 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 20.18.22 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:52718 [nonblock]
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[0]: s_connect: connecting 213.152.161.182:443
. 2016.02.04 20.18.22 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:52718
. 2016.02.04 20.18.22 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 20.18.22 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:52718
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[0]: s_connect: connected 213.152.161.182:443
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:60039
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[0]: SNI: sending servername: 213.152.161.182
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 20.18.22 - SSL > 2016.02.04 20:18:22 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 20.18.22 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:52718, sid=69def8cc b09a5a42
. 2016.02.04 20.18.23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 20.18.23 - OpenVPN > Validating certificate key usage
. 2016.02.04 20.18.23 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 20.18.23 - OpenVPN > VERIFY KU OK
. 2016.02.04 20.18.23 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 20.18.23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 20.18.23 - OpenVPN > VERIFY EKU OK
. 2016.02.04 20.18.23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 20.18.24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.18.24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.18.24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.18.24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.18.24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 20.18.24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:52718
. 2016.02.04 20.18.26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 20.18.26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.194 255.255.0.0'
. 2016.02.04 20.18.26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 20.18.26 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 20.18.26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 20.18.26 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 20.18.26 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 20.18.26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 20.18.26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 20.18.26 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 20.18.26 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 20.18.26 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 20.18.26 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.194/255.255.0.0 [sUCCEEDED]
. 2016.02.04 20.18.26 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.194/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 20.18.26 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 20.18.31 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 20.18.31 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.18.31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.18.31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.31 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 20.18.31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.18.31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.31 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.18.31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 20.18.31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.31 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.18.31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 20.18.31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.31 - OpenVPN > C:\Windows\system32\route.exe ADD 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.18.31 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.18.31 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.18.31 - Starting Management Interface
. 2016.02.04 20.18.31 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 20.18.31 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.18.31 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 20.18.32 - Flushing DNS
I 2016.02.04 20.18.32 - Checking route
I 2016.02.04 20.18.54 - Checking DNS
! 2016.02.04 20.19.06 - Connected.
. 2016.02.04 20.19.06 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.04 20.19.06 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.04 20.19.06 - Disconnecting
. 2016.02.04 20.19.06 - Management - Send 'signal SIGTERM'
. 2016.02.04 20.19.06 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 20.19.06 - OpenVPN > C:\Windows\system32\route.exe DELETE 213.152.161.182 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.19.06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.06 - OpenVPN > C:\Windows\system32\route.exe DELETE 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.19.06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.06 - OpenVPN > C:\Windows\system32\route.exe DELETE 192.168.1.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.19.06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.06 - OpenVPN > C:\Windows\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.19.06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.06 - OpenVPN > C:\Windows\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.19.06 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.06 - OpenVPN > Closing TUN/TAP interface
. 2016.02.04 20.19.06 - OpenVPN > SIGTERM[hard,] received, process exiting
. 2016.02.04 20.19.06 - SSL > 2016.02.04 20:19:06 LOG3[0]: readsocket: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 20.19.06 - SSL > 2016.02.04 20:19:06 LOG5[0]: Connection reset: 174954 byte(s) sent to SSL, 231361 byte(s) sent to socket
. 2016.02.04 20.19.06 - OpenVpn Management > SUCCESS: signal SIGTERM thrown
. 2016.02.04 20.19.06 - Connection terminated.
I 2016.02.04 20.19.07 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.19.07 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 20.19.10 - Checking authorization ...
! 2016.02.04 20.19.11 - Connecting to Bellatrix (United Kingdom, London)
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\49d8e4af4be84e67b2814cbea94d06bf756e3c7899aae9ed4436afb9203c7b0d.tmp.ssl
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[ui]: Configuration successful
. 2016.02.04 20.19.11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 20.19.11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 20.19.11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 20.19.11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 20.19.11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.19.11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.19.11 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 20.19.11 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:35712 [nonblock]
. 2016.02.04 20.19.11 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:35712
. 2016.02.04 20.19.11 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 20.19.11 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:35712
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:60159
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[0]: s_connect: connecting 88.150.241.17:443
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[0]: s_connect: connected 88.150.241.17:443
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:60160
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[0]: SNI: sending servername: 88.150.241.17
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 20.19.11 - SSL > 2016.02.04 20:19:11 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 20.19.11 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:35712, sid=bc1c6a06 2aa4788e
. 2016.02.04 20.19.11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 20.19.11 - OpenVPN > Validating certificate key usage
. 2016.02.04 20.19.11 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 20.19.11 - OpenVPN > VERIFY KU OK
. 2016.02.04 20.19.11 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 20.19.11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 20.19.11 - OpenVPN > VERIFY EKU OK
. 2016.02.04 20.19.11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 20.19.12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.19.12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.19.12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 20.19.12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 20.19.12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 20.19.12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:35712
. 2016.02.04 20.19.14 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 20.19.14 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.0.108 255.255.0.0'
. 2016.02.04 20.19.14 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 20.19.14 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 20.19.14 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 20.19.14 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 20.19.14 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 20.19.14 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 20.19.14 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 20.19.14 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 20.19.15 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 20.19.15 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 20.19.15 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.0.108/255.255.0.0 [sUCCEEDED]
. 2016.02.04 20.19.15 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.0.108/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 20.19.15 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 20.19.19 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 20.19.19 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.19.19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.19.19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.19 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 20.19.19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.19.19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.19 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.19.19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 20.19.19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.19 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 20.19.19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 20.19.19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.19 - OpenVPN > C:\Windows\system32\route.exe ADD 88.150.241.17 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 20.19.19 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 20.19.19 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 20.19.19 - Starting Management Interface
. 2016.02.04 20.19.19 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 20.19.19 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 20.19.19 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 20.19.20 - Flushing DNS
I 2016.02.04 20.19.20 - Checking route
I 2016.02.04 20.19.30 - Checking DNS
! 2016.02.04 20.19.42 - Connected.
. 2016.02.04 20.19.42 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 20.19.42 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info

