Jump to content
Not connected, Your IP: 3.149.26.176
zyzz

DNS checking failed?

Recommended Posts

Hello Guys,

 

im really new and never had a VPN Client on my Computer. I just bought airvpn because of recommendation from other people.

Everytime wehn i start to connect to a Server it always shows me DNS checking failed and i cant seem to fix this problem

 

LOG:

 

! 2016.02.05 21:07:26 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:07:26 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:07:26 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:07:26 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:07:26 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:07:26 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:26 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:26 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:07:26 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:07:26 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:07:26 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=074fce8b dba4e635
. 2016.02.05 21:07:27 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:07:27 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:07:27 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:07:27 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:07:27 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:07:27 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:07:27 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:07:27 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:07:27 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:07:27 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:27 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:07:27 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:27 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:07:27 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:07:29 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:07:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:07:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:07:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:07:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:07:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:07:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:07:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:07:30 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:07:30 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:07:30 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:07:30 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:07:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:07:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:07:30 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:07:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:07:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:07:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:07:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:35 - Starting Management Interface
. 2016.02.05 21:07:35 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:07:35 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:07:35 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:07:35 - Flushing DNS
I 2016.02.05 21:07:35 - Checking route
I 2016.02.05 21:07:35 - Checking DNS
E 2016.02.05 21:07:35 - DNS checking failed.
. 2016.02.05 21:07:35 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:07:35 - Disconnecting
. 2016.02.05 21:07:35 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:07:35 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:07:35 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:07:35 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:07:40 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:07:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:40 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:07:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:40 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:40 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:40 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:40 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:07:40 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:07:40 - Connection terminated.
I 2016.02.05 21:07:40 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:07:40 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:07:43 - Checking authorization ...
! 2016.02.05 21:07:43 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:07:43 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:07:43 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:07:43 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:07:43 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:07:43 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:43 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:43 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:07:43 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:07:43 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:07:43 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=db3d7c4b 9024e00a
. 2016.02.05 21:07:44 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:07:44 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:07:44 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:07:44 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:07:44 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:07:44 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:07:44 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:07:44 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:07:46 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:07:46 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:46 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:07:46 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:07:46 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:07:46 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:07:48 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:07:48 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:07:48 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:07:48 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:07:48 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:07:48 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:07:48 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:07:48 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:07:48 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:07:48 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:07:48 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:07:48 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:07:48 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:07:48 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:07:48 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:07:53 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:07:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:07:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:53 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:53 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:07:53 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:53 - Starting Management Interface
. 2016.02.05 21:07:53 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:07:53 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:07:53 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:07:53 - Flushing DNS
I 2016.02.05 21:07:53 - Checking route
I 2016.02.05 21:07:53 - Checking DNS
E 2016.02.05 21:07:53 - DNS checking failed.
. 2016.02.05 21:07:53 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:07:53 - Disconnecting
. 2016.02.05 21:07:53 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:07:53 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:07:53 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:07:53 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:07:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:07:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:07:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:58 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:07:58 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:07:58 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:07:58 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:07:58 - Connection terminated.
I 2016.02.05 21:07:58 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:07:58 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:08:00 - Cancel requested.
I 2016.02.05 21:08:00 - IPv6 restored.
! 2016.02.05 21:08:00 - Session terminated.
I 2016.02.05 21:08:06 - Session starting.
I 2016.02.05 21:08:06 - IPv6 disabled.
I 2016.02.05 21:08:06 - Checking authorization ...
