Jump to content
Not connected, Your IP: 3.147.55.35

Recommended Posts

I have already raised this issue with staff, but despite their feedback, I haven't been able to solve the problem. They seem to be suggesting there was a problem maintaining a wifi connection, but I have done everything I could to sort this, and I am still getting the same problem. I am posting this issue here in case anyone in the community has any ideas. Basically, the problem is that from time to time, the iPad will suddenly lose the connection to the VPN. This happens right in the middle of browsing, leaving my connection exposed. Very annoying. Can anyone see anything in the log? I'd be grateful. This is driving me crazy, and I can't get to the bottom of the problem. Thanks.

 

 

nfo@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 06:46:11 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 06:46:11 Session is ACTIVE
2016-02-28 06:46:11 EVENT: GET_CONFIG
2016-02-28 06:46:11 Sending PUSH_REQUEST to server...
2016-02-28 06:46:12 Sending PUSH_REQUEST to server...
2016-02-28 06:46:13 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 06:46:13 LZO-ASYM init swap=0 asym=1
2016-02-28 06:46:13 Comp-stub init swap=0
2016-02-28 06:46:13 EVENT: ASSIGN_IP
2016-02-28 06:46:13 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 06:46:13 Connected via tun
2016-02-28 06:46:13 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 06:46:13 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 06:46:13 SetStatus Connected
2016-02-28 06:46:13 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 06:46:33 OS Event: SLEEP
2016-02-28 06:46:33 EVENT: PAUSE
2016-02-28 06:51:45 OS Event: WAKEUP
2016-02-28 06:51:48 RESUME TEST: ReachableViaWiFi
2016-02-28 06:51:48 EVENT: RESUME
2016-02-28 06:51:48 EVENT: RECONNECTING
2016-02-28 06:51:48 LZO-ASYM init swap=0 asym=1
2016-02-28 06:51:48 Comp-stub init swap=0
2016-02-28 06:51:48 Contacting 103.254.153.68:53 via UDP
2016-02-28 06:51:48 EVENT: WAIT
2016-02-28 06:51:48 SetTunnelSocket returned 1
2016-02-28 06:51:48 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 06:51:48 EVENT: CONNECTING
2016-02-28 06:51:48 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 06:51:48 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 06:51:48 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 06:51:48 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 06:51:51 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 06:51:51 Session is ACTIVE
2016-02-28 06:51:51 EVENT: GET_CONFIG
2016-02-28 06:51:51 Sending PUSH_REQUEST to server...
2016-02-28 06:51:52 Sending PUSH_REQUEST to server...
2016-02-28 06:51:53 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 06:51:53 LZO-ASYM init swap=0 asym=1
2016-02-28 06:51:53 Comp-stub init swap=0
2016-02-28 06:51:53 EVENT: ASSIGN_IP
2016-02-28 06:51:53 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 06:51:53 Connected via tun
2016-02-28 06:51:53 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 06:51:53 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 06:51:53 SetStatus Connected
2016-02-28 06:51:53 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 06:52:11 OS Event: SLEEP
2016-02-28 06:52:11 EVENT: PAUSE
2016-02-28 07:06:34 OS Event: WAKEUP
2016-02-28 07:06:37 RESUME TEST: ReachableViaWiFi
2016-02-28 07:06:38 EVENT: RESUME
2016-02-28 07:06:38 EVENT: RECONNECTING
2016-02-28 07:06:38 LZO-ASYM init swap=0 asym=1
2016-02-28 07:06:38 Comp-stub init swap=0
2016-02-28 07:06:38 Contacting 103.254.153.68:53 via UDP
2016-02-28 07:06:38 EVENT: WAIT
2016-02-28 07:06:38 SetTunnelSocket returned 1
2016-02-28 07:06:38 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 07:06:38 EVENT: CONNECTING
2016-02-28 07:06:38 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 07:06:38 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 07:06:38 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 07:06:38 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 07:06:41 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 07:06:41 Session is ACTIVE
2016-02-28 07:06:41 EVENT: GET_CONFIG
2016-02-28 07:06:41 Sending PUSH_REQUEST to server...
2016-02-28 07:06:42 Sending PUSH_REQUEST to server...
2016-02-28 07:06:43 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 07:06:43 LZO-ASYM init swap=0 asym=1
2016-02-28 07:06:43 Comp-stub init swap=0
2016-02-28 07:06:43 EVENT: ASSIGN_IP
2016-02-28 07:06:43 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 07:06:43 Connected via tun
2016-02-28 07:06:43 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 07:06:43 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 07:06:43 SetStatus Connected
2016-02-28 07:06:43 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 07:06:55 OS Event: SLEEP
2016-02-28 07:06:55 EVENT: PAUSE
2016-02-28 07:21:35 OS Event: WAKEUP
2016-02-28 07:21:38 RESUME TEST: ReachableViaWiFi
2016-02-28 07:21:38 EVENT: RESUME
2016-02-28 07:21:38 EVENT: RECONNECTING
2016-02-28 07:21:38 LZO-ASYM init swap=0 asym=1
2016-02-28 07:21:38 Comp-stub init swap=0
2016-02-28 07:21:38 Contacting 103.254.153.68:53 via UDP
2016-02-28 07:21:38 EVENT: WAIT
2016-02-28 07:21:38 SetTunnelSocket returned 1
2016-02-28 07:21:38 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 07:21:38 EVENT: CONNECTING
2016-02-28 07:21:38 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 07:21:38 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 07:21:38 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 07:21:38 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 07:21:41 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 07:21:41 Session is ACTIVE
