buffybot 0 Posted ... Noob here. AirVPN seems to be unable to connect to any server (including the recommended ones). Any help would be much appreciated. Here are the logs. . 2016.01.29 17:17:17 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:17:17 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:17:17 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=6b07d67a 48bba259. 2016.01.29 17:17:17 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:17:17 - OpenVPN > Validating certificate key usage. 2016.01.29 17:17:17 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:17:17 - OpenVPN > VERIFY KU OK. 2016.01.29 17:17:17 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:17:17 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:17:17 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:17:17 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:17:18 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:18 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:18 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:18 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:18 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:17:18 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:17:20 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:17:20 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:17:20 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:17:20 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:17:20 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:17:20 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:17:20 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:17:21 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:21 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:26 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:26 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:31 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:32 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:37 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:37 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:41 - OpenVPN > NETSH: command failed. 2016.01.29 17:17:41 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:17:41 - Disconnecting. 2016.01.29 17:17:41 - Connection terminated.I 2016.01.29 17:17:44 - Checking authorization ...! 2016.01.29 17:17:44 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:17:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:17:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:17:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:17:45 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:17:45 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:45 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:45 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:17:45 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:17:45 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:17:45 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=1ac16a51 5717bbd0. 2016.01.29 17:17:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:17:45 - OpenVPN > Validating certificate key usage. 2016.01.29 17:17:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:17:45 - OpenVPN > VERIFY KU OK. 2016.01.29 17:17:45 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:17:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:17:45 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:17:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:17:48 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:48 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:48 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:17:48 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:17:48 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:17:48 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:17:50 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:17:50 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:17:50 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:17:50 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:17:50 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:17:50 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:17:50 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:17:51 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:51 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:17:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:17:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:01 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:06 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:06 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:10 - OpenVPN > NETSH: command failed. 2016.01.29 17:18:10 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:18:10 - Disconnecting. 2016.01.29 17:18:10 - Connection terminated.I 2016.01.29 17:18:13 - Checking authorization ...! 2016.01.29 17:18:13 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:18:13 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:18:13 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:18:13 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:18:14 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:18:14 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:14 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:14 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:18:14 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:18:14 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:18:14 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=6c9fe633 c8bdf0d7. 2016.01.29 17:18:14 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:18:14 - OpenVPN > Validating certificate key usage. 2016.01.29 17:18:14 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:18:14 - OpenVPN > VERIFY KU OK. 2016.01.29 17:18:14 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:18:14 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:18:14 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:18:14 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:18:15 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:15 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:15 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:15 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:15 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:18:15 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:18:17 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:18:17 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:18:17 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:18:17 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:18:17 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:18:17 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:18:17 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:18:18 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:18 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:23 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:23 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:28 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:29 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:34 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:34 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:38 - OpenVPN > NETSH: command failed. 2016.01.29 17:18:38 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:18:38 - Disconnecting. 2016.01.29 17:18:38 - Connection terminated.I 2016.01.29 17:18:41 - Checking authorization ...! 2016.01.29 17:18:41 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:18:41 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:18:41 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:18:41 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:18:42 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:18:42 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:18:42 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:18:42 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:18:42 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=d1508e0a a854f080. 2016.01.29 17:18:42 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:18:42 - OpenVPN > Validating certificate key usage. 2016.01.29 17:18:42 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:18:42 - OpenVPN > VERIFY KU OK. 2016.01.29 17:18:42 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:18:42 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:18:42 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:18:42 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:18:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:18:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:18:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:18:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:18:44 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:18:44 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:18:44 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:18:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:18:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:18:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:18:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:18:45 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:18:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:18:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:46 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:51 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:51 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:18:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:18:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:01 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:05 - OpenVPN > NETSH: command failed. 2016.01.29 17:19:05 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:19:05 - Disconnecting. 2016.01.29 17:19:05 - Connection terminated.I 2016.01.29 17:19:09 - Checking authorization ...! 2016.01.29 17:19:09 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:19:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:19:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:19:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:19:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:19:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:09 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:19:09 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:19:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:19:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=fd9cd1c2 86bd646c. 2016.01.29 17:19:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:19:10 - OpenVPN > Validating certificate key usage. 