! 2016.02.05 21:08:06 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:08:06 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:08:06 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:08:06 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:08:06 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:08:06 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:06 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:06 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:08:06 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:08:06 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:08:06 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=71cdafb2 32e7c3cc
. 2016.02.05 21:08:06 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:08:06 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:08:06 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:08:06 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:08:06 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:08:06 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:08:06 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:08:06 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:08:07 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:08:07 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:07 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:08:07 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:07 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:08:07 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:08:09 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:08:10 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:08:10 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:08:10 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:08:10 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:08:10 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:08:10 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:08:10 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:08:10 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:08:10 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:08:10 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:08:10 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:08:10 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:08:10 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:08:10 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:08:15 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:08:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:08:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:08:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:15 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:15 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:15 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:15 - Starting Management Interface
. 2016.02.05 21:08:15 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:08:15 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:08:15 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:08:15 - Flushing DNS
I 2016.02.05 21:08:15 - Checking route
I 2016.02.05 21:08:16 - Checking DNS
E 2016.02.05 21:08:16 - DNS checking failed.
. 2016.02.05 21:08:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:08:16 - Disconnecting
. 2016.02.05 21:08:16 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:08:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:08:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:08:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:08:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:08:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:08:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:21 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:08:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:08:21 - Connection terminated.
I 2016.02.05 21:08:21 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:08:21 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:08:24 - Checking authorization ...
! 2016.02.05 21:08:24 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:08:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:08:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:08:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:08:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:08:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:08:24 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:08:24 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:08:24 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=818d7427 8d3d7d93
. 2016.02.05 21:08:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:08:25 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:08:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:08:25 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:08:25 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:08:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:08:25 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:08:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:08:28 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:08:28 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:28 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:08:28 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:08:28 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:08:28 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:08:30 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:08:30 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:08:30 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:08:30 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:08:30 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:08:30 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:08:30 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:08:30 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:08:30 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:08:30 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:08:30 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:08:30 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:08:30 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:08:30 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:08:30 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:08:35 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:08:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:08:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:08:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:35 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:35 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:08:35 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:35 - Starting Management Interface
. 2016.02.05 21:08:35 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:08:35 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:08:35 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:08:35 - Flushing DNS
I 2016.02.05 21:08:35 - Checking route
I 2016.02.05 21:08:36 - Checking DNS
E 2016.02.05 21:08:36 - DNS checking failed.
. 2016.02.05 21:08:36 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:08:36 - Disconnecting
. 2016.02.05 21:08:36 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:08:36 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:08:36 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:08:36 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:08:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:08:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:08:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:41 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:08:41 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:08:41 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:08:41 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:08:41 - Connection terminated.
I 2016.02.05 21:08:41 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:08:41 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:08:41 - Cancel requested.
I 2016.02.05 21:08:41 - IPv6 restored.
! 2016.02.05 21:08:41 - Session terminated.
I 2016.02.05 21:11:29 - Session starting.
I 2016.02.05 21:11:29 - IPv6 disabled.
I 2016.02.05 21:11:29 - Checking authorization ...
! 2016.02.05 21:11:29 - Connecting to Alchiba (Netherlands, Alblasserdam)
. 2016.02.05 21:11:29 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:11:29 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:11:29 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:11:29 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:11:29 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:11:29 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:11:29 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:11:29 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:11:29 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.161.180:443
. 2016.02.05 21:11:29 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.161.180:443, sid=da8b521a e98b72a5