2016-02-28 07:21:41 EVENT: GET_CONFIG
2016-02-28 07:21:41 Sending PUSH_REQUEST to server...
2016-02-28 07:21:42 Sending PUSH_REQUEST to server...
2016-02-28 07:21:43 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 07:21:43 LZO-ASYM init swap=0 asym=1
2016-02-28 07:21:43 Comp-stub init swap=0
2016-02-28 07:21:43 EVENT: ASSIGN_IP
2016-02-28 07:21:43 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 07:21:43 Connected via tun
2016-02-28 07:21:43 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 07:21:43 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 07:21:43 SetStatus Connected
2016-02-28 07:21:43 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 07:22:02 OS Event: SLEEP
2016-02-28 07:22:02 EVENT: PAUSE
2016-02-28 07:36:25 OS Event: WAKEUP
2016-02-28 07:36:28 RESUME TEST: ReachableViaWiFi
2016-02-28 07:36:28 EVENT: RESUME
2016-02-28 07:36:28 EVENT: RECONNECTING
2016-02-28 07:36:28 LZO-ASYM init swap=0 asym=1
2016-02-28 07:36:28 Comp-stub init swap=0
2016-02-28 07:36:28 Contacting 103.254.153.68:53 via UDP
2016-02-28 07:36:28 EVENT: WAIT
2016-02-28 07:36:28 SetTunnelSocket returned 1
2016-02-28 07:36:28 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 07:36:28 EVENT: CONNECTING
2016-02-28 07:36:28 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 07:36:28 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 07:36:28 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 07:36:28 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 07:36:31 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 07:36:31 Session is ACTIVE
2016-02-28 07:36:31 EVENT: GET_CONFIG
2016-02-28 07:36:31 Sending PUSH_REQUEST to server...
2016-02-28 07:36:32 Sending PUSH_REQUEST to server...
2016-02-28 07:36:33 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 07:36:33 LZO-ASYM init swap=0 asym=1
2016-02-28 07:36:33 Comp-stub init swap=0
2016-02-28 07:36:33 EVENT: ASSIGN_IP
2016-02-28 07:36:33 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 07:36:33 Connected via tun
2016-02-28 07:36:33 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 07:36:33 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 07:36:33 SetStatus Connected
2016-02-28 07:36:33 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 07:36:51 OS Event: SLEEP
2016-02-28 07:36:51 EVENT: PAUSE
2016-02-28 07:49:29 OS Event: WAKEUP
2016-02-28 07:49:32 RESUME TEST: ReachableViaWiFi
2016-02-28 07:49:32 EVENT: RESUME
2016-02-28 07:49:32 EVENT: RECONNECTING
2016-02-28 07:49:32 LZO-ASYM init swap=0 asym=1
2016-02-28 07:49:32 Comp-stub init swap=0
2016-02-28 07:49:32 Contacting 103.254.153.68:53 via UDP
2016-02-28 07:49:32 EVENT: WAIT
2016-02-28 07:49:32 SetTunnelSocket returned 1
2016-02-28 07:49:32 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 07:49:34 EVENT: CONNECTING
2016-02-28 07:49:34 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 07:49:34 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 07:49:34 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 07:49:34 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 07:49:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 07:49:38 Session is ACTIVE
2016-02-28 07:49:38 EVENT: GET_CONFIG
2016-02-28 07:49:38 Sending PUSH_REQUEST to server...
2016-02-28 07:49:39 Sending PUSH_REQUEST to server...
2016-02-28 07:49:39 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 07:49:39 LZO-ASYM init swap=0 asym=1
2016-02-28 07:49:39 Comp-stub init swap=0
2016-02-28 07:49:39 EVENT: ASSIGN_IP
2016-02-28 07:49:39 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 07:49:39 Connected via tun
2016-02-28 07:49:39 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 07:49:39 SetStatus Connected
2016-02-28 07:49:39 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 07:49:39 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 08:35:50 OS Event: SLEEP
2016-02-28 08:35:50 EVENT: PAUSE
2016-02-28 08:45:05 OS Event: WAKEUP
2016-02-28 08:45:08 RESUME TEST: ReachableViaWiFi
2016-02-28 08:45:08 EVENT: RESUME
2016-02-28 08:45:08 EVENT: RECONNECTING
2016-02-28 08:45:08 LZO-ASYM init swap=0 asym=1
2016-02-28 08:45:08 Comp-stub init swap=0
2016-02-28 08:45:08 Contacting 103.254.153.68:53 via UDP
2016-02-28 08:45:08 EVENT: WAIT
2016-02-28 08:45:08 SetTunnelSocket returned 1
2016-02-28 08:45:08 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 08:45:08 EVENT: CONNECTING
2016-02-28 08:45:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 08:45:08 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 08:45:08 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 08:45:08 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 08:45:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 08:45:12 Session is ACTIVE
2016-02-28 08:45:12 EVENT: GET_CONFIG
2016-02-28 08:45:12 Sending PUSH_REQUEST to server...
2016-02-28 08:45:13 Sending PUSH_REQUEST to server...
2016-02-28 08:45:13 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 08:45:13 LZO-ASYM init swap=0 asym=1
2016-02-28 08:45:13 Comp-stub init swap=0
2016-02-28 08:45:13 EVENT: ASSIGN_IP
2016-02-28 08:45:13 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 08:45:13 Connected via tun
2016-02-28 08:45:13 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 08:45:14 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 08:45:14 SetStatus Connected
2016-02-28 08:45:14 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 08:45:37 OS Event: SLEEP
2016-02-28 08:45:37 EVENT: PAUSE