 

Share this post


Link to post

You still didn't try a downgrade... download the XP package of OpenVPN, it will contain the old driver.


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

Hi Giga,

 

Thanks for coming back to the thread. I downloaded the TAP driver version 9, but unfortunately, the problem persists. Here are the logs for after the downgrade:

 

I 2016.02.04 23.25.09 - AirVPN client version: 2.10.3 / x64, System: Windows, Name: Microsoft Windows NT 6.2.9200.0 / x64
. 2016.02.04 23.25.09 - Reading options from C:\Users\USER\AppData\Local\AirVPN\AirVPN.xml
. 2016.02.04 23.25.09 - Data Path: C:\Users\USER\AppData\Local\AirVPN
. 2016.02.04 23.25.09 - App Path: C:\Program Files\AirVPN
. 2016.02.04 23.25.09 - Executable Path: C:\Program Files\AirVPN\AirVPN.exe
. 2016.02.04 23.25.09 - Command line arguments (1): path="home"
. 2016.02.04 23.25.09 - Operating System: Microsoft Windows NT 6.2.9200.0
. 2016.02.04 23.25.09 - Updating systems & servers data ...
W 2016.02.04 23.25.09 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.1.
E 2016.02.04 23.25.10 - OpenVPN Driver - Not available
I 2016.02.04 23.25.10 - OpenVPN - Version: OpenVPN 2.3.8 (C:\Program Files\AirVPN\openvpn.exe)
I 2016.02.04 23.25.10 - SSH - Version: plink 0.63 (C:\Program Files\AirVPN\plink.exe)
I 2016.02.04 23.25.10 - SSL - Version: stunnel 5.17 (C:\Program Files\AirVPN\stunnel.exe)
! 2016.02.04 23.25.10 - Activation of Network Lock - Windows Firewall
. 2016.02.04 23.25.10 - Systems & servers data update completed
I 2016.02.04 23.25.12 - Session starting.
W 2016.02.04 23.25.13 - Tunnel driver will be upgraded, from 9.9.2 to 9.21.1.
! 2016.02.04 23.25.13 - Installing tunnel driver
I 2016.02.04 23.25.17 - IPv6 disabled.
I 2016.02.04 23.25.19 - Checking authorization ...
! 2016.02.04 23.25.19 - Connecting to Pherkad (Sweden, Uppsala)
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:19 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:19 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:19 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:19 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\c330be3683c93e0f3eced663cc4a0d6ab06b8bde365af9943ad314accfa5419c.tmp.ssl
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:19 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG5[ui]: Configuration successful
. 2016.02.04 23.25.20 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 23.25.20 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 23.25.20 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 23.25.20 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 23.25.20 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.25.20 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.25.20 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 23.25.20 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:21315 [nonblock]
. 2016.02.04 23.25.20 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:21315
. 2016.02.04 23.25.20 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 23.25.20 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:21315
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:57942
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[0]: s_connect: connecting 62.102.148.180:443
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG5[0]: s_connect: connected 62.102.148.180:443
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:57943
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[0]: SNI: sending servername: 62.102.148.180
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 23.25.20 - SSL > 2016.02.04 23:25:20 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 23.25.20 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:21315, sid=4bfd1796 a3f1b9fe
. 2016.02.04 23.25.21 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 23.25.21 - OpenVPN > Validating certificate key usage
. 2016.02.04 23.25.21 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 23.25.21 - OpenVPN > VERIFY KU OK
. 2016.02.04 23.25.21 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 23.25.21 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 23.25.21 - OpenVPN > VERIFY EKU OK