. 2016.02.05 21:11:30 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:11:30 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:11:30 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:11:30 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:11:30 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:11:30 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:11:30 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:11:30 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:11:32 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:11:32 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:11:32 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:11:32 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:11:32 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:11:32 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.161.180:443
. 2016.02.05 21:11:34 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:11:34 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.46.73 255.255.0.0'
. 2016.02.05 21:11:34 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:11:34 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:11:34 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:11:34 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:11:34 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:11:34 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:11:34 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:11:34 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:11:34 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:11:34 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:11:34 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.46.73/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:11:34 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.46.73/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:11:34 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:11:39 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:11:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.161.180 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:11:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:11:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:11:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:11:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:11:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:11:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:39 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:11:39 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:11:39 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:39 - Starting Management Interface
. 2016.02.05 21:11:39 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:11:39 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:11:39 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:11:39 - Flushing DNS
I 2016.02.05 21:11:39 - Checking route
I 2016.02.05 21:11:43 - Checking DNS
E 2016.02.05 21:11:43 - DNS checking failed.
. 2016.02.05 21:11:43 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:11:43 - Disconnecting
. 2016.02.05 21:11:43 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:11:43 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:11:43 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:11:43 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:11:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.161.180 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:11:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:11:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:11:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:48 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:11:48 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:11:48 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:11:48 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:11:48 - Connection terminated.
I 2016.02.05 21:11:48 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:11:48 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:11:50 - Cancel requested.
I 2016.02.05 21:11:50 - IPv6 restored.
! 2016.02.05 21:11:50 - Session terminated.
I 2016.02.05 21:14:18 - Session starting.
I 2016.02.05 21:14:18 - IPv6 disabled.
I 2016.02.05 21:14:18 - Checking authorization ...
! 2016.02.05 21:14:18 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:14:18 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:14:18 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:14:18 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:14:19 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:14:19 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:19 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:19 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:14:19 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:14:19 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:14:19 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=5c4fb442 89f8d14a
. 2016.02.05 21:14:19 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:14:19 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:14:19 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:14:19 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:14:19 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:14:19 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:14:19 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:14:19 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:14:19 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:14:19 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:19 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:14:19 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:19 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:14:19 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:14:22 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:14:22 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:14:22 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:14:22 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:14:22 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:14:22 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:14:22 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:14:22 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:14:22 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:14:22 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:14:22 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:14:22 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:14:22 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:14:22 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:14:22 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:14:27 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:14:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:14:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:14:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:27 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:27 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:27 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:27 - Starting Management Interface
. 2016.02.05 21:14:27 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:14:27 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:14:27 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:14:27 - Flushing DNS
I 2016.02.05 21:14:27 - Checking route
I 2016.02.05 21:14:27 - Checking DNS
E 2016.02.05 21:14:27 - DNS checking failed.
. 2016.02.05 21:14:27 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:14:28 - Disconnecting
. 2016.02.05 21:14:28 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:14:28 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:14:28 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:14:28 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:14:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:14:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:14:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:33 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:33 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:33 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:14:33 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:14:33 - Connection terminated.
I 2016.02.05 21:14:33 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:14:33 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:14:36 - Checking authorization ...
! 2016.02.05 21:14:37 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:14:37 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:14:37 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:14:37 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:14:37 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:14:37 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:37 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:37 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:14:37 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:14:37 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:14:37 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=fa36e68b 795d9efb