2016.01.29 17:19:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:19:10 - OpenVPN > VERIFY KU OK. 2016.01.29 17:19:10 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:19:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:19:10 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:19:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:19:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:19:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:19:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:19:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:19:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:19:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:19:13 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:19:13 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:19:13 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:19:14 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:14 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:19 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:19 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:24 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:25 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:30 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:30 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:34 - OpenVPN > NETSH: command failed. 2016.01.29 17:19:34 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:19:34 - Disconnecting. 2016.01.29 17:19:34 - Connection terminated.I 2016.01.29 17:19:37 - Checking authorization ...! 2016.01.29 17:19:37 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:19:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:19:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:19:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:19:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:19:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:19:38 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:19:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:19:40 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=3bee3ef7 0e6c37a8. 2016.01.29 17:19:40 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:19:40 - OpenVPN > Validating certificate key usage. 2016.01.29 17:19:40 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:19:40 - OpenVPN > VERIFY KU OK. 2016.01.29 17:19:40 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:19:40 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:19:40 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:19:40 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:19:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:19:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:19:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:19:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:19:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:19:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:19:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:19:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:19:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:19:48 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:19:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:19:49 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:50 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:19:55 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:19:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:20:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:20:02 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:20:07 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:20:07 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:20:11 - OpenVPN > NETSH: command failed. 2016.01.29 17:20:11 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:20:11 - Disconnecting. 2016.01.29 17:20:11 - Connection terminated.I 2016.01.29 17:20:11 - Cancel requested.I 2016.01.29 17:20:11 - IPv6 restored.! 2016.01.29 17:20:11 - Session terminated.I 2016.01.29 17:21:22 - Session starting.I 2016.01.29 17:21:22 - IPv6 disabled.I 2016.01.29 17:21:22 - Checking authorization ...! 2016.01.29 17:21:23 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:21:23 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:21:23 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:21:23 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:21:23 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:21:23 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:23 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:23 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:21:23 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:21:23 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:21:23 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=9743bc5c 44acc1e6. 2016.01.29 17:21:23 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:21:23 - OpenVPN > Validating certificate key usage. 2016.01.29 17:21:23 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:21:23 - OpenVPN > VERIFY KU OK. 2016.01.29 17:21:23 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:21:23 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:21:23 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:21:23 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:21:24 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:24 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:24 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:24 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:24 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:21:24 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:21:26 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:21:26 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:21:26 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:21:26 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:21:26 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:21:26 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:21:26 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:21:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:28 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:33 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:33 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:38 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:38 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:43 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:43 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:21:47 - OpenVPN > NETSH: command failed. 2016.01.29 17:21:47 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:21:47 - Disconnecting. 2016.01.29 17:21:47 - Connection terminated.I 2016.01.29 17:21:51 - Checking authorization ...! 2016.01.29 17:21:51 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:21:51 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:21:51 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:21:51 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:21:51 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:21:51 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:51 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:51 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:21:51 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:21:51 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:21:51 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=da66502f 67a9779f. 2016.01.29 17:21:52 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:21:52 - OpenVPN > Validating certificate key usage. 2016.01.29 17:21:52 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:21:52 - OpenVPN > VERIFY KU OK. 2016.01.29 17:21:52 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:21:52 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:21:52 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:21:52 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:21:52 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:52 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:52 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:21:52 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:21:52 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:21:52 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:21:54 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:21:54 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:21:54 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:21:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:21:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:21:55 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:21:55 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:21:55 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:21:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:21:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:01 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:06 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:06 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:11 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:11 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:15 - OpenVPN > NETSH: command failed. 2016.01.29 17:22:15 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:22:16 - Disconnecting. 2016.01.29 17:22:16 - Connection terminated.I 2016.01.29 17:22:19 - Checking authorization ...! 2016.01.29 17:22:19 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:22:19 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:22:19 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:22:19 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:22:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:22:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:22:19 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:22:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:22:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=a6716048 3abce732. 2016.01.29 17:22:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:22:19 - OpenVPN > Validating certificate key usage. 