. 2016.02.04 23.25.21 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 23.25.23 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 23.25.23 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.25.23 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 23.25.23 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.25.23 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 23.25.23 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:21315
. 2016.02.04 23.25.25 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 23.25.25 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.100 255.255.0.0'
. 2016.02.04 23.25.25 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 23.25.25 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 23.25.25 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 23.25.25 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 23.25.25 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 23.25.25 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 23.25.25 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 23.25.25 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 23.25.25 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 23.25.25 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 23.25.25 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.100/255.255.0.0 [sUCCEEDED]
. 2016.02.04 23.25.25 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.100/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 23.25.25 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 23.25.30 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 23.25.30 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 23.25.30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 23.25.30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 23.25.30 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 23.25.30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 23.25.30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 23.25.30 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 23.25.30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 23.25.30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 23.25.30 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 23.25.30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.04 23.25.30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 23.25.30 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.180 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 23.25.30 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 23.25.30 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 23.25.30 - Starting Management Interface
. 2016.02.04 23.25.30 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 23.25.30 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 23.25.30 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 23.25.31 - Flushing DNS
I 2016.02.04 23.25.31 - Checking route
I 2016.02.04 23.25.35 - Checking DNS
! 2016.02.04 23.25.47 - Connected.
. 2016.02.04 23.25.47 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
. 2016.02.04 23.25.47 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.04 23.28.40 - SSL > 2016.02.04 23:28:40 LOG3[0]: SSL_read: Connection reset by peer (WSAECONNRESET) (10054)
. 2016.02.04 23.28.40 - OpenVPN > Connection reset, restarting [-1]
. 2016.02.04 23.28.40 - OpenVPN > SIGUSR1[soft,connection-reset] received, process restarting
. 2016.02.04 23.28.40 - OpenVPN > Restart pause, 5 second(s)
. 2016.02.04 23.28.40 - SSL > 2016.02.04 23:28:40 LOG5[0]: Connection reset: 987914 byte(s) sent to SSL, 6686171 byte(s) sent to socket
! 2016.02.04 23.28.41 - Disconnecting
. 2016.02.04 23.28.41 - Management - Send 'signal SIGTERM'
. 2016.02.04 23.28.41 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.04 23.28.41 - OpenVPN > MANAGEMENT: Client disconnected
. 2016.02.04 23.28.41 - OpenVPN > Assertion failed at misc.c:779
. 2016.02.04 23.28.41 - OpenVPN > Exiting due to fatal error
. 2016.02.04 23.28.41 - Connection terminated.
I 2016.02.04 23.28.42 - DNS of a network adapter restored to original settings (Broadcom 802.11ac Network Adapter)
I 2016.02.04 23.28.42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.04 23.28.45 - Checking authorization ...
! 2016.02.04 23.28.45 - Connecting to Gacrux (Sweden, Uppsala)
. 2016.02.04 23.28.45 - SSL > 2016.02.04 23:28:45 LOG5[ui]: stunnel 5.17 on x86-pc-mingw32-gnu platform
. 2016.02.04 23.28.45 - SSL > 2016.02.04 23:28:45 LOG5[ui]: Compiled/running with OpenSSL 1.0.2a 19 Mar 2015