. 2016.02.05 21:14:37 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:14:37 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:14:37 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:14:37 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:14:37 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:14:37 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:14:37 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:14:37 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:14:38 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:14:38 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:38 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:14:38 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:38 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:14:38 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:14:40 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:14:40 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:14:40 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:14:40 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:14:40 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:14:40 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:14:40 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:14:40 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:14:40 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:14:40 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:14:40 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:14:40 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:14:40 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:14:40 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:14:40 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:14:45 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:14:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:45 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:45 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:14:45 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:45 - Starting Management Interface
. 2016.02.05 21:14:45 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:14:45 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:14:45 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:14:45 - Flushing DNS
I 2016.02.05 21:14:45 - Checking route
I 2016.02.05 21:14:45 - Checking DNS
E 2016.02.05 21:14:45 - DNS checking failed.
. 2016.02.05 21:14:45 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:14:45 - Disconnecting
. 2016.02.05 21:14:45 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:14:45 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:14:45 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:14:45 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:14:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:14:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:14:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:50 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:14:50 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:14:50 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:14:50 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:14:50 - Connection terminated.
I 2016.02.05 21:14:50 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:14:50 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:14:50 - Cancel requested.
I 2016.02.05 21:14:50 - IPv6 restored.
! 2016.02.05 21:14:50 - Session terminated.
I 2016.02.05 21:14:52 - Session starting.
I 2016.02.05 21:14:52 - IPv6 disabled.
I 2016.02.05 21:14:52 - Checking authorization ...
! 2016.02.05 21:14:52 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:14:52 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:14:52 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:14:52 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:14:52 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:14:52 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:52 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:52 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:14:52 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:14:52 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:14:52 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=74143700 4deccf52
. 2016.02.05 21:14:53 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:14:53 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:14:53 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:14:53 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:14:53 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:14:53 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:14:53 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:14:53 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:14:53 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:14:53 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:53 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:14:53 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:14:53 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:14:53 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:14:55 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:14:55 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:14:55 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:14:55 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:14:55 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:14:55 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:14:55 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:14:55 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:14:55 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:14:55 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:14:56 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:14:56 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:14:56 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:14:56 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:14:56 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:15:00 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:15:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:15:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:00 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:00 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:00 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:00 - Starting Management Interface
. 2016.02.05 21:15:00 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:15:00 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:15:00 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:15:00 - Flushing DNS
I 2016.02.05 21:15:00 - Checking route
I 2016.02.05 21:15:00 - Checking DNS
E 2016.02.05 21:15:00 - DNS checking failed.
. 2016.02.05 21:15:00 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:15:00 - Disconnecting
. 2016.02.05 21:15:00 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:15:00 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:15:00 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:15:00 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:15:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:05 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:05 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:05 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:15:05 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:15:05 - Connection terminated.
I 2016.02.05 21:15:05 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:15:05 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:15:08 - Checking authorization ...
! 2016.02.05 21:15:08 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:15:08 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:15:08 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:15:08 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:15:08 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:15:08 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:08 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:08 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:15:08 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:15:08 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:15:08 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=767d733c 29dc92d1