2016.01.29 17:22:19 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:22:19 - OpenVPN > VERIFY KU OK. 2016.01.29 17:22:19 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:22:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:22:19 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:22:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:22:20 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:20 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:20 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:20 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:20 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:22:20 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:22:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:22:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:22:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:22:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:22:22 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:22:23 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:22:23 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:22:23 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:24 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:29 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:29 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:34 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:35 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:40 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:44 - OpenVPN > NETSH: command failed. 2016.01.29 17:22:44 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:22:44 - Disconnecting. 2016.01.29 17:22:44 - Connection terminated.I 2016.01.29 17:22:47 - Checking authorization ...! 2016.01.29 17:22:47 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:22:47 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:22:47 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:22:47 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:22:48 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:22:48 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:48 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:48 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:22:48 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:22:48 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:22:48 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=cebc831f 7e70887a. 2016.01.29 17:22:48 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:22:48 - OpenVPN > Validating certificate key usage. 2016.01.29 17:22:48 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:22:48 - OpenVPN > VERIFY KU OK. 2016.01.29 17:22:48 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:22:48 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:22:48 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:22:48 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:22:49 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:49 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:49 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:22:49 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:22:49 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:22:49 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:22:51 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:22:51 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:22:51 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:22:51 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:22:51 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:22:51 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:22:51 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:22:52 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:52 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:22:57 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:22:58 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:03 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:03 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:08 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:08 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:12 - OpenVPN > NETSH: command failed. 2016.01.29 17:23:12 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:23:12 - Disconnecting. 2016.01.29 17:23:12 - Connection terminated.I 2016.01.29 17:23:15 - Checking authorization ...! 2016.01.29 17:23:16 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:23:16 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:23:16 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:23:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:23:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:23:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:16 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:23:16 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:23:16 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:23:16 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=e0eb46cc 9d952c57. 2016.01.29 17:23:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:23:16 - OpenVPN > Validating certificate key usage. 2016.01.29 17:23:16 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:23:16 - OpenVPN > VERIFY KU OK. 2016.01.29 17:23:16 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:23:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:23:16 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:23:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:23:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:23:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:23:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:23:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:23:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:23:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:23:19 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:23:19 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:23:19 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:23:20 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:20 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:25 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:26 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:31 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:31 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:36 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:36 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:40 - OpenVPN > NETSH: command failed. 2016.01.29 17:23:40 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:23:40 - Disconnecting. 2016.01.29 17:23:40 - Connection terminated.I 2016.01.29 17:23:43 - Checking authorization ...! 2016.01.29 17:23:44 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:23:44 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:23:44 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:23:44 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:23:44 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:23:44 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:44 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:44 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:23:44 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:23:44 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:23:44 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=54aff796 1bf4cec9. 2016.01.29 17:23:45 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:23:45 - OpenVPN > Validating certificate key usage. 2016.01.29 17:23:45 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:23:45 - OpenVPN > VERIFY KU OK. 2016.01.29 17:23:45 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:23:45 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:23:45 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:23:45 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:23:45 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:45 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:45 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:23:45 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:23:45 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:23:45 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:23:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:23:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:23:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:23:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:23:48 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:23:48 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:23:48 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:23:49 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:49 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:54 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:23:54 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:23:59 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:00 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:05 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:05 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:09 - OpenVPN > NETSH: command failed. 2016.01.29 17:24:09 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:24:09 - Disconnecting. 2016.01.29 17:24:09 - Connection terminated.I 2016.01.29 17:24:12 - Checking authorization ...! 2016.01.29 17:24:12 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:24:12 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:24:12 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:24:12 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:24:13 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:24:13 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:13 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:13 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:24:13 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:24:13 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:24:15 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=1226d483 0b335ecd. 2016.01.29 17:24:15 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:24:15 - OpenVPN > Validating certificate key usage. 