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:45 LOG5[ui]: Threading:WIN32 Sockets:SELECT,IPv6 TLS:ENGINE,OCSP,PSK,SNI
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:45 LOG5[ui]: Reading configuration from file C:\Users\USER\AppData\Local\AirVPN\6b5a3de4d1e33ccb62a78b6314c8ee342869f9b20daf111e13c7e4f64cfc776b.tmp.ssl
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:45 LOG5[ui]: UTF-8 byte order mark not detected
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:45 LOG6[ui]: Initializing service [openvpn]
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:45 LOG5[ui]: Configuration successful
. 2016.02.04 23.28.46 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.04 23.28.46 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.04 23.28.46 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.04 23.28.46 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.04 23.28.46 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.28.46 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.28.46 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.04 23.28.46 - OpenVPN > Attempting to establish TCP connection with [AF_INET]127.0.0.1:64958 [nonblock]
. 2016.02.04 23.28.46 - OpenVPN > TCP connection established with [AF_INET]127.0.0.1:64958
. 2016.02.04 23.28.46 - OpenVPN > TCPv4_CLIENT link local: [undef]
. 2016.02.04 23.28.46 - OpenVPN > TCPv4_CLIENT link remote: [AF_INET]127.0.0.1:64958
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG5[0]: Service [openvpn] accepted connection from 127.0.0.1:58070
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG6[0]: Failover strategy: round-robin
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG6[0]: s_connect: connecting 62.102.148.174:443
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG5[0]: s_connect: connected 62.102.148.174:443
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG5[0]: Service [openvpn] connected remote server from 192.168.1.102:58071
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG6[0]: SNI: sending servername: 62.102.148.174
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG6[0]: CERT: Locally installed certificate matched
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG5[0]: Certificate accepted at depth=0: C=IT, ST=Italy, L=Perugia, O=AirVPN, OU=stunnel, CN=stunnel.airvpn.org, emailAddress=info@airvpn.org
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG6[0]: SSL connected: new session negotiated
. 2016.02.04 23.28.46 - SSL > 2016.02.04 23:28:46 LOG6[0]: Negotiated TLSv1.2 ciphersuite ECDHE-RSA-AES256-GCM-SHA384 (256-bit encryption)
. 2016.02.04 23.28.46 - OpenVPN > TLS: Initial packet from [AF_INET]127.0.0.1:64958, sid=0a9a7a7d 6d80b798
. 2016.02.04 23.28.47 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.04 23.28.47 - OpenVPN > Validating certificate key usage
. 2016.02.04 23.28.47 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.04 23.28.47 - OpenVPN > VERIFY KU OK
. 2016.02.04 23.28.47 - OpenVPN > Validating certificate extended key usage
. 2016.02.04 23.28.47 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.04 23.28.47 - OpenVPN > VERIFY EKU OK
. 2016.02.04 23.28.47 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.04 23.28.48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 23.28.48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.28.48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.04 23.28.48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.04 23.28.48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.04 23.28.48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]127.0.0.1:64958
. 2016.02.04 23.28.50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.04 23.28.50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.50.0.1,comp-lzo no,route-gateway 10.50.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.50.1.92 255.255.0.0'
. 2016.02.04 23.28.50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.04 23.28.50 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.04 23.28.50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.04 23.28.50 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.04 23.28.50 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.04 23.28.50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.04 23.28.50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.04 23.28.50 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.04 23.28.50 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{83F01768-4B5B-49F4-AC15-0792945BE1A9}.tap