. 2016.02.05 21:15:09 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:15:09 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:15:09 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:15:09 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:15:09 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:15:09 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:15:09 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:15:09 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:15:09 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:15:09 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:09 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:15:09 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:09 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:15:09 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:15:11 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:15:11 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:15:11 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:15:11 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:15:11 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:15:11 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:15:11 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:15:11 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:15:11 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:15:11 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:15:11 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:15:11 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:15:11 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:15:11 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:15:11 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:15:16 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:15:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:15:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:16 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:16 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:16 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:16 - Starting Management Interface
. 2016.02.05 21:15:16 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:15:16 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:15:16 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:15:16 - Flushing DNS
I 2016.02.05 21:15:16 - Checking route
I 2016.02.05 21:15:16 - Checking DNS
E 2016.02.05 21:15:16 - DNS checking failed.
. 2016.02.05 21:15:16 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:15:16 - Disconnecting
. 2016.02.05 21:15:16 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:15:16 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:15:16 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:15:16 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:15:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:21 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:21 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:21 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:15:21 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:15:21 - Connection terminated.
I 2016.02.05 21:15:21 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:15:21 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:15:24 - Checking authorization ...
! 2016.02.05 21:15:24 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:15:24 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:15:24 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:15:24 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:15:24 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:15:24 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:24 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:24 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:15:24 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:15:24 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:15:24 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=2bc083a6 0d7e85d9
. 2016.02.05 21:15:25 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:15:25 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:15:25 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:15:25 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:15:25 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:15:25 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:15:25 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:15:25 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:15:30 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:15:30 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:30 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:15:30 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:15:30 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:15:30 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:15:32 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:15:32 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:15:32 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:15:32 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:15:32 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:15:32 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:15:32 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:15:32 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:15:32 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:15:32 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:15:32 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:15:32 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:15:32 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:15:32 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:15:32 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:15:37 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:15:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:15:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:37 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:37 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:15:37 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:37 - Starting Management Interface
. 2016.02.05 21:15:37 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:15:37 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:15:37 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:15:37 - Flushing DNS
I 2016.02.05 21:15:37 - Checking route
I 2016.02.05 21:15:37 - Checking DNS
E 2016.02.05 21:15:37 - DNS checking failed.
. 2016.02.05 21:15:37 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:15:37 - Disconnecting
. 2016.02.05 21:15:37 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:15:37 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:15:37 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:15:37 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:15:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:15:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:42 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:15:42 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:15:42 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:15:42 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:15:42 - Connection terminated.
I 2016.02.05 21:15:42 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:15:42 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:15:44 - Cancel requested.
I 2016.02.05 21:15:44 - IPv6 restored.
! 2016.02.05 21:15:44 - Session terminated.
I 2016.02.05 21:18:53 - Session starting.
I 2016.02.05 21:18:54 - IPv6 disabled.
I 2016.02.05 21:18:54 - Checking authorization ...
! 2016.02.05 21:18:54 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:18:54 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:18:54 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:18:54 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:18:54 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:18:54 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:18:54 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:18:54 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:18:54 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:18:54 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:18:54 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=544fc07b e3655d9e
. 2016.02.05 21:18:54 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:18:54 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:18:54 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:18:54 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:18:54 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:18:54 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:18:54 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:18:54 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:18:55 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:18:55 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:18:55 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:18:55 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:18:55 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:18:55 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:18:57 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:18:57 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:18:57 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:18:57 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:18:57 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:18:57 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:18:57 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:18:57 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:18:57 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:18:58 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:18:58 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:18:58 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:18:58 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:18:58 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:18:58 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:19:03 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:19:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:19:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:19:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:03 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:03 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:03 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:03 - Starting Management Interface