2016-02-28 09:00:05 OS Event: WAKEUP
2016-02-28 09:00:08 RESUME TEST: ReachableViaWiFi
2016-02-28 09:00:08 EVENT: RESUME
2016-02-28 09:00:08 EVENT: RECONNECTING
2016-02-28 09:00:08 LZO-ASYM init swap=0 asym=1
2016-02-28 09:00:08 Comp-stub init swap=0
2016-02-28 09:00:08 Contacting 103.254.153.68:53 via UDP
2016-02-28 09:00:08 EVENT: WAIT
2016-02-28 09:00:08 SetTunnelSocket returned 1
2016-02-28 09:00:08 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 09:00:08 EVENT: CONNECTING
2016-02-28 09:00:08 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 09:00:08 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 09:00:08 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 09:00:08 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 09:00:12 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 09:00:12 Session is ACTIVE
2016-02-28 09:00:12 EVENT: GET_CONFIG
2016-02-28 09:00:12 Sending PUSH_REQUEST to server...
2016-02-28 09:00:13 Sending PUSH_REQUEST to server...
2016-02-28 09:00:13 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 09:00:13 LZO-ASYM init swap=0 asym=1
2016-02-28 09:00:13 Comp-stub init swap=0
2016-02-28 09:00:13 EVENT: ASSIGN_IP
2016-02-28 09:00:13 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 09:00:13 Connected via tun
2016-02-28 09:00:13 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 09:00:13 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 09:00:13 SetStatus Connected
2016-02-28 09:00:14 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 09:00:48 OS Event: SLEEP
2016-02-28 09:00:48 EVENT: PAUSE
2016-02-28 09:05:50 OS Event: WAKEUP
2016-02-28 09:05:53 RESUME TEST: ReachableViaWiFi
2016-02-28 09:05:53 EVENT: RESUME
2016-02-28 09:05:53 EVENT: RECONNECTING
2016-02-28 09:05:53 LZO-ASYM init swap=0 asym=1
2016-02-28 09:05:53 Comp-stub init swap=0
2016-02-28 09:05:53 Contacting 103.254.153.68:53 via UDP
2016-02-28 09:05:53 EVENT: WAIT
2016-02-28 09:05:53 SetTunnelSocket returned 1
2016-02-28 09:05:53 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 09:05:54 EVENT: CONNECTING
2016-02-28 09:05:54 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 09:05:54 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 09:05:54 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 09:05:54 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 09:05:58 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 09:05:58 Session is ACTIVE
2016-02-28 09:05:58 EVENT: GET_CONFIG
2016-02-28 09:05:58 Sending PUSH_REQUEST to server...
2016-02-28 09:05:59 Sending PUSH_REQUEST to server...
2016-02-28 09:05:59 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 09:05:59 LZO-ASYM init swap=0 asym=1
2016-02-28 09:05:59 Comp-stub init swap=0
2016-02-28 09:05:59 EVENT: ASSIGN_IP
2016-02-28 09:05:59 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 09:05:59 Connected via tun
2016-02-28 09:05:59 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 09:05:59 SetStatus Connected
2016-02-28 09:05:59 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 09:05:59 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 09:08:52 OS Event: SLEEP
2016-02-28 09:08:52 EVENT: PAUSE
2016-02-28 09:15:47 OS Event: WAKEUP
2016-02-28 09:15:50 RESUME TEST: ReachableViaWiFi
2016-02-28 09:15:50 EVENT: RESUME
2016-02-28 09:15:50 EVENT: RECONNECTING
2016-02-28 09:15:50 LZO-ASYM init swap=0 asym=1
2016-02-28 09:15:50 Comp-stub init swap=0
2016-02-28 09:15:50 Contacting 103.254.153.68:53 via UDP
2016-02-28 09:15:50 EVENT: WAIT
2016-02-28 09:15:50 SetTunnelSocket returned 1
2016-02-28 09:15:50 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 09:15:51 EVENT: CONNECTING
2016-02-28 09:15:51 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 09:15:51 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 09:15:51 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 09:15:51 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 09:15:55 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 09:15:55 Session is ACTIVE
2016-02-28 09:15:55 EVENT: GET_CONFIG
2016-02-28 09:15:55 Sending PUSH_REQUEST to server...
2016-02-28 09:15:56 Sending PUSH_REQUEST to server...
2016-02-28 09:15:56 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 09:15:56 LZO-ASYM init swap=0 asym=1
2016-02-28 09:15:56 Comp-stub init swap=0
2016-02-28 09:15:56 EVENT: ASSIGN_IP
2016-02-28 09:15:56 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 09:15:56 Connected via tun
2016-02-28 09:15:56 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 09:15:56 SetStatus Connected
2016-02-28 09:15:56 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 09:15:56 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 09:22:15 TUN reset routes
2016-02-28 09:22:15 EVENT: DISCONNECTED
2016-02-28 09:22:15 Raw stats on disconnect:
 BYTES_IN : 319073798
 BYTES_OUT : 40229661
 PACKETS_IN : 281937
 PACKETS_OUT : 269449
 TUN_BYTES_IN : 25882381
 TUN_BYTES_OUT : 304345974
 TUN_PACKETS_IN : 261187
 TUN_PACKETS_OUT : 275536
 HANDSHAKE_TIMEOUT : 8
 KEEPALIVE_TIMEOUT : 23
 N_PAUSE : 237
 N_RECONNECT : 260
2016-02-28 09:22:15 Performance stats on disconnect:
 CPU usage (microseconds): 981251394
 Tunnel compression ratio (uplink): 1.55433
 Tunnel compression ratio (downlink): 1.04839
 Network bytes per CPU second: 366168
 Tunnel bytes per CPU second: 336537
2016-02-28 09:22:15 ----- OpenVPN Stop -----
2016-02-28 09:22:26 ----- OpenVPN Start -----
OpenVPN core 3.0 ios armv7a thumb2 32-bit
2016-02-28 09:22:26 UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
11 [verb] [3]