2016.01.29 17:24:15 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:24:15 - OpenVPN > VERIFY KU OK. 2016.01.29 17:24:15 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:24:15 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:24:15 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:24:15 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:24:16 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:16 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:16 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:16 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:16 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:24:16 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:24:18 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:24:18 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:24:18 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:24:18 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:24:18 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:24:19 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:24:19 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:24:19 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:20 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:25 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:25 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:30 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:30 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:35 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:35 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:39 - OpenVPN > NETSH: command failed. 2016.01.29 17:24:39 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:24:39 - Disconnecting. 2016.01.29 17:24:39 - Connection terminated.I 2016.01.29 17:24:43 - Checking authorization ...! 2016.01.29 17:24:43 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:24:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:24:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:24:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:24:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:24:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:43 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:24:43 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:24:43 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:24:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=10f5d139 36348a4b. 2016.01.29 17:24:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:24:44 - OpenVPN > Validating certificate key usage. 2016.01.29 17:24:44 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:24:44 - OpenVPN > VERIFY KU OK. 2016.01.29 17:24:44 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:24:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:24:44 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:24:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:24:44 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:44 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:44 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:24:44 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:24:44 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:24:44 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:24:46 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:24:46 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:24:46 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:24:46 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:24:46 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:24:47 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:24:47 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:24:47 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:48 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:53 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:53 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:24:58 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:24:58 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:03 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:03 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:07 - OpenVPN > NETSH: command failed. 2016.01.29 17:25:07 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:25:07 - Disconnecting. 2016.01.29 17:25:07 - Connection terminated.I 2016.01.29 17:25:11 - Checking authorization ...! 2016.01.29 17:25:11 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:25:11 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:25:11 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:25:11 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:25:11 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:25:11 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:11 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:11 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:25:11 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:25:11 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:25:11 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=9720d124 d8b78a9f. 2016.01.29 17:25:11 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:25:11 - OpenVPN > Validating certificate key usage. 2016.01.29 17:25:11 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:25:11 - OpenVPN > VERIFY KU OK. 2016.01.29 17:25:11 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:25:11 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:25:11 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:25:11 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:25:12 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:12 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:12 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:12 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:12 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:25:12 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:25:15 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:25:15 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:25:15 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:25:15 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:25:15 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:25:15 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:25:15 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:25:16 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:16 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:21 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:21 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:26 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:26 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:31 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:31 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:35 - OpenVPN > NETSH: command failed. 2016.01.29 17:25:35 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:25:35 - Disconnecting. 2016.01.29 17:25:35 - Connection terminated.I 2016.01.29 17:25:38 - Checking authorization ...! 2016.01.29 17:25:38 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:25:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:25:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:25:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:25:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:25:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:25:38 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:25:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:25:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=1425f6cb 7a34d055. 2016.01.29 17:25:39 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:25:39 - OpenVPN > Validating certificate key usage. 2016.01.29 17:25:39 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:25:39 - OpenVPN > VERIFY KU OK. 2016.01.29 17:25:39 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:25:39 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:25:39 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:25:39 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:25:42 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:42 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:42 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:25:42 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:25:42 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:25:42 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:25:45 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:25:45 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:25:45 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:25:45 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:25:45 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:25:45 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:25:45 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:25:46 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:46 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:51 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:51 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:25:56 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:25:56 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:01 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:02 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:06 - OpenVPN > NETSH: command failed. 2016.01.29 17:26:06 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:26:06 - Disconnecting. 2016.01.29 17:26:06 - Connection terminated.I 2016.01.29 17:26:09 - Checking authorization ...! 2016.01.29 17:26:09 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:26:09 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:26:09 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:26:09 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:26:09 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:26:09 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:09 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:09 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:26:09 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:26:09 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:26:09 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=f00b1532 28006010. 2016.01.29 17:26:10 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:26:10 - OpenVPN > Validating certificate key usage. 