. 2016.02.05 21:19:03 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:19:03 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:19:03 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:19:03 - Flushing DNS
I 2016.02.05 21:19:03 - Checking route
I 2016.02.05 21:19:07 - Checking DNS
E 2016.02.05 21:19:07 - DNS checking failed.
. 2016.02.05 21:19:07 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:19:08 - Disconnecting
. 2016.02.05 21:19:08 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:19:08 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:19:08 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:19:08 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:19:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:19:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:19:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:13 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:13 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:13 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:19:13 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:19:13 - Connection terminated.
I 2016.02.05 21:19:13 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:19:13 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:19:16 - Checking authorization ...
! 2016.02.05 21:19:16 - Connecting to Sheliak (Netherlands, Alblasserdam)
. 2016.02.05 21:19:16 - OpenVPN > OpenVPN 2.3.8 x86_64-w64-mingw32 [sSL (OpenSSL)] [LZO] [iPv6] built on Aug 13 2015
. 2016.02.05 21:19:16 - OpenVPN > library versions: OpenSSL 1.0.2d 9 Jul 2015, LZO 2.08
. 2016.02.05 21:19:16 - OpenVPN > MANAGEMENT: TCP Socket listening on [AF_INET]127.0.0.1:3100
. 2016.02.05 21:19:16 - OpenVPN > Control Channel Authentication: tls-auth using INLINE static key file
. 2016.02.05 21:19:16 - OpenVPN > Outgoing Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:19:16 - OpenVPN > Incoming Control Channel Authentication: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:19:16 - OpenVPN > Socket Buffers: R=[65536->131072] S=[65536->131072]
. 2016.02.05 21:19:16 - OpenVPN > UDPv4 link local: [undef]
. 2016.02.05 21:19:16 - OpenVPN > UDPv4 link remote: [AF_INET]213.152.162.113:443
. 2016.02.05 21:19:16 - OpenVPN > TLS: Initial packet from [AF_INET]213.152.162.113:443, sid=adc8acea 65364e8f
. 2016.02.05 21:19:16 - OpenVPN > VERIFY OK: depth=1, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
. 2016.02.05 21:19:16 - OpenVPN > Validating certificate key usage
. 2016.02.05 21:19:16 - OpenVPN > ++ Certificate has key usage  00a0, expects 00a0
. 2016.02.05 21:19:16 - OpenVPN > VERIFY KU OK
. 2016.02.05 21:19:16 - OpenVPN > Validating certificate extended key usage
. 2016.02.05 21:19:16 - OpenVPN > ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication
. 2016.02.05 21:19:16 - OpenVPN > VERIFY EKU OK
. 2016.02.05 21:19:16 - OpenVPN > VERIFY OK: depth=0, C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
. 2016.02.05 21:19:17 - OpenVPN > Data Channel Encrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:19:17 - OpenVPN > Data Channel Encrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:19:17 - OpenVPN > Data Channel Decrypt: Cipher 'AES-256-CBC' initialized with 256 bit key
. 2016.02.05 21:19:17 - OpenVPN > Data Channel Decrypt: Using 160 bit message hash 'SHA1' for HMAC authentication
. 2016.02.05 21:19:17 - OpenVPN > Control Channel: TLSv1.2, cipher TLSv1/SSLv3 DHE-RSA-AES256-GCM-SHA384, 4096 bit RSA
. 2016.02.05 21:19:17 - OpenVPN > [server] Peer Connection Initiated with [AF_INET]213.152.162.113:443
. 2016.02.05 21:19:19 - OpenVPN > SENT CONTROL [server]: 'PUSH_REQUEST' (status=1)
. 2016.02.05 21:19:19 - OpenVPN > PUSH: Received control message: 'PUSH_REPLY,redirect-gateway def1 bypass-dhcp,dhcp-option DNS 10.4.0.1,comp-lzo no,route-gateway 10.4.0.1,topology subnet,ping 10,ping-restart 60,ifconfig 10.4.51.130 255.255.0.0'
. 2016.02.05 21:19:19 - OpenVPN > OPTIONS IMPORT: timers and/or timeouts modified
. 2016.02.05 21:19:19 - OpenVPN > OPTIONS IMPORT: LZO parms modified
. 2016.02.05 21:19:19 - OpenVPN > OPTIONS IMPORT: --ifconfig/up options modified
. 2016.02.05 21:19:19 - OpenVPN > OPTIONS IMPORT: route options modified
. 2016.02.05 21:19:19 - OpenVPN > OPTIONS IMPORT: route-related options modified
. 2016.02.05 21:19:19 - OpenVPN > OPTIONS IMPORT: --ip-win32 and/or --dhcp-option options modified
. 2016.02.05 21:19:19 - OpenVPN > do_ifconfig, tt->ipv6=0, tt->did_ifconfig_ipv6_setup=0
. 2016.02.05 21:19:19 - OpenVPN > open_tun, tt->ipv6=0
. 2016.02.05 21:19:20 - OpenVPN > TAP-WIN32 device [Ethernet 2] opened: \\.\Global\{2ED70E4F-05BB-410A-8318-A047B4637219}.tap
. 2016.02.05 21:19:20 - OpenVPN > TAP-Windows Driver Version 9.21
. 2016.02.05 21:19:20 - OpenVPN > Set TAP-Windows TUN subnet mode network/local/netmask = 10.4.0.0/10.4.51.130/255.255.0.0 [sUCCEEDED]
. 2016.02.05 21:19:20 - OpenVPN > Notified TAP-Windows driver to set a DHCP IP/netmask of 10.4.51.130/255.255.0.0 on interface {2ED70E4F-05BB-410A-8318-A047B4637219} [DHCP-serv: 10.4.255.254, lease-time: 31536000]
. 2016.02.05 21:19:20 - OpenVPN > Successful ARP Flush on interface [28] {2ED70E4F-05BB-410A-8318-A047B4637219}
. 2016.02.05 21:19:24 - OpenVPN > TEST ROUTES: 1/1 succeeded len=0 ret=1 a=0 u/d=up
. 2016.02.05 21:19:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:19:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 192.168.2.1 MASK 255.255.255.255 192.168.2.1 IF 11
. 2016.02.05 21:19:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:24 - OpenVPN > C:\WINDOWS\system32\route.exe ADD 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:24 - OpenVPN > ROUTE: CreateIpForwardEntry succeeded with dwForwardMetric1=20 and dwForwardType=4
. 2016.02.05 21:19:24 - OpenVPN > Route addition via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:24 - Starting Management Interface
. 2016.02.05 21:19:24 - OpenVPN > Initialization Sequence Completed
I 2016.02.05 21:19:24 - DNS of a network adapter forced (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:19:24 - DNS of a network adapter forced (TAP-Windows Adapter V9)
I 2016.02.05 21:19:24 - Flushing DNS
I 2016.02.05 21:19:24 - Checking route
I 2016.02.05 21:19:24 - Checking DNS
E 2016.02.05 21:19:24 - DNS checking failed.
. 2016.02.05 21:19:24 - OpenVPN > MANAGEMENT: Client connected from [AF_INET]127.0.0.1:3100
! 2016.02.05 21:19:24 - Disconnecting
. 2016.02.05 21:19:24 - Management - Send 'signal SIGTERM'
. 2016.02.05 21:19:24 - OpenVpn Management > >INFO:OpenVPN Management Interface Version 1 -- type 'help' for more info
. 2016.02.05 21:19:24 - OpenVPN > MANAGEMENT: CMD 'signal SIGTERM'
. 2016.02.05 21:19:24 - OpenVPN > SIGTERM received, sending exit notification to peer
. 2016.02.05 21:19:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 213.152.162.113 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:19:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 192.168.2.1 MASK 255.255.255.255 192.168.2.1
. 2016.02.05 21:19:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 0.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:29 - OpenVPN > C:\WINDOWS\system32\route.exe DELETE 128.0.0.0 MASK 128.0.0.0 10.4.0.1
. 2016.02.05 21:19:29 - OpenVPN > Route deletion via IPAPI succeeded [adaptive]
. 2016.02.05 21:19:29 - OpenVPN > Closing TUN/TAP interface
. 2016.02.05 21:19:29 - OpenVPN > SIGTERM[soft,exit-with-notification] received, process exiting
. 2016.02.05 21:19:29 - Connection terminated.
I 2016.02.05 21:19:29 - DNS of a network adapter restored to original settings (Realtek PCIe GBE Family Controller)
I 2016.02.05 21:19:29 - DNS of a network adapter restored to original settings (TAP-Windows Adapter V9)
I 2016.02.05 21:19:29 - Cancel requested.
I 2016.02.05 21:19:29 - IPv6 restored.
! 2016.02.05 21:19:29 - Session terminated.
 
 
 
 
 
Thanks for any help
 
 
Greetings Zyzz 

Share this post


Link to post

I don't want to spoil anything, but spoilers improve the readability of a thread if they are used to toggle the view of your logfile.

Please edit your post, engulfing your logs into spoiler tags.

[spoiler]logs here[/spoiler]


E 2016.02.05 21:19:24 - DNS checking failed.

This is a repeating line. You could disable the DNS checks, the option is found in the advanced settings, if I remember correctly. If you're paranoid, check your DNS manually with ipleak.net.


NOT AN AIRVPN TEAM MEMBER. USE TICKETS FOR PROFESSIONAL SUPPORT.

LZ1's New User Guide to AirVPN « Plenty of stuff for advanced users, too!

Want to contact me directly? All relevant methods are on my About me page.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...