2016-02-28 09:22:26 EVENT: RESOLVE
2016-02-28 09:22:31 LZO-ASYM init swap=0 asym=1
2016-02-28 09:22:31 Comp-stub init swap=0
2016-02-28 09:22:31 Contacting 71.19.252.113:53 via TCP
2016-02-28 09:22:31 EVENT: WAIT
2016-02-28 09:22:31 SetTunnelSocket returned 1
2016-02-28 09:22:31 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4
2016-02-28 09:22:32 EVENT: CONNECTING
2016-02-28 09:22:32 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 09:22:32 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 09:22:32 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 09:22:32 VERIFY OK: depth=0
cert. version    : 3
serial number    : DB
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:54:38
expires on        : 2026-01-18 14:54:38
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 09:22:38 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 09:22:38 Session is ACTIVE
2016-02-28 09:22:38 EVENT: GET_CONFIG
2016-02-28 09:22:38 Sending PUSH_REQUEST to server...
2016-02-28 09:22:39 Sending PUSH_REQUEST to server...
2016-02-28 09:22:41 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.9.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.9.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.9.0.5] [255.255.0.0]

2016-02-28 09:22:41 LZO-ASYM init swap=0 asym=1
2016-02-28 09:22:41 Comp-stub init swap=0
2016-02-28 09:22:41 EVENT: ASSIGN_IP
2016-02-28 09:22:41 TunPersist: saving tun context:
Session Name: ca.vpn.airdns.org
Remote Address: 71.19.252.113
Tunnel Addresses:
 10.9.0.5/16 -> 10.9.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.9.0.1
Search Domains:

2016-02-28 09:22:41 Connected via tun
2016-02-28 09:22:41 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/
2016-02-28 09:22:41 SetStatus Connected
2016-02-28 09:22:41 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 09:47:41 OS Event: SLEEP
2016-02-28 09:47:41 EVENT: PAUSE
2016-02-28 10:02:00 OS Event: WAKEUP
2016-02-28 10:02:03 RESUME TEST: ReachableViaWiFi
2016-02-28 10:02:03 EVENT: RESUME
2016-02-28 10:02:03 EVENT: RECONNECTING
2016-02-28 10:02:03 LZO-ASYM init swap=0 asym=1
2016-02-28 10:02:03 Comp-stub init swap=0
2016-02-28 10:02:03 Contacting 71.19.252.113:53 via TCP
2016-02-28 10:02:03 EVENT: WAIT
2016-02-28 10:02:03 SetTunnelSocket returned 1
2016-02-28 10:02:03 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4
2016-02-28 10:02:04 EVENT: CONNECTING
2016-02-28 10:02:04 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 10:02:04 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 10:02:04 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 10:02:04 VERIFY OK: depth=0
cert. version    : 3
serial number    : DB
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:54:38
expires on        : 2026-01-18 14:54:38
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 10:02:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 10:02:09 Session is ACTIVE
2016-02-28 10:02:09 EVENT: GET_CONFIG
2016-02-28 10:02:09 Sending PUSH_REQUEST to server...
2016-02-28 10:02:10 Sending PUSH_REQUEST to server...
2016-02-28 10:02:10 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.9.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.9.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.9.0.5] [255.255.0.0]

2016-02-28 10:02:10 LZO-ASYM init swap=0 asym=1
2016-02-28 10:02:10 Comp-stub init swap=0
2016-02-28 10:02:10 EVENT: ASSIGN_IP
2016-02-28 10:02:10 TunPersist: saving tun context:
Session Name: ca.vpn.airdns.org
Remote Address: 71.19.252.113
Tunnel Addresses:
 10.9.0.5/16 -> 10.9.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.9.0.1
Search Domains:

2016-02-28 10:02:10 Connected via tun
2016-02-28 10:02:10 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/
2016-02-28 10:02:11 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 10:02:11 SetStatus Connected
2016-02-28 10:02:11 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 10:02:41 OS Event: SLEEP
2016-02-28 10:02:41 EVENT: PAUSE
2016-02-28 10:21:55 OS Event: WAKEUP
2016-02-28 10:21:58 RESUME TEST: ReachableViaWiFi
2016-02-28 10:21:58 EVENT: RESUME
2016-02-28 10:21:58 EVENT: RECONNECTING
2016-02-28 10:21:58 LZO-ASYM init swap=0 asym=1
2016-02-28 10:21:58 Comp-stub init swap=0
2016-02-28 10:21:58 Contacting 71.19.252.113:53 via TCP
2016-02-28 10:21:58 EVENT: WAIT
2016-02-28 10:21:58 SetTunnelSocket returned 1
2016-02-28 10:21:58 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4
2016-02-28 10:21:59 EVENT: CONNECTING
2016-02-28 10:21:59 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 10:21:59 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 10:21:59 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 10:21:59 VERIFY OK: depth=0
cert. version    : 3
serial number    : DB
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:54:38
expires on        : 2026-01-18 14:54:38
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 10:22:04 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 10:22:04 Session is ACTIVE
2016-02-28 10:22:04 EVENT: GET_CONFIG
2016-02-28 10:22:04 Sending PUSH_REQUEST to server...
2016-02-28 10:22:06 Sending PUSH_REQUEST to server...
2016-02-28 10:22:08 Sending PUSH_REQUEST to server...
2016-02-28 10:22:11 Sending PUSH_REQUEST to server...
2016-02-28 10:22:14 Sending PUSH_REQUEST to server...
2016-02-28 10:22:17 Sending PUSH_REQUEST to server...
2016-02-28 10:22:20 Sending PUSH_REQUEST to server...
2016-02-28 10:22:23 Sending PUSH_REQUEST to server...
2016-02-28 10:22:26 Sending PUSH_REQUEST to server...
2016-02-28 10:22:29 Sending PUSH_REQUEST to server...
2016-02-28 10:22:32 Sending PUSH_REQUEST to server...
2016-02-28 10:22:35 Sending PUSH_REQUEST to server...
2016-02-28 10:22:38 Sending PUSH_REQUEST to server...
2016-02-28 10:22:41 Sending PUSH_REQUEST to server...
2016-02-28 10:22:44 Sending PUSH_REQUEST to server...
2016-02-28 10:22:47 Sending PUSH_REQUEST to server...
2016-02-28 10:22:50 Sending PUSH_REQUEST to server...
2016-02-28 10:22:53 Sending PUSH_REQUEST to server...
2016-02-28 10:22:56 Sending PUSH_REQUEST to server...
2016-02-28 10:22:59 Sending PUSH_REQUEST to server...
2016-02-28 10:23:02 Sending PUSH_REQUEST to server...
2016-02-28 10:23:05 Sending PUSH_REQUEST to server...
2016-02-28 10:23:08 Sending PUSH_REQUEST to server...
2016-02-28 10:23:10 OS Event: SLEEP
2016-02-28 10:23:10 EVENT: PAUSE
2016-02-28 10:40:50 OS Event: WAKEUP
2016-02-28 10:40:53 RESUME TEST: ReachableViaWiFi
2016-02-28 10:40:53 EVENT: RESUME
2016-02-28 10:40:53 EVENT: RECONNECTING
2016-02-28 10:40:53 LZO-ASYM init swap=0 asym=1
2016-02-28 10:40:53 Comp-stub init swap=0
2016-02-28 10:40:53 Contacting 71.19.252.113:53 via TCP
2016-02-28 10:40:53 EVENT: WAIT
2016-02-28 10:40:53 SetTunnelSocket returned 1
2016-02-28 10:40:53 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4
2016-02-28 10:40:54 EVENT: CONNECTING
2016-02-28 10:40:54 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 10:40:54 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 10:40:54 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 10:40:54 VERIFY OK: depth=0
cert. version    : 3
serial number    : DB
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:54:38
expires on        : 2026-01-18 14:54:38
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 10:40:59 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 10:40:59 Session is ACTIVE
2016-02-28 10:40:59 EVENT: GET_CONFIG
2016-02-28 10:40:59 Sending PUSH_REQUEST to server...
2016-02-28 10:41:00 Sending PUSH_REQUEST to server...
2016-02-28 10:41:01 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.9.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.9.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.9.0.5] [255.255.0.0]

2016-02-28 10:41:01 LZO-ASYM init swap=0 asym=1
2016-02-28 10:41:01 Comp-stub init swap=0
2016-02-28 10:41:01 EVENT: ASSIGN_IP
2016-02-28 10:41:01 TunPersist: saving tun context:
Session Name: ca.vpn.airdns.org
Remote Address: 71.19.252.113
Tunnel Addresses:
 10.9.0.5/16 -> 10.9.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.9.0.1
Search Domains:

2016-02-28 10:41:01 Connected via tun
2016-02-28 10:41:01 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/
2016-02-28 10:41:01 SetStatus Connected
2016-02-28 10:41:01 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 10:41:01 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 10:42:13 OS Event: SLEEP
2016-02-28 10:42:13 EVENT: PAUSE
2016-02-28 10:47:30 OS Event: WAKEUP
2016-02-28 10:47:33 RESUME TEST: ReachableViaWiFi
2016-02-28 10:47:33 EVENT: RESUME
2016-02-28 10:47:33 EVENT: RECONNECTING
2016-02-28 10:47:33 LZO-ASYM init swap=0 asym=1
2016-02-28 10:47:33 Comp-stub init swap=0
2016-02-28 10:47:33 Contacting 71.19.252.113:53 via TCP
2016-02-28 10:47:33 EVENT: WAIT
2016-02-28 10:47:33 SetTunnelSocket returned 1
2016-02-28 10:47:33 Connecting to ca.vpn.airdns.org:53 (71.19.252.113) via TCPv4
2016-02-28 10:47:34 EVENT: CONNECTING
2016-02-28 10:47:34 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 10:47:34 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 10:47:34 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 10:47:34 VERIFY OK: depth=0
cert. version    : 3
serial number    : DB
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:54:38
expires on        : 2026-01-18 14:54:38
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 10:47:40 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 10:47:40 Session is ACTIVE
2016-02-28 10:47:40 EVENT: GET_CONFIG
2016-02-28 10:47:40 Sending PUSH_REQUEST to server...
2016-02-28 10:47:41 Sending PUSH_REQUEST to server...
2016-02-28 10:47:42 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.9.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.9.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.9.0.5] [255.255.0.0]