. 2016.02.04 23.28.50 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.04 23.28.50 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.50.0.0/10.50.1.92/255.255.0.0 [sUCCEEDED]
. 2016.02.04 23.28.50 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.50.1.92/255.255.0.0 on interface {83F01768-4B5B-49F4-AC15-0792945BE1A9} [DHCP-serv: 10.50.255.254, lease-time: 31536000]
. 2016.02.04 23.28.50 - OpenVPN > Successful ARP Flush on interface [8] {83F01768-4B5B-49F4-AC15-0792945BE1A9}
. 2016.02.04 23.28.55 - OpenVPN > TEST ROUTES: 2/2 succeeded len=1 ret=1 a=0 u/d=up
. 2016.02.04 23.28.55 - OpenVPN > C:\Windows\system32\route.exe ADD 127.0.0.1 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 23.28.55 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.02.04 23.28.55 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 23.28.55 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 23.28.55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 23.28.55 - OpenVPN > C:\Windows\system32\route.exe ADD 192.168.1.1 MASK 255.255.255.255 192.168.1.1 IF 12
. 2016.02.04 23.28.55 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=12]
. 2016.02.04 23.28.55 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 23.28.55 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 23.28.55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 23.28.55 - OpenVPN > C:\Windows\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 23.28.55 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.02.04 23.28.55 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 23.28.55 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 23.28.55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 23.28.55 - OpenVPN > C:\Windows\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.50.0.1
. 2016.02.04 23.28.55 - OpenVPN > ROUTE: route addition failed using CreateIpForwardEntry: The object already exists.   [status=5010 if_index=8]
. 2016.02.04 23.28.55 - OpenVPN > Route addition via IPAPI failed [adaptive]
. 2016.02.04 23.28.55 - OpenVPN > Route addition fallback to route.exe
. 2016.02.04 23.28.55 - OpenVPN > env_block: add PATH=C:\Windows\System32;C:\WINDOWS;C:\WINDOWS\System32\Wbem
. 2016.02.04 23.28.55 - OpenVPN > C:\Windows\system32\route.exe ADD 62.102.148.174 MASK 255.255.255.255 192.168.1.1
. 2016.02.04 23.28.55 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=25 and dwForwardType=4
. 2016.02.04 23.28.55 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.04 23.28.55 - Starting Management Interface
. 2016.02.04 23.28.55 - OpenVPN > Initialization Sequence Completed
I 2016.02.04 23.28.55 - DNS of a network adapter forced (Broadcom 802.11ac Network Adapter)
I 2016.02.04 23.28.55 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.04 23.28.55 - Flushing DNS
I 2016.02.04 23.28.55 - Checking route

Share this post


Link to post

Yes, because AirVPN upgraded again look through the advanced settings and disable auto-upgrade.

 

 

(Sent via Tapatalk - this generally means I'm not sitting in front of my PC)


Four simple things:
There's a guide to AirVPN. Before you ask questions, take 30 minutes of your time to go through it.

Amazon IPs are not dangerous here. It's the fallback DNS.
Running TOR exits is discouraged. They're subject to restrictions on the internet and harm all AirVPN users.

Furthermore, I propose that your paranoia is to be destroyed. If you overdo privacy, you'll be unique among the mass again.

 

XMPP: gigan3rd@xmpp.airvpn.org or join our lounge@conference.xmpp.airvpn.org

Share this post


Link to post

And now to report back: I had to revert to the 9.21 TAP controller because I was getting a BSOD on Win10 Professional around every 30 minutes with the 9.9 version. I have the Broadcom 802.11n adapter in a Lenovo. I re-installed the Lenovo-issued WLAN driver to make sure that wasn't causing the problem, but unfortunately, that didn't help...

 

I've been considering to get the Intel 802.11ac wireless card for a while, but I'd hate to be forced to do it because of this...

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...