2016.01.29 17:26:10 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:26:10 - OpenVPN > VERIFY KU OK. 2016.01.29 17:26:10 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:26:10 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:26:10 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:26:10 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:26:10 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:10 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:10 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:10 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:10 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:26:10 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:26:13 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:26:13 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:26:13 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:26:13 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:26:13 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:26:13 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:26:13 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:26:14 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:14 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:19 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:19 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:24 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:25 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:30 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:30 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:34 - OpenVPN > NETSH: command failed. 2016.01.29 17:26:34 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:26:34 - Disconnecting. 2016.01.29 17:26:34 - Connection terminated.I 2016.01.29 17:26:37 - Checking authorization ...! 2016.01.29 17:26:37 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:26:38 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:26:38 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:26:38 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:26:38 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:26:38 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:38 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:38 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:26:38 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:26:38 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:26:38 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=b766cf19 500a6a91. 2016.01.29 17:26:38 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:26:38 - OpenVPN > Validating certificate key usage. 2016.01.29 17:26:38 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:26:38 - OpenVPN > VERIFY KU OK. 2016.01.29 17:26:38 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:26:38 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:26:38 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:26:38 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:26:39 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:39 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:39 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:26:39 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:26:39 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:26:39 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:26:41 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:26:41 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:26:41 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:26:41 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:26:41 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:26:41 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:26:41 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:26:42 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:43 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:48 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:48 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:53 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:53 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:26:58 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:26:58 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:02 - OpenVPN > NETSH: command failed. 2016.01.29 17:27:02 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:27:02 - Disconnecting. 2016.01.29 17:27:02 - Connection terminated.I 2016.01.29 17:27:06 - Checking authorization ...! 2016.01.29 17:27:06 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:27:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:27:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:27:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:27:07 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:27:07 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:07 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:07 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:27:07 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:27:07 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:27:07 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=777ee322 97dd1667. 2016.01.29 17:27:07 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:27:07 - OpenVPN > Validating certificate key usage. 2016.01.29 17:27:07 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:27:07 - OpenVPN > VERIFY KU OK. 2016.01.29 17:27:07 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:27:07 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:27:07 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:27:07 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:27:08 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:08 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:08 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:08 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:08 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:27:08 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:27:10 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:27:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:27:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:27:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:27:10 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:27:10 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:27:10 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:27:11 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:11 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:16 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:17 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:22 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:22 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:27 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:31 - OpenVPN > NETSH: command failed. 2016.01.29 17:27:31 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:27:31 - Disconnecting. 2016.01.29 17:27:31 - Connection terminated.I 2016.01.29 17:27:34 - Checking authorization ...! 2016.01.29 17:27:35 - Connecting to Diphda (Netherlands, Alblasserdam). 2016.01.29 17:27:35 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015. 2016.01.29 17:27:35 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08. 2016.01.29 17:27:35 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100. 2016.01.29 17:27:35 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file. 2016.01.29 17:27:35 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:35 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:35 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]. 2016.01.29 17:27:35 - OpenVPN > UDPv4 link local: [undef]. 2016.01.29 17:27:35 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.164:443. 2016.01.29 17:27:35 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.164:443, sid=0ce3656d 80900d2e. 2016.01.29 17:27:35 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org. 2016.01.29 17:27:35 - OpenVPN > Validating certificate key usage. 2016.01.29 17:27:35 - OpenVPN > ++ Certificate has key usage 00a0, expects 00a0. 2016.01.29 17:27:35 - OpenVPN > VERIFY KU OK. 2016.01.29 17:27:35 - OpenVPN > Validating certificate extended key usage. 2016.01.29 17:27:35 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication. 2016.01.29 17:27:35 - OpenVPN > VERIFY EKU OK. 2016.01.29 17:27:35 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org. 2016.01.29 17:27:36 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:36 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:36 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key. 2016.01.29 17:27:36 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication. 2016.01.29 17:27:36 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA. 2016.01.29 17:27:36 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.164:443. 2016.01.29 17:27:38 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1). 2016.01.29 17:27:38 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.39 255.255.0.0'. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: LZO parms modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: route options modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: route-related options modified. 2016.01.29 17:27:38 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified. 2016.01.29 17:27:39 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0. 2016.01.29 17:27:39 - OpenVPN > open_tun, tt->ipv6=0. 2016.01.29 17:27:39 - OpenVPN > TAP-WIN32 device [TunnelTap] opened: \\.\Global\{46405A0C-D446-42BD-BF32-91B6E42C87CC}.tap. 2016.01.29 17:27:39 - OpenVPN > TAP-Windows Driver Version 9.21. 2016.01.29 17:27:40 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:40 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:45 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:45 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:50 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:50 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:55 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp. 2016.01.29 17:27:55 - OpenVPN > ERROR: netsh command failed: returned error code 1. 2016.01.29 17:27:59 - OpenVPN > NETSH: command failed. 2016.01.29 17:27:59 - OpenVPN > Exiting due to fatal error! 2016.01.29 17:28:00 - Disconnecting. 2016.01.29 17:28:00 - Connection terminated.I 2016.01.29 17:28:00 - Cancel requested.I 2016.01.29 17:28:00 - IPv6 restored.! 2016.01.29 17:28:00 - Session terminated. Quote Share this post Link to post
OpenSourcerer 1441 Posted ... Oh my god, please engulf this pile of text in spoiler tags! [spoiler]logs here[/spoiler] . 2016.01.29 17:27:27 - OpenVPN > NETSH: C:\windows\system32\netsh.exe interface ip set address TunnelTap dhcp . 2016.01.29 17:27:27 - OpenVPN > ERROR: netsh command failed: returned error code 1 Here is the problem, and obviously we had this issue in the past.Failed to StartAirVPN failed to start. Additionally, a quick intenet search led me to [Closed] ERROR: netsh command failed: returned error code 1. Let us know if some of these helped you. Quote Hide OpenSourcerer's signature Hide all signatures NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT. LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too! Want to contact me directly? All relevant methods are on my About me page. Share this post Link to post