2016-02-28 10:47:42 LZO-ASYM init swap=0 asym=1
2016-02-28 10:47:42 Comp-stub init swap=0
2016-02-28 10:47:42 EVENT: ASSIGN_IP
2016-02-28 10:47:42 TunPersist: saving tun context:
Session Name: ca.vpn.airdns.org
Remote Address: 71.19.252.113
Tunnel Addresses:
 10.9.0.5/16 -> 10.9.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.9.0.1
Search Domains:

2016-02-28 10:47:42 Connected via tun
2016-02-28 10:47:42 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.113) via /TCPv4 on tun/10.9.0.5/
2016-02-28 10:47:42 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 10:47:42 SetStatus Connected
2016-02-28 10:47:43 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 11:12:06 ----- OpenVPN Start -----
OpenVPN core 3.0 ios armv7a thumb2 32-bit
2016-02-28 11:12:07 UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
11 [verb] [3]

2016-02-28 11:12:07 EVENT: RESOLVE
2016-02-28 11:12:08 LZO-ASYM init swap=0 asym=1
2016-02-28 11:12:08 Comp-stub init swap=0
2016-02-28 11:12:08 Contacting 71.19.251.247:53 via TCP
2016-02-28 11:12:08 EVENT: WAIT
2016-02-28 11:12:08 SetTunnelSocket returned 1
2016-02-28 11:12:08 Connecting to ca.vpn.airdns.org:53 (71.19.251.247) via TCPv4
2016-02-28 11:12:08 EVENT: CONNECTING
2016-02-28 11:12:08 Tunnel Options:V4,dev-type tun,link-mtu 1560,tun-mtu 1500,proto TCPv4_CLIENT,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 11:12:08 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 11:12:09 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 11:12:09 VERIFY OK: depth=0
cert. version    : 3
serial number    : E1
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:55:10
expires on        : 2026-01-18 14:55:10
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 11:12:14 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 11:12:14 Session is ACTIVE
2016-02-28 11:12:14 EVENT: GET_CONFIG
2016-02-28 11:12:14 Sending PUSH_REQUEST to server...
2016-02-28 11:12:15 Sending PUSH_REQUEST to server...
2016-02-28 11:12:15 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.9.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.9.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.9.0.4] [255.255.0.0]

2016-02-28 11:12:15 LZO-ASYM init swap=0 asym=1
2016-02-28 11:12:15 Comp-stub init swap=0
2016-02-28 11:12:15 EVENT: ASSIGN_IP
2016-02-28 11:12:15 TunPersist: saving tun context:
Session Name: ca.vpn.airdns.org
Remote Address: 71.19.251.247
Tunnel Addresses:
 10.9.0.4/16 -> 10.9.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.9.0.1
Search Domains:

2016-02-28 11:12:15 Connected via tun
2016-02-28 11:12:15 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.251.247) via /TCPv4 on tun/10.9.0.4/
2016-02-28 11:12:15 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 11:12:15 SetStatus Connected
2016-02-28 11:48:30 TUN reset routes
2016-02-28 11:48:30 EVENT: DISCONNECTED
2016-02-28 11:48:30 Raw stats on disconnect:
 BYTES_IN : 33597104
 BYTES_OUT : 4875026
 PACKETS_IN : 23379
 PACKETS_OUT : 30890
 TUN_BYTES_IN : 3423065
 TUN_BYTES_OUT : 31944426
 TUN_PACKETS_IN : 30853
 TUN_PACKETS_OUT : 32136
2016-02-28 11:48:30 Performance stats on disconnect:
 CPU usage (microseconds): 20836836
 Tunnel compression ratio (uplink): 1.42417
 Tunnel compression ratio (downlink): 1.05174
 Network bytes per CPU second: 1846351
 Tunnel bytes per CPU second: 1697354
2016-02-28 11:48:30 ----- OpenVPN Stop -----
2016-02-28 11:48:42 ----- OpenVPN Start -----
OpenVPN core 3.0 ios armv7a thumb2 32-bit
2016-02-28 11:48:42 UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
11 [verb] [3]
12 [explicit-exit-notify] [5]

2016-02-28 11:48:42 EVENT: RESOLVE
2016-02-28 11:48:44 LZO-ASYM init swap=0 asym=1
2016-02-28 11:48:44 Comp-stub init swap=0
2016-02-28 11:48:44 Contacting 71.19.252.21:53 via UDP
2016-02-28 11:48:44 EVENT: WAIT
2016-02-28 11:48:44 SetTunnelSocket returned 1
2016-02-28 11:48:44 Connecting to ca.vpn.airdns.org:53 (71.19.252.21) via UDPv4
2016-02-28 11:48:45 EVENT: CONNECTING
2016-02-28 11:48:45 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 11:48:45 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 11:48:45 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 11:48:45 VERIFY OK: depth=0
cert. version    : 3
serial number    : DA
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2016-01-21 14:54:33
expires on        : 2026-01-18 14:54:33
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 11:48:49 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 11:48:49 Session is ACTIVE
2016-02-28 11:48:49 EVENT: GET_CONFIG
2016-02-28 11:48:49 Sending PUSH_REQUEST to server...
2016-02-28 11:48:50 Sending PUSH_REQUEST to server...
2016-02-28 11:48:50 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.19] [255.255.0.0]

2016-02-28 11:48:50 LZO-ASYM init swap=0 asym=1
2016-02-28 11:48:50 Comp-stub init swap=0
2016-02-28 11:48:50 EVENT: ASSIGN_IP
2016-02-28 11:48:50 TunPersist: saving tun context:
Session Name: ca.vpn.airdns.org
Remote Address: 71.19.252.21
Tunnel Addresses:
 10.8.0.19/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 11:48:50 Connected via tun
2016-02-28 11:48:50 EVENT: CONNECTED @ca.vpn.airdns.org:53 (71.19.252.21) via /UDPv4 on tun/10.8.0.19/
2016-02-28 11:48:50 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 11:48:50 SetStatus Connected
2016-02-28 11:52:00 ----- OpenVPN Start -----
OpenVPN core 3.0 ios armv7a thumb2 32-bit
2016-02-28 11:52:00 UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
11 [verb] [3]
12 [explicit-exit-notify] [5]

2016-02-28 11:52:00 EVENT: RESOLVE
2016-02-28 11:52:04 LZO-ASYM init swap=0 asym=1
2016-02-28 11:52:04 Comp-stub init swap=0
2016-02-28 11:52:04 Contacting 103.254.153.68:53 via UDP
2016-02-28 11:52:04 EVENT: WAIT
2016-02-28 11:52:04 SetTunnelSocket returned 1
2016-02-28 11:52:04 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 11:52:04 EVENT: CONNECTING
2016-02-28 11:52:04 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 11:52:04 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 11:52:08 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 11:52:08 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 11:52:14 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 11:52:14 Session is ACTIVE
2016-02-28 11:52:14 EVENT: GET_CONFIG
2016-02-28 11:52:14 Sending PUSH_REQUEST to server...
2016-02-28 11:52:15 Sending PUSH_REQUEST to server...
2016-02-28 11:52:15 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 11:52:15 LZO-ASYM init swap=0 asym=1
2016-02-28 11:52:15 Comp-stub init swap=0
2016-02-28 11:52:15 EVENT: ASSIGN_IP
2016-02-28 11:52:15 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 11:52:15 Connected via tun
2016-02-28 11:52:15 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 11:52:15 SetStatus Connected
2016-02-28 11:52:15 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 11:58:02 ----- OpenVPN Start -----
OpenVPN core 3.0 ios armv7a thumb2 32-bit
2016-02-28 11:58:02 UNUSED OPTIONS
4 [resolv-retry] [infinite]
5 [nobind]
6 [persist-key]
7 [persist-tun]
11 [verb] [3]
12 [explicit-exit-notify] [5]

2016-02-28 11:58:02 EVENT: RESOLVE
2016-02-28 11:58:04 LZO-ASYM init swap=0 asym=1
2016-02-28 11:58:04 Comp-stub init swap=0
2016-02-28 11:58:04 Contacting 103.254.153.68:53 via UDP
2016-02-28 11:58:04 EVENT: WAIT
2016-02-28 11:58:04 SetTunnelSocket returned 1
2016-02-28 11:58:04 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 11:58:05 EVENT: CONNECTING
2016-02-28 11:58:05 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 11:58:05 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 11:58:05 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 11:58:05 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 11:58:09 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 11:58:09 Session is ACTIVE
2016-02-28 11:58:09 EVENT: GET_CONFIG
2016-02-28 11:58:09 Sending PUSH_REQUEST to server...
2016-02-28 11:58:10 Sending PUSH_REQUEST to server...
2016-02-28 11:58:11 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 11:58:11 LZO-ASYM init swap=0 asym=1
2016-02-28 11:58:11 Comp-stub init swap=0
2016-02-28 11:58:11 EVENT: ASSIGN_IP
2016-02-28 11:58:11 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 11:58:11 Connected via tun
2016-02-28 11:58:11 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 11:58:11 NET Internet:ReachableViaWiFi/-R t----l-
2016-02-28 11:58:11 SetStatus Connected
2016-02-28 12:03:32 OS Event: SLEEP
2016-02-28 12:03:32 EVENT: PAUSE
2016-02-28 12:08:11 OS Event: WAKEUP
2016-02-28 12:08:14 RESUME TEST: ReachableViaWiFi
2016-02-28 12:08:14 EVENT: RESUME
2016-02-28 12:08:14 EVENT: RECONNECTING
2016-02-28 12:08:14 LZO-ASYM init swap=0 asym=1
2016-02-28 12:08:14 Comp-stub init swap=0
2016-02-28 12:08:14 Contacting 103.254.153.68:53 via UDP
2016-02-28 12:08:14 EVENT: WAIT
2016-02-28 12:08:14 SetTunnelSocket returned 1
2016-02-28 12:08:14 Connecting to asia.vpn.airdns.org:53 (103.254.153.68) via UDPv4
2016-02-28 12:08:14 EVENT: CONNECTING
2016-02-28 12:08:14 Tunnel Options:V4,dev-type tun,link-mtu 1558,tun-mtu 1500,proto UDPv4,comp-lzo,keydir 1,cipher AES-256-CBC,auth SHA1,keysize 256,tls-auth,key-method 2,tls-client
2016-02-28 12:08:14 Peer Info:
IV_GUI_VER=net.openvpn.connect.ios 1.0.5-177
IV_VER=3.0
IV_PLAT=ios
IV_NCP=1
IV_SNAPPY=1
IV_LZO=1
IV_LZO_SWAP=1
IV_LZ4=1
IV_COMP_STUB=1

2016-02-28 12:08:15 VERIFY OK: depth=1
cert. version    : 3
serial number    : 8C:D8:43:EF:E4:5F:20:03
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
issued  on        : 2014-04-11 10:15:45
expires on        : 2024-04-08 10:15:45
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=true

2016-02-28 12:08:15 VERIFY OK: depth=0
cert. version    : 3
serial number    : 5F
issuer name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=airvpn.org CA, emailAddress=info@airvpn.org
subject name      : C=IT, ST=IT, L=Perugia, O=airvpn.org, CN=server, emailAddress=info@airvpn.org
issued  on        : 2014-08-20 11:25:25
expires on        : 2024-08-17 11:25:25
signed using      : RSA with SHA1
RSA key size      : 4096 bits
basic constraints : CA=false
cert. type        : SSL Server
key usage        : Digital Signature, Key Encipherment
ext key usage    : TLS Web Server Authentication

2016-02-28 12:08:19 SSL Handshake: TLSv1.2/TLS-DHE-RSA-WITH-AES-256-CBC-SHA
2016-02-28 12:08:19 Session is ACTIVE
2016-02-28 12:08:19 EVENT: GET_CONFIG
2016-02-28 12:08:19 Sending PUSH_REQUEST to server...
2016-02-28 12:08:20 Sending PUSH_REQUEST to server...
2016-02-28 12:08:20 OPTIONS:
0 [redirect-gateway] [def1] [bypass-dhcp]
1 [dhcp-option] [DNS] [10.8.0.1]
2 [comp-lzo] [no]
3 [route-gateway] [10.8.0.1]
4 [topology] [subnet]
5 [ping] [10]
6 [ping-restart] [60]
7 [ifconfig] [10.8.0.17] [255.255.0.0]

2016-02-28 12:08:20 LZO-ASYM init swap=0 asym=1
2016-02-28 12:08:20 Comp-stub init swap=0
2016-02-28 12:08:20 EVENT: ASSIGN_IP
2016-02-28 12:08:20 TunPersist: saving tun context:
Session Name: asia.vpn.airdns.org
Remote Address: 103.254.153.68
Tunnel Addresses:
 10.8.0.17/16 -> 10.8.0.1
Reroute Gateway: IPv4=1 IPv6=0 flags=[ ENABLE REROUTE_GW DEF1 BYPASS_DHCP IPv4 ]
Block IPv6: no
Add Routes:
Exclude Routes:
DNS Servers:
 10.8.0.1
Search Domains:

2016-02-28 12:08:20 Connected via tun
2016-02-28 12:08:20 EVENT: CONNECTED @asia.vpn.airdns.org:53 (103.254.153.68) via /UDPv4 on tun/10.8.0.17/
2016-02-28 12:08:20 NET Internet:ReachableViaWiFi/-R -----l-
2016-02-28 12:08:20 SetStatus Connected
2016-02-28 12:08:20 NET Internet:ReachableViaWiFi/-R t----l-

Share this post


Link to post

https://forums.openvpn.net/topic13312.html

 

Check the official response from the developers. Your device goes to sleep at random periods of time.

Most likely this is due to inactivity, iOS determines inactivity by lack of user input events.


Occasional moderator, sometimes BOFH. Opinions are my own, except when my wife disagrees.

Share this post


Link to post

Thanks, Zhang888. Not sure this analysis is actually right, because the connection is lost while I am in the middle of browsing, not during periods of inactivity. What is even more worrying is that on occasions, the VPN symbol (which appears at the top left of the iPad) will still be on, but the actual connection has been lost, creating a totally false sensation of security. Mostly though, it will just suddenly crash, and the symbol along with it, so at least I usually do know the connection has crashed.

Share this post


Link to post

Your input is much appreciated. I've been struggling with this one for a long time. Stafff also suspected wifi issues when I opened a ticket about this. I had an old router anyway, so I bought a new router; made sure I had the "best" channel possible for the signal; bought a wifi extender for the more remote areas of the house. The issue continues (but randomly - i can go for weeks without any dropouts, and then suddenly out of the blue, there will be episodes of repeated instability). I normally leave the iPad at home, but I have also tested it outside, in areas where I know the local wifi signals are good and strong (like the local university). I have found the same issue repeated in these contexts (again, randomly), so I figure it can't be a wifi issue.

Your idea about the clean slate with no 3rd party apps is an intriguing one, though. I'm will explore this idea and report back in due course. Thanks again.

Share this post


Link to post

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Loading...
  • Security Check
    Play CAPTCHA Audio
    Refresh Image

×
×
  • Create New...